SG11202113362XA - Key recovery using encrypted secret shares - Google Patents

Key recovery using encrypted secret shares

Info

Publication number
SG11202113362XA
SG11202113362XA SG11202113362XA SG11202113362XA SG11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA SG 11202113362X A SG11202113362X A SG 11202113362XA
Authority
SG
Singapore
Prior art keywords
key recovery
encrypted secret
secret shares
shares
encrypted
Prior art date
Application number
SG11202113362XA
Inventor
Jonathan Dolan
Michael D Ornelas
Kevin Hartley
Pengyu Chen
Juston Johnson
Original Assignee
Tzero Ip Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tzero Ip Llc filed Critical Tzero Ip Llc
Publication of SG11202113362XA publication Critical patent/SG11202113362XA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3026Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
SG11202113362XA 2019-06-10 2020-06-01 Key recovery using encrypted secret shares SG11202113362XA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201962859568P 2019-06-10 2019-06-10
US201962931753P 2019-11-06 2019-11-06
PCT/US2020/035543 WO2020251795A1 (en) 2019-06-10 2020-06-01 Key recovery using encrypted secret shares

Publications (1)

Publication Number Publication Date
SG11202113362XA true SG11202113362XA (en) 2021-12-30

Family

ID=73650897

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202113362XA SG11202113362XA (en) 2019-06-10 2020-06-01 Key recovery using encrypted secret shares

Country Status (6)

Country Link
US (1) US11374750B2 (en)
EP (1) EP3981103A4 (en)
JP (1) JP2022536645A (en)
KR (1) KR20220016910A (en)
SG (1) SG11202113362XA (en)
WO (1) WO2020251795A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019061001A1 (en) * 2017-09-29 2019-04-04 Peerio Technologies Inc. Access to secured information
US11271728B2 (en) * 2019-12-20 2022-03-08 Fujitsu Limited Secure key management
US11870898B2 (en) * 2020-05-21 2024-01-09 Workday, Inc. Split keys for wallet recovery
US11271739B2 (en) * 2020-06-25 2022-03-08 Digital 14 Llc Error-correcting key agreement for noisy cryptographic systems
US11632244B2 (en) * 2020-09-14 2023-04-18 Paypal, Inc. Techniques for single round multi-party computation for digital signatures
CN112491550B (en) * 2020-12-22 2022-05-17 湖南科技学院 Mobile terminal equipment credibility authentication method and system based on Internet of vehicles
CN112769567B (en) * 2021-01-19 2023-04-07 北京枫玉科技有限公司 Block chain HD private key retrieving method
US20220271933A1 (en) * 2021-02-19 2022-08-25 Samsung Electronics Co., Ltd. System and method for device to device secret backup and recovery
US11973865B2 (en) * 2021-03-05 2024-04-30 Michael Heu Device and method of storing a seed phrase
CN112926087B (en) * 2021-03-09 2023-05-05 南京信息工程大学 Secret sharing method with verification function and high embedding capacity based on two-dimensional code
EP4315217A1 (en) * 2021-03-31 2024-02-07 Jio Platforms Limited System and method for secure and traceable fund transfer operation through a distributed ledger
CN113346999B (en) * 2021-08-09 2021-10-26 国网浙江省电力有限公司杭州供电公司 Splitting encryption-based brain central system
GB202111737D0 (en) * 2021-08-16 2021-09-29 Blockhouse Tech Limited Storing cryptographic keys securely
US20230099755A1 (en) * 2021-09-24 2023-03-30 Sap Se Sql extension to key transfer system with authenticity, confidentiality, and integrity
WO2024004116A1 (en) * 2022-06-30 2024-01-04 日本電気株式会社 Key issuance device, information processing system, method, and computer-readable medium
US11777727B1 (en) * 2022-08-29 2023-10-03 Osom Products, Inc. Distributed digital wallet seed phrase

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796830A (en) * 1996-07-29 1998-08-18 International Business Machines Corporation Interoperable cryptographic key recovery system
US7181015B2 (en) * 2001-07-31 2007-02-20 Mcafee, Inc. Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique
US8170216B2 (en) 2008-06-18 2012-05-01 Apple Inc. Techniques for validating and sharing secrets
EP2684311A1 (en) * 2011-03-07 2014-01-15 Security First Corp. Secure file sharing method and system
US8731203B2 (en) * 2012-02-13 2014-05-20 Alephcloud Systems, Inc. Securing a secret of a user
US9485096B2 (en) * 2013-02-06 2016-11-01 Apurva Shrivastava Encryption / decryption of data with non-persistent, non-shared passkey
US10354325B1 (en) 2013-06-28 2019-07-16 Winklevoss Ip, Llc Computer-generated graphical user interface
US9768953B2 (en) * 2015-09-30 2017-09-19 Pure Storage, Inc. Resharing of a split secret
US10333705B2 (en) 2016-04-30 2019-06-25 Civic Technologies, Inc. Methods and apparatus for providing attestation of information using a centralized or distributed ledger
US10547592B2 (en) * 2017-01-19 2020-01-28 Hewlett Packard Enterprise Development Lp Computing a global sum that preserves privacy of parties in a multi-party environment
US10263775B2 (en) * 2017-06-23 2019-04-16 Microsoft Technology Licensing, Llc Policy-based key recovery
EP3688922A4 (en) * 2017-09-27 2020-09-09 Visa International Service Association Secure shared key establishment for peer to peer communications
EP4216487A1 (en) * 2017-10-30 2023-07-26 Visa International Service Association Multi-party threshold authenticated encryption
JP7269944B2 (en) 2018-01-17 2023-05-09 ティーゼロ・アイピー,エルエルシー A multi-authorization system that uses M out of N keys to generate transaction addresses
US10084600B1 (en) * 2018-04-16 2018-09-25 Xage Security, Inc. Decentralized information protection for confidentiality and tamper-proofing on distributed database
US11063754B2 (en) * 2018-05-01 2021-07-13 Huawei Technologies Co., Ltd. Systems, devices, and methods for hybrid secret sharing
DE102018111081A1 (en) * 2018-05-08 2019-11-14 Uniscon Universal Identity Control Gmbh Method for securing a data exchange in a distributed infrastructure
KR101954863B1 (en) * 2018-07-09 2019-03-06 서울대학교산학협력단 Online wallet apparatus, and method for generating and verifying online wallet
US20200052889A1 (en) * 2018-08-09 2020-02-13 Cyberark Software Ltd. Secure distributed transmission and recombination of secrets
KR20210066867A (en) * 2018-10-12 2021-06-07 티제로 아이피, 엘엘씨 An encrypted asset encryption key portion that allows assembly of an asset encryption key using a subset of the encrypted asset encryption key portion.

Also Published As

Publication number Publication date
US20200389306A1 (en) 2020-12-10
WO2020251795A1 (en) 2020-12-17
JP2022536645A (en) 2022-08-18
EP3981103A4 (en) 2023-06-21
KR20220016910A (en) 2022-02-10
US11374750B2 (en) 2022-06-28
EP3981103A1 (en) 2022-04-13

Similar Documents

Publication Publication Date Title
SG11202113362XA (en) Key recovery using encrypted secret shares
ZA201902554B (en) Blockchain data protection using homomorphic encryption
GB2601928B (en) Cryptographic architecture for cryptographic permutation
EP3545640A4 (en) Blockchain data protection using homomorphic encryption
EP3949265A4 (en) Verification of identity using a secret key
EP3598714A4 (en) Method, device, and system for encrypting secret key
SG11201708750TA (en) Network system, and methods of encrypting data, decrypting encrypted data in the same
ZA202000536B (en) Security key derivation for handover
GB201710329D0 (en) Progressive key encryption Algorithm
EP3676987A4 (en) Secure key transmission protocol without certificates or pre-shared symmetrical keys
GB2570214B (en) Content encryption and decryption using a custom key
EP3371928B8 (en) Key sequence generation for cryptographic operations
EP3096488A4 (en) Hypersphere-based multivariable public key encryption/decryption system and method
GB202009062D0 (en) Generating secret shares
EP3763075A4 (en) Key encryption key wrapping
EP3704829B8 (en) Cryptographic key generation system and method
IL290283A (en) Secure out-of-band symmetric encryption key delivery
GB201621278D0 (en) Password-authenticated public key encryption and decryption
GB201807257D0 (en) Cryptographic key distribution
GB201802582D0 (en) Protecting cryptographic key data
GB2590239B (en) Secure operations on encrypted data
EP3767874A4 (en) Decrypting device, encrypting device, and encryption system
GB202101118D0 (en) Cryptographic key management for end-to end communication security
GB202301430D0 (en) Secure secret recovery
HUE054442T2 (en) Symmetric key stream cipher cryptographic method and device