Unlock instant, AI-driven research and patent intelligence for your innovation.

Threshold digital signature method and system

A digital signature and threshold technology, applied in the field of encryption currency and cryptography, threshold cryptography, ECDSA, elliptic curve cryptography, to achieve the effect of improving security

Pending Publication Date: 2020-04-10
NCHAIN HLDG LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, while the Bitcoin protocol itself has proven resilient to any significant attack at the time of filing this application, attacks on exchanges and wallets complement or build upon the Bitcoin network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold digital signature method and system
  • Threshold digital signature method and system
  • Threshold digital signature method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0129] Since embodiments of the present invention use ECC to encrypt secret information that needs to be sent between participants based on a hierarchical derivation, for example as disclosed in International Patent Publication WO 2017 / 145016, all messages are organized to be sent to all It is both possible and sensible to enable authentication against potentially threatened or hostile actors, if necessary, within a single packet of the consumer.

[0130] Signature generation is performed by coordinating participant p (c) proposed. By default, any key slice can act as a coordinating participant, and the requirements boil down to individual implementations of the protocol. The algorithm used is documented below, and details about its deployment are provided in a later section.

[0131] Algorithm 1 key generation

[0132] Domain parameters (curve, base n, generator G)

[0133] Input: N / A

[0134] Output: public key Q A

[0135] private key share share d A(1) , d A(2) ,....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of sharing a secret value is disclosed. The method comprises distributing respective first shares of a first secret value, known to a first participant (Pi), to a plurality of second participants (Pj is not equal to i), wherein said first shares are encrypted by means of at least one private-public key pair comprising a private key and a public key being an elliptic curve generator pointmultiplied by the private key and wherein a first threshold number of first shares is required in order to enable a second participant to determine the first secret value. At least one second share ofa respective second secret value is received from each of a plurality of second participants, wherein the second shares are encrypted by means of at least one private-public key pair comprising a private key and a public key being an elliptic curve generator point multiplied by the private key, and a second threshold number of second shares is required in order to enable a participant other thanthat second participant to determine the second secret value. A third share of a third secret value is formed from a plurality of second shares, wherein a third threshold number of third shares is required in order to enable the third secret value to be determined.

Description

technical field [0001] The present invention relates generally to the security of data and computer-based resources. More specifically, the present invention relates to cryptography and cryptography, and also to elliptic curve cryptography, ECDSA, threshold cryptography. The present invention may be used to advantage in blockchain-implemented cryptocurrencies such as, but not limited to, Bitcoin (Bitcoin), and may have wider applicability. In one embodiment, the invention may be described as providing a distribution protocol for dealer-free confidential distribution. Background technique [0002] In this document, the term "blockchain" is used to include all forms of electronic, computer-based distributed ledgers. These include consensus-based blockchain and transaction chain technologies, permissioned and permissionless ledgers, shared ledgers and variations thereof. While other blockchain implementations have been proposed and developed, the most widely known applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/085H04L9/3066H04L9/3073H04L9/3236H04L2209/56H04L9/50H04L9/0637H04L9/0643H04L9/304
Inventor 史蒂芬·萨凡纳克雷格·史蒂文·赖特
Owner NCHAIN HLDG LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More