Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Computer implemented method and system for transferring access to a digital asset

A technology of digital assets and access rights, applied in the field of resource security, can solve problems such as dependence and high complexity of cryptographic primitives, and achieve the effect of enhancing security, improving security and reliability

Pending Publication Date: 2021-01-08
NCHAIN HLDG LTD
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This cryptographic primitive has high complexity and relies on relatively untested assumptions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer implemented method and system for transferring access to a digital asset
  • Computer implemented method and system for transferring access to a digital asset
  • Computer implemented method and system for transferring access to a digital asset

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] System Overview

[0061] refer to figure 1 , a system 2 embodying the present invention for performing fast signing of blockchain transactions 4 has four parties in a threshold signature scheme, the four parties being a client 6, an exchange party 8, a trusted third party (TTP) 10, and an escrow Party 12. Each party has a corresponding elliptic curve public / private key pair (y C , x c ), (y Ex, x Ex ), (y T , x T ), (y Es, x Es ). The present invention features an additional party, the TTP 10, compared to the typical "2 of 3" hosting configuration of the prior art. As explained in more detail below, the generation of every signature that requires the TTP 10 to participate does not involve the escrow party 12 (in the case of troubleshooting).

[0062] The TTP 10 is required to have a fast (low latency) and reliable connection to the exchange party 8, and the TTP 10 should be separate from all other party entities.

[0063] Then, a secure communication channel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of transferring access to a digital asset is disclosed. The method comprises receiving a first blockchain transaction (4) from a first participant (6) by each of a plurality of second participants (8), (10). The first participant (6) has a first private key of a first private- public key pair of a cryptography system, and each participant (6), (8), (10) has a respective first share of a second private key of a second private-public key pair of the cryptography system, and the first blockchain transaction is signed with the first private key. Signature of the first blockchain transaction with the first private key is verified by each second participant (8), (10). A respective first share is applied to the first blockchain transaction to generate a respective second share of a second blockchain transaction signed with the second private key. Signature with the second private key is possible by means of a first threshold number of second shares and is inaccessible to less than the first threshold number of second shares. The first threshold number of second shares are combined from the first participant (6) and a plurality of the second participants (8), (10) and generate thesignature.

Description

technical field [0001] The present invention relates generally to the security of data and computer-based resources. More specifically, the present invention relates to cryptography and cryptography, and also to elliptic curve cryptography, elliptic curve digital signature algorithm (ECDSA), and threshold cryptography. The present invention may be advantageously used in blockchain-implemented cryptocurrencies such as, for example, Bitcoin, but is not limited thereto, and may have wider applicability. In one embodiment, the invention may be described as providing a threshold digital signature scheme. Background technique [0002] In this document, we use the term "blockchain" to include all forms of computer-based electronic distributed ledgers (ledgers). These ledgers include consensus-based blockchain and transaction chain technologies, permissioned and permissionless ledgers, shared ledgers, and variations thereof. The most widely known application of blockchain technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/085H04L9/3066H04L9/3236H04L9/3247H04L2209/56H04L9/50H04L9/3255
Inventor 约翰·弗莱彻托马斯·特雷维坦
Owner NCHAIN HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products