SG11201913426RA - Sybil-resistant identity generation - Google Patents
Sybil-resistant identity generationInfo
- Publication number
- SG11201913426RA SG11201913426RA SG11201913426RA SG11201913426RA SG11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA
- Authority
- SG
- Singapore
- Prior art keywords
- sybil
- identity generation
- resistant identity
- resistant
- generation
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
- H04L2209/463—Electronic voting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Hardware Redundancy (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862668633P | 2018-05-08 | 2018-05-08 | |
PCT/US2018/055033 WO2019216949A1 (en) | 2018-05-08 | 2018-10-09 | Sybil-resistant identity generation |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201913426RA true SG11201913426RA (en) | 2020-01-30 |
Family
ID=68468390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201913426RA SG11201913426RA (en) | 2018-05-08 | 2018-10-09 | Sybil-resistant identity generation |
Country Status (6)
Country | Link |
---|---|
US (2) | US11102015B2 (en) |
EP (1) | EP3628113B1 (en) |
CN (2) | CN110945831B (en) |
AU (1) | AU2018422776B2 (en) |
SG (1) | SG11201913426RA (en) |
WO (1) | WO2019216949A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110945831B (en) * | 2018-05-08 | 2021-04-27 | 维萨国际服务协会 | Generation of anti-Sybil attack identities |
JP2022538697A (en) * | 2019-03-20 | 2022-09-05 | デフィニティ スティフトゥング | Distributed network with blind identities |
US11095443B1 (en) * | 2019-10-11 | 2021-08-17 | Shape Security, Inc. | Proof-of-work based on runtime compilation |
US20210144002A1 (en) * | 2019-10-11 | 2021-05-13 | Atakama LLC | Secondary Channel Authentication of Public Keys |
CN111818058B (en) * | 2020-07-09 | 2022-06-21 | 武汉量子风暴信息科技有限公司 | Network hopping controller-oriented safety protection method, system and related equipment |
JP2022158677A (en) * | 2021-04-02 | 2022-10-17 | 株式会社野村総合研究所 | Device and system for zero-knowledge proof to be performed by multi-party computation |
WO2023011702A1 (en) * | 2021-08-03 | 2023-02-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Establishment of forward secrecy during digest authentication |
Family Cites Families (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101193103B (en) * | 2006-11-24 | 2010-08-25 | 华为技术有限公司 | A method and system for allocating and validating identity identifier |
US9055082B2 (en) * | 2010-08-25 | 2015-06-09 | Alcatel Lucent | Peer to peer localization for content in a distributed hash table |
US8583958B2 (en) * | 2010-11-15 | 2013-11-12 | Microsoft Corporation | Systems and methods of providing fast leader elections in distributed systems of simple topologies |
US9906552B1 (en) * | 2013-02-13 | 2018-02-27 | Amazon Technologies, Inc. | Managing system load |
US9501363B1 (en) * | 2013-03-15 | 2016-11-22 | Nuodb, Inc. | Distributed database management system with node failure detection |
US9646149B2 (en) * | 2014-05-06 | 2017-05-09 | Microsoft Technology Licensing, Llc | Accelerated application authentication and content delivery |
US9609517B2 (en) * | 2014-12-19 | 2017-03-28 | Intel Corporation | Cooperative security in wireless sensor networks |
US9436923B1 (en) * | 2015-02-26 | 2016-09-06 | Skuchain, Inc. | Tracking unitization occurring in a supply chain |
EP3955181A1 (en) * | 2015-04-20 | 2022-02-16 | OGY Docs Inc. | A method of distributed management of electronic documents of title (edt) and system thereof |
US20160379212A1 (en) * | 2015-06-26 | 2016-12-29 | Intel Corporation | System, apparatus and method for performing cryptographic operations in a trusted execution environment |
EP3125489B1 (en) * | 2015-07-31 | 2017-08-09 | BRITISH TELECOMMUNICATIONS public limited company | Mitigating blockchain attack |
US20170236123A1 (en) * | 2016-02-16 | 2017-08-17 | Blockstack Inc. | Decentralized processing of global naming systems |
US10164952B2 (en) * | 2016-02-16 | 2018-12-25 | Xerox Corporation | Method and system for server based secure auditing for revisioning of electronic document files |
US10462138B2 (en) * | 2016-02-19 | 2019-10-29 | Google Llc | Application programming interface access controls |
WO2017175073A1 (en) * | 2016-04-05 | 2017-10-12 | Vchain Technology Limited | Method and system for managing personal information within independent computer systems and digital networks |
EP3896638A1 (en) | 2016-05-04 | 2021-10-20 | Algorand Inc. | Distributed transaction propagation and verification system |
US10235516B2 (en) * | 2016-05-10 | 2019-03-19 | Cisco Technology, Inc. | Method for authenticating a networked endpoint using a physical (power) challenge |
CN106060036B (en) * | 2016-05-26 | 2019-07-16 | 布比(北京)网络技术有限公司 | Decentralization common recognition method and device |
JP6663809B2 (en) * | 2016-07-07 | 2020-03-13 | 株式会社日立製作所 | Audit device, anonymous remittance method with audit function and program |
US10460118B2 (en) | 2016-08-30 | 2019-10-29 | Workday, Inc. | Secure storage audit verification system |
WO2018065395A1 (en) | 2016-10-03 | 2018-04-12 | Xsb Europe Limited | A decentralised database |
US11663609B2 (en) * | 2016-10-04 | 2023-05-30 | International Business Machines Corporation | Method and apparatus to enforce smart contract execution hierarchy on blockchain |
US20180123779A1 (en) | 2016-11-01 | 2018-05-03 | Jiangang Zhang | Flexible Blockchain Smart-Contract Deployment |
US10540652B2 (en) * | 2016-11-18 | 2020-01-21 | Intel Corporation | Technology for secure partitioning and updating of a distributed digital ledger |
US10296764B1 (en) * | 2016-11-18 | 2019-05-21 | Amazon Technologies, Inc. | Verifiable cryptographically secured ledgers for human resource systems |
US10862959B2 (en) * | 2016-11-28 | 2020-12-08 | Keir Finlow-Bates | Consensus system and method for adding data to a blockchain |
US10611474B2 (en) * | 2017-03-20 | 2020-04-07 | International Business Machines Corporation | Unmanned aerial vehicle data management |
US10740733B2 (en) * | 2017-05-25 | 2020-08-11 | Oracle International Corporaton | Sharded permissioned distributed ledgers |
US10891384B2 (en) * | 2017-10-19 | 2021-01-12 | Koninklijke Kpn N.V. | Blockchain transaction device and method |
WO2019147295A1 (en) * | 2018-01-29 | 2019-08-01 | Ubiquicorp Limited | Proof of majority block consensus method for generating and uploading a block to a blockchain |
US11218324B2 (en) * | 2018-04-05 | 2022-01-04 | Ares Technologies, Inc. | Systems and methods authenticating a digitally signed assertion using verified evaluators |
CN110945831B (en) * | 2018-05-08 | 2021-04-27 | 维萨国际服务协会 | Generation of anti-Sybil attack identities |
US11444769B2 (en) * | 2018-07-02 | 2022-09-13 | Ares Technologies, Inc. | Systems, devices, and methods for signal localization and verification of sensor data |
US10715471B2 (en) * | 2018-08-22 | 2020-07-14 | Synchronoss Technologies, Inc. | System and method for proof-of-work based on hash mining for reducing spam attacks |
AU2018348318B2 (en) * | 2018-11-07 | 2020-05-21 | Advanced New Technologies Co., Ltd. | Blockchain system supporting public and private transactions under account models |
KR102348768B1 (en) * | 2018-11-07 | 2022-01-06 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | Blockchain Data Protection Using Homomorphic Encryption |
MX2019004656A (en) * | 2018-11-07 | 2019-08-12 | Alibaba Group Holding Ltd | Blockchain data protection using homomorphic encryption. |
JP6811334B2 (en) * | 2018-12-21 | 2021-01-13 | アドバンスド ニュー テクノロジーズ カンパニー リミテッド | Blockchain data protection based on generic account model and homomorphic encryption |
KR102193551B1 (en) * | 2018-12-21 | 2020-12-23 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | Blockchain data protection based on generic account model and quasi-homogeneous encryption |
US11328050B2 (en) * | 2019-03-04 | 2022-05-10 | Microsoft Technology Licensing, Llc | Measured execution of trusted agents in a resource constrained environment with proof of work |
US10936723B2 (en) * | 2019-03-27 | 2021-03-02 | Intel Corporation | Fast and secure protocol to bootstrap a blockchain by restoring the blockchain state using trusted execution environment |
-
2018
- 2018-10-09 CN CN201880048468.4A patent/CN110945831B/en active Active
- 2018-10-09 CN CN202110356155.9A patent/CN112929181B/en active Active
- 2018-10-09 SG SG11201913426RA patent/SG11201913426RA/en unknown
- 2018-10-09 WO PCT/US2018/055033 patent/WO2019216949A1/en unknown
- 2018-10-09 EP EP18917847.8A patent/EP3628113B1/en active Active
- 2018-10-09 AU AU2018422776A patent/AU2018422776B2/en active Active
- 2018-10-09 US US16/625,221 patent/US11102015B2/en active Active
-
2021
- 2021-07-19 US US17/379,184 patent/US11641286B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20210051031A1 (en) | 2021-02-18 |
US11641286B2 (en) | 2023-05-02 |
US20210351941A1 (en) | 2021-11-11 |
WO2019216949A1 (en) | 2019-11-14 |
EP3628113A1 (en) | 2020-04-01 |
EP3628113A4 (en) | 2020-06-10 |
CN112929181A (en) | 2021-06-08 |
AU2018422776A1 (en) | 2020-01-16 |
CN110945831A (en) | 2020-03-31 |
CN112929181B (en) | 2024-01-02 |
CN110945831B (en) | 2021-04-27 |
AU2018422776B2 (en) | 2024-03-28 |
EP3628113B1 (en) | 2023-08-23 |
US11102015B2 (en) | 2021-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZAA201801341S (en) | Case | |
GB201916874D0 (en) | . | |
ZAA201801145S (en) | Case | |
SG11201913426RA (en) | Sybil-resistant identity generation | |
EP3684343C0 (en) | Improved supraparticles | |
IL272526A (en) | Improved endoinulinases | |
GB201806174D0 (en) | Improved downlighter | |
GB201809888D0 (en) | Token generation | |
GB201700649D0 (en) | Improved authentication | |
PT3724495T (en) | Generator | |
GB201815593D0 (en) | Feature(s) generation | |
GB201916765D0 (en) | . | |
FI3577335T3 (en) | Arrangement | |
GB201701645D0 (en) | Identity verification | |
GB201707210D0 (en) | Improved hitchlock | |
GB201814174D0 (en) | Generator | |
GB2572624B (en) | Descriptor generation | |
PL3616997T3 (en) | Arrangement | |
GB201813574D0 (en) | A1 | |
GB201819369D0 (en) | Maglee plane | |
GB201815211D0 (en) | Not known | |
GB201804350D0 (en) | Omega generator | |
GB201705036D0 (en) | Generator | |
GB201716636D0 (en) | An improved swimfin | |
GB201718702D0 (en) | Hydroelectric generating system |