SG11201913426RA - Sybil-resistant identity generation - Google Patents

Sybil-resistant identity generation

Info

Publication number
SG11201913426RA
SG11201913426RA SG11201913426RA SG11201913426RA SG11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA SG 11201913426R A SG11201913426R A SG 11201913426RA
Authority
SG
Singapore
Prior art keywords
sybil
identity generation
resistant identity
resistant
generation
Prior art date
Application number
SG11201913426RA
Inventor
Mahdi Zamani
Abhinav Aggarwal
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG11201913426RA publication Critical patent/SG11201913426RA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Small-Scale Networks (AREA)
  • Computer And Data Communications (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Hardware Redundancy (AREA)
SG11201913426RA 2018-05-08 2018-10-09 Sybil-resistant identity generation SG11201913426RA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862668633P 2018-05-08 2018-05-08
PCT/US2018/055033 WO2019216949A1 (en) 2018-05-08 2018-10-09 Sybil-resistant identity generation

Publications (1)

Publication Number Publication Date
SG11201913426RA true SG11201913426RA (en) 2020-01-30

Family

ID=68468390

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201913426RA SG11201913426RA (en) 2018-05-08 2018-10-09 Sybil-resistant identity generation

Country Status (6)

Country Link
US (2) US11102015B2 (en)
EP (1) EP3628113B1 (en)
CN (2) CN110945831B (en)
AU (1) AU2018422776B2 (en)
SG (1) SG11201913426RA (en)
WO (1) WO2019216949A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110945831B (en) * 2018-05-08 2021-04-27 维萨国际服务协会 Generation of anti-Sybil attack identities
JP2022538697A (en) * 2019-03-20 2022-09-05 デフィニティ スティフトゥング Distributed network with blind identities
US11095443B1 (en) * 2019-10-11 2021-08-17 Shape Security, Inc. Proof-of-work based on runtime compilation
US20210144002A1 (en) * 2019-10-11 2021-05-13 Atakama LLC Secondary Channel Authentication of Public Keys
CN111818058B (en) * 2020-07-09 2022-06-21 武汉量子风暴信息科技有限公司 Network hopping controller-oriented safety protection method, system and related equipment
JP2022158677A (en) * 2021-04-02 2022-10-17 株式会社野村総合研究所 Device and system for zero-knowledge proof to be performed by multi-party computation
WO2023011702A1 (en) * 2021-08-03 2023-02-09 Telefonaktiebolaget Lm Ericsson (Publ) Establishment of forward secrecy during digest authentication

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193103B (en) * 2006-11-24 2010-08-25 华为技术有限公司 A method and system for allocating and validating identity identifier
US9055082B2 (en) * 2010-08-25 2015-06-09 Alcatel Lucent Peer to peer localization for content in a distributed hash table
US8583958B2 (en) * 2010-11-15 2013-11-12 Microsoft Corporation Systems and methods of providing fast leader elections in distributed systems of simple topologies
US9906552B1 (en) * 2013-02-13 2018-02-27 Amazon Technologies, Inc. Managing system load
US9501363B1 (en) * 2013-03-15 2016-11-22 Nuodb, Inc. Distributed database management system with node failure detection
US9646149B2 (en) * 2014-05-06 2017-05-09 Microsoft Technology Licensing, Llc Accelerated application authentication and content delivery
US9609517B2 (en) * 2014-12-19 2017-03-28 Intel Corporation Cooperative security in wireless sensor networks
US9436923B1 (en) * 2015-02-26 2016-09-06 Skuchain, Inc. Tracking unitization occurring in a supply chain
EP3955181A1 (en) * 2015-04-20 2022-02-16 OGY Docs Inc. A method of distributed management of electronic documents of title (edt) and system thereof
US20160379212A1 (en) * 2015-06-26 2016-12-29 Intel Corporation System, apparatus and method for performing cryptographic operations in a trusted execution environment
EP3125489B1 (en) * 2015-07-31 2017-08-09 BRITISH TELECOMMUNICATIONS public limited company Mitigating blockchain attack
US20170236123A1 (en) * 2016-02-16 2017-08-17 Blockstack Inc. Decentralized processing of global naming systems
US10164952B2 (en) * 2016-02-16 2018-12-25 Xerox Corporation Method and system for server based secure auditing for revisioning of electronic document files
US10462138B2 (en) * 2016-02-19 2019-10-29 Google Llc Application programming interface access controls
WO2017175073A1 (en) * 2016-04-05 2017-10-12 Vchain Technology Limited Method and system for managing personal information within independent computer systems and digital networks
EP3896638A1 (en) 2016-05-04 2021-10-20 Algorand Inc. Distributed transaction propagation and verification system
US10235516B2 (en) * 2016-05-10 2019-03-19 Cisco Technology, Inc. Method for authenticating a networked endpoint using a physical (power) challenge
CN106060036B (en) * 2016-05-26 2019-07-16 布比(北京)网络技术有限公司 Decentralization common recognition method and device
JP6663809B2 (en) * 2016-07-07 2020-03-13 株式会社日立製作所 Audit device, anonymous remittance method with audit function and program
US10460118B2 (en) 2016-08-30 2019-10-29 Workday, Inc. Secure storage audit verification system
WO2018065395A1 (en) 2016-10-03 2018-04-12 Xsb Europe Limited A decentralised database
US11663609B2 (en) * 2016-10-04 2023-05-30 International Business Machines Corporation Method and apparatus to enforce smart contract execution hierarchy on blockchain
US20180123779A1 (en) 2016-11-01 2018-05-03 Jiangang Zhang Flexible Blockchain Smart-Contract Deployment
US10540652B2 (en) * 2016-11-18 2020-01-21 Intel Corporation Technology for secure partitioning and updating of a distributed digital ledger
US10296764B1 (en) * 2016-11-18 2019-05-21 Amazon Technologies, Inc. Verifiable cryptographically secured ledgers for human resource systems
US10862959B2 (en) * 2016-11-28 2020-12-08 Keir Finlow-Bates Consensus system and method for adding data to a blockchain
US10611474B2 (en) * 2017-03-20 2020-04-07 International Business Machines Corporation Unmanned aerial vehicle data management
US10740733B2 (en) * 2017-05-25 2020-08-11 Oracle International Corporaton Sharded permissioned distributed ledgers
US10891384B2 (en) * 2017-10-19 2021-01-12 Koninklijke Kpn N.V. Blockchain transaction device and method
WO2019147295A1 (en) * 2018-01-29 2019-08-01 Ubiquicorp Limited Proof of majority block consensus method for generating and uploading a block to a blockchain
US11218324B2 (en) * 2018-04-05 2022-01-04 Ares Technologies, Inc. Systems and methods authenticating a digitally signed assertion using verified evaluators
CN110945831B (en) * 2018-05-08 2021-04-27 维萨国际服务协会 Generation of anti-Sybil attack identities
US11444769B2 (en) * 2018-07-02 2022-09-13 Ares Technologies, Inc. Systems, devices, and methods for signal localization and verification of sensor data
US10715471B2 (en) * 2018-08-22 2020-07-14 Synchronoss Technologies, Inc. System and method for proof-of-work based on hash mining for reducing spam attacks
AU2018348318B2 (en) * 2018-11-07 2020-05-21 Advanced New Technologies Co., Ltd. Blockchain system supporting public and private transactions under account models
KR102348768B1 (en) * 2018-11-07 2022-01-06 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. Blockchain Data Protection Using Homomorphic Encryption
MX2019004656A (en) * 2018-11-07 2019-08-12 Alibaba Group Holding Ltd Blockchain data protection using homomorphic encryption.
JP6811334B2 (en) * 2018-12-21 2021-01-13 アドバンスド ニュー テクノロジーズ カンパニー リミテッド Blockchain data protection based on generic account model and homomorphic encryption
KR102193551B1 (en) * 2018-12-21 2020-12-23 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. Blockchain data protection based on generic account model and quasi-homogeneous encryption
US11328050B2 (en) * 2019-03-04 2022-05-10 Microsoft Technology Licensing, Llc Measured execution of trusted agents in a resource constrained environment with proof of work
US10936723B2 (en) * 2019-03-27 2021-03-02 Intel Corporation Fast and secure protocol to bootstrap a blockchain by restoring the blockchain state using trusted execution environment

Also Published As

Publication number Publication date
US20210051031A1 (en) 2021-02-18
US11641286B2 (en) 2023-05-02
US20210351941A1 (en) 2021-11-11
WO2019216949A1 (en) 2019-11-14
EP3628113A1 (en) 2020-04-01
EP3628113A4 (en) 2020-06-10
CN112929181A (en) 2021-06-08
AU2018422776A1 (en) 2020-01-16
CN110945831A (en) 2020-03-31
CN112929181B (en) 2024-01-02
CN110945831B (en) 2021-04-27
AU2018422776B2 (en) 2024-03-28
EP3628113B1 (en) 2023-08-23
US11102015B2 (en) 2021-08-24

Similar Documents

Publication Publication Date Title
ZAA201801341S (en) Case
GB201916874D0 (en) .
ZAA201801145S (en) Case
SG11201913426RA (en) Sybil-resistant identity generation
EP3684343C0 (en) Improved supraparticles
IL272526A (en) Improved endoinulinases
GB201806174D0 (en) Improved downlighter
GB201809888D0 (en) Token generation
GB201700649D0 (en) Improved authentication
PT3724495T (en) Generator
GB201815593D0 (en) Feature(s) generation
GB201916765D0 (en) .
FI3577335T3 (en) Arrangement
GB201701645D0 (en) Identity verification
GB201707210D0 (en) Improved hitchlock
GB201814174D0 (en) Generator
GB2572624B (en) Descriptor generation
PL3616997T3 (en) Arrangement
GB201813574D0 (en) A1
GB201819369D0 (en) Maglee plane
GB201815211D0 (en) Not known
GB201804350D0 (en) Omega generator
GB201705036D0 (en) Generator
GB201716636D0 (en) An improved swimfin
GB201718702D0 (en) Hydroelectric generating system