COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR TRANSFERRING ACCESS TO A DIGITAL ASSET

    公开(公告)号:EP4152683A1

    公开(公告)日:2023-03-22

    申请号:EP22192030.9

    申请日:2019-03-26

    摘要: A method of transferring access to a digital asset is disclosed. The method comprises receiving a first blockchain transaction (4) from a first participant (6) by each of a plurality of second participants (8), (10). The first participant (6) has a first private key of a first private-public key pair of a cryptography system, and each participant (6), (8), (10) has a respective first share of a second private key of a second private-public key pair of the cryptography system, and the first blockchain transaction is signed with the first private key. Signature of the first blockchain transaction with the first private key is verified by each second participant (8), (10). A respective first share is applied to the first blockchain transaction to generate a respective second share of a second blockchain transaction signed with the second private key. Signature with the second private key is possible by means of a first threshold number of second shares and is inaccessible to less than the first threshold number of second shares. The first threshold number of second shares is combined from the first participant (6) and a plurality of the second participants (8), (10) generate the signature.

    ENCRYPTION, DECRYPTION, AND KEY GENERATION APPARATUS AND METHOD INVOLVING DIOPHANTINE EQUATION AND ARTIFICIAL INTELLIGENCE

    公开(公告)号:EP4149047A1

    公开(公告)日:2023-03-15

    申请号:EP22189146.8

    申请日:2022-08-05

    发明人: LIM, Meng Liang

    IPC分类号: H04L9/06 H04L9/30

    摘要: Embodiments of the invention relate to symmetric encryption that converts plain text to Diophantine equations, i.e. cipher text, and creates a symmetric key which is held by a sender (or encryption apparatus) and a recipient (or decryption apparatus). The key is used by the decryption apparatus to decrypt the Diophantine equations, and convert them to original plain text. Particularly, undecidable encryption and artificial intelligence (Al) are employed in combination. More particularly, the AI would exclude any class of Diophantine equations which has been solved or deciphered without key, or known to be solvable. In the event certain classes of Diophantine equations are solved in the future, the Al will exclude the use of these solved or solvable classes of Diophantine equation in encryption.