| CPC H04L 9/0643 (2013.01) [H04L 9/0618 (2013.01); H04L 9/0656 (2013.01); H04L 9/0819 (2013.01); H04L 9/085 (2013.01); H04L 9/14 (2013.01); H04L 9/30 (2013.01); H04L 9/3213 (2013.01); H04L 9/3239 (2013.01); H04L 9/3297 (2013.01); H04L 9/50 (2022.05)] | 17 Claims |

|
1. A computer-implemented security method, the method comprising the steps of, at a first user:
(i) converting a first secret value accessible to a first user into a first masked secret value based on the first secret value and a shared secret value accessible by both the first user and a second user;
(ii) applying a one-way function to the first masked secret value to create a first veiled secret value;
(iii) communicating the first veiled secret value to the second user;
(iv) receiving a second veiled secret value from the second user, wherein the second veiled secret value is created by applying a one-way function to a second masked secret value, and wherein the second masked secret value is based on a second secret value accessible to the second user and on the shared secret value; and
(v) constructing a first blockchain transaction comprising the first veiled secret value and the second veiled secret value, the first blockchain transaction arranged to be unlockable to transfer control of a first resource upon provision of both the first masked secret value and the second masked secret value to the first transaction, wherein a second blockchain transaction comprising the first veiled secret value and the second veiled secret value is arranged to be unlockable to transfer control of a second resource upon provision of both the first masked secret value and the second masked secret value to the second transaction,
wherein unlocking of the first blockchain transaction causes the first secret value to be revealed to the second user, and unlocking of the second blockchain transaction causes the second secret value to be revealed to the first user.
|