US 12,256,023 B2
Computer implemented method and system for obtaining digitally signed data
Craig Steven Wright, London (GB)
Assigned to NCHAIN LICENSING AG, Zug (CH)
Filed by nChain Licensing AG, Zug (CH)
Filed on Oct. 20, 2023, as Appl. No. 18/382,427.
Application 18/382,427 is a continuation of application No. 16/962,800, granted, now 11,838,426, previously published as PCT/IB2019/050178, filed on Jan. 10, 2019.
Claims priority of application No. 1800706 (GB), filed on Jan. 16, 2018; and application No. PCT/IB2018/050264 (WO), filed on Jan. 16, 2018.
Prior Publication US 2024/0154819 A1, May 9, 2024
Int. Cl. H04L 9/32 (2006.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/3252 (2013.01) [H04L 9/085 (2013.01); H04L 9/3066 (2013.01); H04L 9/3239 (2013.01); H04L 9/50 (2022.05); H04L 2209/16 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of obtaining digitally signed data, the method comprising:
(a) sending first data from at least one of a plurality of first participants to at least one second participant, wherein:
said first data is a blinded version of second data, wherein said second data is accessible to at least one said first participant and inaccessible to said at least one second participant,
said first data is generated by means of a threshold sharing scheme using shares of said first data, and
each share of said first data includes shares of a plurality of first secret values shared among said plurality of said first participants;
(b) receiving, from at least one said second participant, a digital signature of said first data;
(c) processing said digital signature of said first data, by a plurality of said first participants, to provide, using a calculation having said digital signature of said first data as an input, shares of a digital signature of said second data, wherein:
said digital signature of said second data is generated by a threshold sharing scheme using said shares of said digital signature of said second data, and
each share of said digital signature of said second data includes shares of a plurality of said first secret values;
(d) at the plurality of first participants, generating a plurality of updated secret values using the plurality of first secret values; and
(e) repeating steps (a)-(c) using the updated secret values instead of the first secret values.