International Business Machines Corporation
PRESERVING PRIVACY OF LINKED CROSS-NETWORK TRANSACTIONS

Last updated:

Abstract:

An example operation may include one or more of storing a first hashed timelock request in a first storage structure, where the first hashed timelock request is hashed based on a first secret, generating a second secret based on the first secret and a public key of a client, hashing the second secret to generate a hashed second secret, and transmitting a request for a second hashed timelock request to the client, where the request comprises the generated hashed second secret.

Status:
Application
Type:

Utility

Filling date:

20 Jan 2020

Issue date:

22 Jul 2021