摘要:
Processing is appropriately executed on data stored in a cloud service. An information processing device (10) detects a first data operation for a cloud service (31) executed by an information processing system (30) and notifies an information processing device (20) of content of the first data operation. The information processing device (20) determines first processing on data (D1) that is a target of the first data operation based on the notified content of the first data operation and instructs the information processing device (20) to execute the first processing. When instructed to execute the first processing, the information processing device (10) executes the first processing on the data (D1).
摘要:
To enable a workflow to be easily used. A storage unit (11) stores data of an input document. When the data of the document is input, a processing unit (12) adds first information to the data of the document The first information indicates a plurality of areas, in the document, that accepts input of signatures by a plurality of users according to an attribute of the document, and is used for processing of specifying an order of requestee users of a procedure involving the signatures in the workflow regarding the document. The processing unit (12) outputs the data of the document to which the first information has been added.
摘要:
An information processing device (100) includes a storage unit (110) that stores signature pattern information (111) that represents a feature of one or a plurality of signatures regarding a document acquired in the past in association with a transmission source of the document. The information processing device (100) acquires a transmission source of a target document (101) and first signature pattern information (102) that represents a feature of one or a plurality of signatures regarding the target document (101), from a reception side of the target document (101). The information processing device (100) extracts second signature pattern information (103) associated with the transmission source of the target document (101), from the storage unit (110). The information processing device (100) verifies reliability of the target document (101) based on a result of comparing the acquired first signature pattern information (102) and the extracted second signature pattern information (103).
摘要:
A cryptographic processing device includes a private key storage unit which stores a private key d for elliptic curve cryptography, a random number generation unit which generates a b-bit random value s, and a processing unit. A bit string D is the private key d or a bit string obtained by modifying the private key d in such a way that a value of a most significant bit is 0, and a relation u=mk+b holds true for a length u of the bit string D, a window size k, and a positive integer m. The processing unit determines a signed k-bit window value w [i] corresponding to each i where 0≤i≤(m-1), a signed b-bit random value s[i] corresponding to each i, and a correction value g. The processing unit determines the above values under a constraint condition in which D = g + ∑ i = 0 m - 1 2 ki + b w i + 2 ki s i holds true, while determining each random value s[i] to be +s or -s.
摘要翻译:密码处理装置包括存储用于椭圆曲线密码术的专用密钥d的私钥存储单元,生成b位随机值s的随机数生成单元和处理单元。 位串D是通过以最高有效位的值为0的方式修改私钥d而获得的私有密钥d或位串,并且关系u = mk + b对于长度u为 位串D,窗口大小k和正整数m。 处理单元确定对应于每个i的带符号的k位窗口值w [i],其中0‰¤‰¤(m-1),对应于每个i的带符号b位随机值s [i]和 校正值g。 在确定每个随机值s [i]的约束条件下,处理单元确定上述值,其中D = g +'i = 0 m - 1 2 ki + b ¢wi + 2 ki ¢si成立, 为+ s或-s。
摘要:
An encrypting apparatus includes a digest part using a SHA-2 algorithm of which a basic unit of operation is 32*Y (Y=1 or 2) bits. The digest part includes a shift register including a series of registers, and a predetermined number of adders performing an addition operation based on data stored in the shift register. The shift register includes a (32*Y)/X-bit register, where X=2 k (k is an integer such that 1≤k≤4 when Y=1 and 1≤k≤5 when Y=2). Each of the adders has a data width of (32*Y)/X bits and performs the addition operation in each cycle in which the data stored in the shift register is shifted between the registers with the data width of (32*Y)/X bits.
摘要:
When processing a data conversion function of a MISTY structure, such as the FO function of MISTY1, the logical calculation result t3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage and a logical calculation result t1 of an exclusive OR 612 of the MISTY structure in the first stage is not stored in a register. The logical calculation result t3 and the logical calculation result of respective exclusive OR 642 and 643 are subject to a direct exclusive OR with the respective exclusive OR 642 and 643.
摘要:
Since distributed IDs do not have a control tower like a CA compared to centralized IDs, when a public key is compromised, the problematic public key remains in a repository for a long time, creating a risk of spoofing occurring in secure communication using the key. An information processing device executes processing of: detecting a risk to a first public key managed by a public key repository; performing update restriction of the first public key in response to the detection of the risk; authenticating an authenticator associated with the first public key; and releasing, in a case where the authentication of the authenticator succeeds, the update restriction. With this configuration, in one aspect, it is possible to suppress key update by a third party.
摘要:
In a MISTY1 FI function, an exclusive OR 102 to which a round key KIij2 is inputted is arranged between an exclusive OR 101 arranged on a 9-bit critical path 100a in a first MISTY structure and a zero-extend conversion 120U connected to the branching point 301 of a 7-bit right system data path 110a. Then, a 9-bit round key KIij1 is truncate-converted to seven bits, the exclusive OR of the seven bits and the round key KIij1 is calculated by an exclusive OR 113 and the calculation result is inputted to an exclusive OR 112 arranged on the right system data path 110a in the second stage MISTY structure.
摘要:
A verification system according to an aspect includes: a server configured to generate a hash value according to a first algorithm by using a public key associated with a user and a first message; and a terminal including a generation unit configured to generate a collision generation value by a second algorithm based on the first message, a second message, and a private key that is paired with the public key so that the hash value is generated in a case where the collision generation value is input to the first algorithm together with the public key and the second message, and a transmission unit configured to transmit the collision generation value and the second message to another terminal that is to be guaranteed that the second message has been provided by the user.