ELEMENT REPLICATION DEVICE, ELEMENT REPLICATION METHOD, AND PROGRAM

    公开(公告)号:EP3096308A4

    公开(公告)日:2018-01-10

    申请号:EP14878779

    申请日:2014-11-28

    IPC分类号: G09C1/00

    CPC分类号: H04L9/00

    摘要: A second set including a plurality of elements a 5 (1), ..., a 5 (N) or a concealed text of the second set is obtained, where the second set is obtained by setting a replication source element a(f(h)) included in a first set to an element a(f(h))-a(f(h-1)) and setting elements other than the replication source in the first set to zero with respect to h=2, ..., M. An additive inverse of a replication source element a(f(h-1)) of which the order is before the replication source element a(f(h)) and is the closest to the replication source element a(f(h)) is -a(f(h-1)). The second set or the concealed text of the second set is used to obtain a third set or a concealed text of the third set. The third set is a set including a first element b(1)=a 5 (1) and i=2, ..., Nth element b(i)=b(i-1)+a 5 (i).

    PARTIAL CHARACTER STRING POSITION DETECTION DEVICE, PARTIAL CHARACTER STRING POSITION DETECTION METHOD, AND PROGRAM

    公开(公告)号:EP3206200A4

    公开(公告)日:2018-06-06

    申请号:EP15848972

    申请日:2015-10-05

    IPC分类号: G09C1/00

    摘要: The positions in a text in which partial character strings in a pattern appear are efficiently detected. A partial-character-string position detecting device 1 takes inputs of a secret text [t] of a text t, a secrete text of a pattern p, a secret text of a vector c, and a secret text of a matrix E and outputs a secret text of a matrix H. A first matrix generating part 20 generates a secret text of a matrix F, in which F[i][j] = E[i][j + i mod n + 1] (where it is assumed that E[i][n] = ¬c[i]). A second matrix generating part 30 generates a secret text of a matrix F', in which F[i][j] = 1 is set if c[i] = 0 or if c[i] = 1 and F[k][j] = 1 for every k that is successively c[k] = 1, otherwise F[i][j] = 0 is set, where k = i, ..., n - 1. A third matrix generating part 40 computes = ˆ§ ˆ§ ¬c[i - 1]> to generate the secrete text .

    SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM, RANDOM SUBSTITUTION DEVICE, AND PROGRAM
    4.
    发明公开
    SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM, RANDOM SUBSTITUTION DEVICE, AND PROGRAM 审中-公开
    SICHERES BERECHNUNGSVERFAHREN,SICHERES BERECHNUNGSSYSTEM,STATISTISCHE SUBSTITUTIONSVORRICHTUNG UND PROGRAMM

    公开(公告)号:EP3096310A4

    公开(公告)日:2017-09-27

    申请号:EP15737344

    申请日:2015-01-07

    IPC分类号: G09C1/00 G06F21/60

    摘要: Secret calculation including secret random permutation is performed at high speed. In unit permutation step 12, random permutation devices p 0 , ..., p k-1 perform permutation of additive secret sharing values «a» Ái of a plain text a with sub shares À Ái of permutation data À. In resharing step S 14, the random permutation device p 0 generates additive secret sharing values «a» Ái+1 pk by using random numbers r 1 , ..., r k-1 which are respectively shared with random permutation devices p j (j=1,...,k-1) so as to transmit the additive secret sharing values «a» Ái+1 pk to the random permutation device p k and each of the random permutation devices p j generates additive secret sharing values «a» Ái+1 pj by using random numbers r j .

    摘要翻译: 包含秘密随机置换的秘密计算高速进行。 在单位置换步骤12中,随机置换设备p 0,...,p k-1执行纯文本a的加法秘密共享值“a”∧i与置换数据的子份额Λi的置换。 在再次复制步骤S14中,随机置换设备p 0通过使用分别与随机置换设备pj(j(j))共享的随机数r 1,...,r k-1来生成加法秘密共享值a ai + 1 pk = 1,...,k-1),以便将加法秘密共享值«a»ai + 1 pk发送到随机置换装置pk,并且每个随机置换装置pj产生加法秘密共享值«a»Ái +1 pj通过使用随机数rj。

    SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM, SORTING DEVICE, AND PROGRAM
    7.
    发明公开
    SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM, SORTING DEVICE, AND PROGRAM 审中-公开
    SICHERES BERECHNUNGSVERFAHREN,SICHERES BERECHNUNGSSYSTEM,SORTIERVORRICHTUNG UND PROGRAMM

    公开(公告)号:EP3096309A4

    公开(公告)日:2017-09-13

    申请号:EP15737156

    申请日:2015-01-07

    IPC分类号: G09C1/00 G06F7/08 G06F21/60

    CPC分类号: G09C1/00 G06F21/60 H04L9/085

    摘要: Secret calculation including secret sorting is performed at high speed. Permutation data generation step S10 generates permutation data and so as to generate permutation data . Random ID column generation step S12 generates a random ID column [r †’ i ] so as to generate a random ID column [r †’ L ]. Secret random permutation step S14 performs secret random permutation of a set composed of a random ID column [r †’ i-1 ], a key column [k †’ i ], and the random ID column [r †’ i ] with the permutation data . Flag creation step S16 sets a flag [f j,h ] by using a key [k j ]=([k j,0 ],...,[k j,L-1 ]). Order table creation step S18 creates an order table [s †’ ] by using the flag [f j,h ]. Sort permutation generation step S20 generates sort permutation ÃÀ -1 L by using the random ID column [r †’ i ], the order table [s †’ ], a post-permutation key column [À i k †’ i ], and a post-permutation random ID column [À i r †’ i ].

    摘要翻译: 包括秘密分类在内的秘密计算高速执行。 置换数据生成步骤S10生成置换数据<-i>和<-i>,以生成置换数据<-L>。 随机ID列产生步骤S12产生随机ID列[r''i]以便产生随机ID列[r''L]。 秘密随机置换步骤S14对由随机ID列[r†'i-1],密钥列[k†'i]和随机ID列[r†'i]组成的集合执行秘密随机置换 置换数据<-i>。 标志创建步骤S16通过使用密钥[k j] =([k j,0],...,[k j,L-1])设置标志[f j,h]。 订单表创建步骤S18通过使用标志[f j,h]来创建订单表[s†']。 排列置换生成步骤S20通过使用随机ID列[r†'i],排序表[s†'],排列后键列[Àik†'i]和排列 后置换随机ID列[Àir†'i]。

    SECRET PARALLEL PROCESSING DEVICE, SECRET PARALLEL PROCESSING METHOD, AND PROGRAM
    8.
    发明公开
    SECRET PARALLEL PROCESSING DEVICE, SECRET PARALLEL PROCESSING METHOD, AND PROGRAM 审中-公开
    VORRICHTUNGFÜRGEHEIME PARALLELVERARBEITUNG,VERFAHRENFÜRGEHEIME PARALLELVERARBEITUNG UND PROGRAMM

    公开(公告)号:EP3057079A4

    公开(公告)日:2017-06-07

    申请号:EP14852876

    申请日:2014-10-03

    IPC分类号: G09C1/00 H04L9/08

    摘要: A secret parallel processing device reducing the communication amount in secret parallel processing is provided. The device includes: a randomization unit that obtains a non-randomized sequence being an input sequence and outputs a randomized sequence obtained by joining the non-randomized sequence and a dummy record sequence formed of a disclosed value and subjecting the joined sequences to random replacement processing and concealed random replacement data obtained by concealing used random replacement data; a calculation unit that obtains the non-randomized sequence, the randomized sequence, and the dummy record sequence, applies a predetermined function to the sequences, and generates an output checksum for each sequence by using calculation procedure data used in the processing of applying the function; and a correctness verification unit that obtains the output checksum for each sequence and the concealed random replacement data, assesses the output checksum for each sequence, and outputs a final test result determining whether the predetermined function has been correctly applied on the non-randomized sequence.

    摘要翻译: 提供了一种秘密的并行处理设备,其在秘密并行处理中减少通信量。 该设备包括:随机化单元,其获得作为输入序列的非随机化序列,并且输出通过连​​接非随机化序列获得的随机化序列和由公开值形成的虚拟记录序列,并且对接合序列进行随机替换处理 以及通过隐藏所使用的随机替换数据而获得的隐藏随机替换数据; 获得非随机化序列,随机化序列和虚拟记录序列的计算单元将预定函数应用于序列,并且通过使用在应用函数的处理中使用的计算过程数据来为每个序列生成输出校验和 ; 以及正确性验证单元,其获得每个序列的输出校验和和隐藏的随机替换数据,对每个序列的输出校验和进行评估,并输出最终测试结果,以确定预定函数是否已经被正确应用于非随机化序列。

    SECURE-COMPUTATION SYSTEM, COMPUTING DEVICE, SECURE-COMPUTATION METHOD, AND PROGRAM
    9.
    发明公开
    SECURE-COMPUTATION SYSTEM, COMPUTING DEVICE, SECURE-COMPUTATION METHOD, AND PROGRAM 有权
    安全的计算机系统,计算机设备,安全的计算机方法和程序

    公开(公告)号:EP2947642A4

    公开(公告)日:2016-11-09

    申请号:EP14740760

    申请日:2014-01-16

    IPC分类号: G09C1/00

    摘要: To perform secret computation under a lower probability of success in falsification than before. Each of at least three arithmetic units 2 1 ,...,2 N comprises: a random number generating part determining a shared value [r] obtained by performing secret sharing of a random number r; a randomization part using a shared value [a 0 ],...,[a M-1 ] obtained by performing secret sharing of a value a 0 ,...,a M-1 and a shared value [r] to generate a randomized shared value ,..., with the shared value [a 0 ],...,[a M-1 ] and a shared value [a 0 r],...,[a M-1 r] as a pair; a secret computation part determining a concealed function value [F([a 0 ],...,[a M-1 ])] by executing a function F including at least one secret operation while including a randomized shared value which is an operation target and an operation result depending on the contents of secret operation into the checksum C:= ,..., ; and a correctness proving part verifying correctness of the function value [F([a 0 ],...,[a M-1 ])] on the basis of a shared value [Ø] obtained by multiplying a sum total of shared values [f i ] included in the checksum C by the shared value [r] and a shared value [È] which is a sum total of shared values [f i r] included in the checksum C.

    SECRET SHARING SYSTEM, DATA DISTRIBUTION DEVICE, DISTRIBUTED DATA CONVERSION DEVICE, SECRET SHARING METHOD, AND PROGRAM
    10.
    发明公开
    SECRET SHARING SYSTEM, DATA DISTRIBUTION DEVICE, DISTRIBUTED DATA CONVERSION DEVICE, SECRET SHARING METHOD, AND PROGRAM 有权
    用于分享秘密的系统,数据分发设备,用于转换分发数据的设备,用于分享秘密和程序的方法

    公开(公告)号:EP2879324A4

    公开(公告)日:2016-05-04

    申请号:EP13813379

    申请日:2013-07-04

    摘要: A secret sharing system transforms shares in computational secret sharing to shares in homomorphic secret sharing. On a data distribution apparatus, a key selecting part selects K'-1 keys s j . A pseudorandom number generation part generates pseudorandom numbers r j from the keys s j . An encryption part generates a ciphertext c from information a by using the pseudorandom numbers r j . A key division part divides each of the keys s j into N shares f g (n) by using an arbitrary sharing scheme S1. A ciphertext division part divides the ciphertext c into N shares f c (n) by using an arbitrary sharing scheme S0. On each of distributed data transform apparatuses, when K shares f sj (i) are input into the distributed data transform apparatuses, the reconstruction part generates a reconstructed value U j by reconstruction of shares f sj (i) by using the secret sharing scheme S1 and, when K shares f c (i) are input into the distributed data transform apparatuses, the reconstruction part generates the reconstructed value U j by reconstruction of shares f c (i) by using the sharing scheme S0. A redivision part divides the reconstructed value U j into N shares f Uj (n) by using a homomorphic secret sharing scheme S2. A transform part generates a share g a (i) of the information a from K' shares f Uj .