ELEMENT REPLICATION DEVICE, ELEMENT REPLICATION METHOD, AND PROGRAM

    公开(公告)号:EP3096308A4

    公开(公告)日:2018-01-10

    申请号:EP14878779

    申请日:2014-11-28

    IPC分类号: G09C1/00

    CPC分类号: H04L9/00

    摘要: A second set including a plurality of elements a 5 (1), ..., a 5 (N) or a concealed text of the second set is obtained, where the second set is obtained by setting a replication source element a(f(h)) included in a first set to an element a(f(h))-a(f(h-1)) and setting elements other than the replication source in the first set to zero with respect to h=2, ..., M. An additive inverse of a replication source element a(f(h-1)) of which the order is before the replication source element a(f(h)) and is the closest to the replication source element a(f(h)) is -a(f(h-1)). The second set or the concealed text of the second set is used to obtain a third set or a concealed text of the third set. The third set is a set including a first element b(1)=a 5 (1) and i=2, ..., Nth element b(i)=b(i-1)+a 5 (i).

    NON-DECREASING SEQUENCE DETERMINING DEVICE, NON-DECREASING SEQUENCE DETERMINING METHOD, AND PROGRAM

    公开(公告)号:EP3206201A4

    公开(公告)日:2018-06-06

    申请号:EP15849344

    申请日:2015-10-05

    IPC分类号: G09C1/00 G06F9/44 H04L9/28

    摘要: Determination as to whether a nondecreasing sequence exists or not is efficiently made. A sorting part 10 sorts elements of a set P i in ascending order to generate vectors t i,i+1 and b i,i+1 . A merging part 20 generates vectors t 0,m and b 0,m by repeating the process of merging vectors (t i,j , b i,j ) and (t j,k , b j,k ) to generate (t i,k , b i,k ). A stable-sorting part 21 generates a vector e by coupling and stably sorting vectors b i,j and t j,k . A searching part 22 searches for sets of (», x, y) in which e[»] is b i,j [x] and e[» + 1] is t j,k [y] and generates a set X including all x and a set Y including all y. An extracting part 23 sorts t i,j [x] (x ˆˆ X) in ascending order to generate a vector t i,k and sorts b j,k [y] (y ˆˆ Y) in ascending order to generate a vector b j,k . If the length of a vector t 0,m is 0, a determining part 30 outputs a result of determination that indicates the absence of a nondecreasing sequence.

    PARTIAL CHARACTER STRING POSITION DETECTION DEVICE, PARTIAL CHARACTER STRING POSITION DETECTION METHOD, AND PROGRAM

    公开(公告)号:EP3206200A4

    公开(公告)日:2018-06-06

    申请号:EP15848972

    申请日:2015-10-05

    IPC分类号: G09C1/00

    摘要: The positions in a text in which partial character strings in a pattern appear are efficiently detected. A partial-character-string position detecting device 1 takes inputs of a secret text [t] of a text t, a secrete text of a pattern p, a secret text of a vector c, and a secret text of a matrix E and outputs a secret text of a matrix H. A first matrix generating part 20 generates a secret text of a matrix F, in which F[i][j] = E[i][j + i mod n + 1] (where it is assumed that E[i][n] = ¬c[i]). A second matrix generating part 30 generates a secret text of a matrix F', in which F[i][j] = 1 is set if c[i] = 0 or if c[i] = 1 and F[k][j] = 1 for every k that is successively c[k] = 1, otherwise F[i][j] = 0 is set, where k = i, ..., n - 1. A third matrix generating part 40 computes = ˆ§ ˆ§ ¬c[i - 1]> to generate the secrete text .

    SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM, RANDOM SUBSTITUTION DEVICE, AND PROGRAM
    6.
    发明公开
    SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM, RANDOM SUBSTITUTION DEVICE, AND PROGRAM 审中-公开
    SICHERES BERECHNUNGSVERFAHREN,SICHERES BERECHNUNGSSYSTEM,STATISTISCHE SUBSTITUTIONSVORRICHTUNG UND PROGRAMM

    公开(公告)号:EP3096310A4

    公开(公告)日:2017-09-27

    申请号:EP15737344

    申请日:2015-01-07

    IPC分类号: G09C1/00 G06F21/60

    摘要: Secret calculation including secret random permutation is performed at high speed. In unit permutation step 12, random permutation devices p 0 , ..., p k-1 perform permutation of additive secret sharing values «a» Ái of a plain text a with sub shares À Ái of permutation data À. In resharing step S 14, the random permutation device p 0 generates additive secret sharing values «a» Ái+1 pk by using random numbers r 1 , ..., r k-1 which are respectively shared with random permutation devices p j (j=1,...,k-1) so as to transmit the additive secret sharing values «a» Ái+1 pk to the random permutation device p k and each of the random permutation devices p j generates additive secret sharing values «a» Ái+1 pj by using random numbers r j .

    摘要翻译: 包含秘密随机置换的秘密计算高速进行。 在单位置换步骤12中,随机置换设备p 0,...,p k-1执行纯文本a的加法秘密共享值“a”∧i与置换数据的子份额Λi的置换。 在再次复制步骤S14中,随机置换设备p 0通过使用分别与随机置换设备pj(j(j))共享的随机数r 1,...,r k-1来生成加法秘密共享值a ai + 1 pk = 1,...,k-1),以便将加法秘密共享值«a»ai + 1 pk发送到随机置换装置pk,并且每个随机置换装置pj产生加法秘密共享值«a»Ái +1 pj通过使用随机数rj。

    MISMATCH DETECTION METHOD, MISMATCH DETECTION SYSTEM, MISMATCH DETECTION DEVICE AND PROGRAM THEREFOR

    公开(公告)号:EP3261082A4

    公开(公告)日:2018-07-25

    申请号:EP16746580

    申请日:2016-02-01

    IPC分类号: G09C1/00 G06F21/64 H04L9/08

    CPC分类号: G09C1/00 G06F21/64 H04L9/085

    摘要: An inconsistency in shares is detected with a small volume of communications traffic. n inconsistency detecting devices generate random numbers s i and make the random numbers s i public. The n inconsistency detecting devices generate a common random number s which is the sum total of the random numbers s 0 , ..., s n-1 . The n inconsistency detecting devices calculate shares [c] i . The n inconsistency detecting devices generate shares [r] i , each of which would become a random number r by reconstruction. The n inconsistency detecting devices calculate shares [d] i , each of which would become a judgment value d by reconstruction. One inconsistency detecting device receives shares [d] 1 , ..., [d] n-1 from n-1 inconsistency detecting devices. The one inconsistency detecting device restores n-k shares [d]' k , ..., [d]' n-1 from k shares [d] 0 , ..., [d] k-1 . The one inconsistency detecting device judges, for j = k, ..., n-1, whether or not a share [d] j and a share [d]' j coincide with each other.

    MULTI-PARTY SECURE AUTHENTICATION SYSTEM, AUTHENTICATION SERVER, INTERMEDIATE SERVER, MULTI-PARTY SECURE AUTHENTICATION METHOD, AND PROGRAM
    9.
    发明公开
    MULTI-PARTY SECURE AUTHENTICATION SYSTEM, AUTHENTICATION SERVER, INTERMEDIATE SERVER, MULTI-PARTY SECURE AUTHENTICATION METHOD, AND PROGRAM 有权
    外管局多个用户的认证系统,认证服务器,服务器之间,外管局多个用户认证方法和程序

    公开(公告)号:EP3021518A4

    公开(公告)日:2017-03-15

    申请号:EP14838104

    申请日:2014-08-21

    摘要: Even when an intermediate server exists, a plurality of servers simultaneously authenticates a user securely. A user apparatus 1 disperses a password w'. The user apparatus 1 obtains a ciphertext Enc US_i ([w'] i ), which is obtained by encrypting a dispersed value [w'] i . The intermediate server 2 transmits the ciphertext Enc US_i ([w'] i ) to an authentication server 3. The authentication server 3 decrypts the ciphertext Enc US_i ([w'] i ) to obtain the dispersed value [w'] i . The authentication server 3 determines a verification value q a_i (W) . The authentication server 3 obtains a ciphertext Enc WS_a_i (q a_i (W) ). The intermediate server 2 decrypts the ciphertext Enc WS_a_i (q a_i (W) ) to obtain the verification value q a_i (W) . The intermediate server 2 verifies whether a sum total of the verification values is equal to 0 or not. The authentication server 3 determines a verification value q a_i (a_j) . The authentication server 3 obtains a ciphertext Enc S_a_iS_a_j (q a_i (a_j) ). The authentication server 3 decrypts the ciphertext Enc S_a_iS_a_j (q a_j (a_i) ) to obtain the verification value q a_i (a-j) . The authentication server 3 verifies whether a sum total of the verification values is equal to 0 or not.

    TAMPERING DETECTION DEVICE, TAMPERING DETECTION METHOD, AND PROGRAM
    10.
    发明公开
    TAMPERING DETECTION DEVICE, TAMPERING DETECTION METHOD, AND PROGRAM 有权
    伪造检测装置,伪造物检测方法及程序

    公开(公告)号:EP2947814A4

    公开(公告)日:2016-11-09

    申请号:EP14740216

    申请日:2014-01-16

    IPC分类号: H04L9/32 H04L9/06

    摘要: The present invention can be efficiently applied to secure computation and can achieve a low probability of successful tampering. A tampering detection device includes a parameter storage storing a parameter ± ijk (i = 0, ..., q-1; j = 0, ..., q-1; and k = 0, ..., q-1) for uniformly mapping from a ring R to a ring R q , a division part 12 dividing N values a 0 , ..., a N-1 into sets of q values, starting from the first value, to generate value vectors A 0 , ..., A Á-1 , a generation part 14 generating a checksum c including addition and multiplication, where vector multiplication is a function f defined by the formula given below, and a verification part comparing a verification value generated by using the value vectors A 0 , ..., A Á-1 and vector multiplication which is the function f defined by the formula given below with the checksum c to determine whether or not any of the values a 0 , ..., a N-1 has been tampered with,. Here, N and q are integers greater than or equal to 2 and p is a minimum integer greater than or equal to N/q.