Abstract:
A distributed re-encryption apparatus comprises: a distributed re-encryption key storage part that stores shares obtained by secret-sharing a re-encryption key that re-encrypts a ciphertext into one encrypted with a different encryption key without decrypting the ciphertext; and a distributed re-encryption part that re-encrypts using the shares of the re-encryption key the ciphertext into one encrypted with a different encryption key without decrypting the ciphertext.
Abstract:
An authentication system transmits a ciphertext of authentication information from an authenticatee apparatus to an authenticator apparatus using homomorphic encryption with a public key encryption scheme, the authenticator apparatus issues a first random number to the authenticatee apparatus, the authenticatee apparatus generates a second random number and transmits to the authenticator apparatus a first element generated with a public key using the first and the second random numbers and a second element generated with a public key using the second random number, and the authenticator apparatus modifies the second element using the first random number to obtain a ciphertext of the authentication information.
Abstract:
In IaaS (Infrastructure as a Service), when it is desirable to delegate the authority to a user outside a system, a recipient of an access token is designated, thereby preventing illegal distribution of the access token. There is provided an access token system including a generator and a verifier. The generator generates, using secret information of a recipient, a recipient-designated access token for which the recipient is designated, and provides the recipient-designated access token to a user. The verifier verifies that the user who makes access using the recipient-designated access token is the designated recipient.
Abstract:
A data extraction system includes a registration apparatus, a data storage apparatus, and a query apparatus. The registration apparatus generates registration data including first information obtained by encrypting secret information, which is information that a user wishes to keep secret, by using a secret key and second information obtained by encrypting the secret key by using at least biological information of the user. The data storage apparatus holds the registration data. The query apparatus acquires the registration data by generating a query for acquiring the registration data from the data storage apparatus, extracts the secret key from the registration data by using biological information of the user, and extracts the secret information from the registration data by using the extracted secret key.
Abstract:
A system includes a first bit string position permutation unit to perform position permutation of an input first bit string; a template generation unit to perform an exclusive OR operation of a bit string resulting from the position permutation of the first bit string and a code word of a binary linear code and generate auxiliary data; a second bit string position permutation unit to perform same position permutation of an input second bit string; and a bit string collation unit to verify that a hamming distance between position permutation result of the second and second bit strings is not more than a predetermined value.
Abstract:
A homomorphic cyclic operation system performs a homomorphic cyclic operation on a periodic array of data using homomorphic encryption having a homomorphic operation defined with respect to at least one multiplication and comprises: an encryption apparatus that encrypts the periodic array of data by storing it in the coefficients of an indeterminate polynomial to generate a ciphertext of periodic data; and a homomorphic cyclic operation apparatus that shifts the periodic array of data in the ciphertext of the periodic data by applying the indeterminate raised to the power of a shift amount to the ciphertext of the periodic data.
Abstract:
A similarity calculation system calculating the similarity between a first vector and a second vector using homomorphic encryption having homomorphic operations defined with respect to at least one multiplication and a plurality of additions obtains the similarity between the first and the second vectors by using the homomorphic operations to calculate the inner product of the first encrypted vector obtained by using a public key for the homomorphic encryption to encrypt a row corresponding to the value of a component of the first vector extracted from a weighted similarity table of the similarity between each component of the first and the second vectors and the second encrypted vector obtained by transforming the value of a component of the second vector into a component in a unit vector that becomes 1 and encrypting the transformed result with the public key for the homomorphic encryption.
Abstract:
An information processing device according the present invention includes: a memory; and at least one processor coupled to the memory. The processor performs operations. The operations includes: transmitting a first identifier and a second identifier, which is different from the first identifier and is included in identifiers transmitted to a data management device that stores data in association with an identifier of the data, to the data management device; and selecting the data related to the first identifier from the data related to the first identifier and the second identifier received from the data management device.
Abstract:
An encrypted information matching device 20 includes: a storage unit 240 in which representative information representing a group based on similarity in a characteristic and encrypted information to be matched belonging to the group are associated with each other and stored; an identification unit 231 which calculates a first similarity between the encrypted input information and the representative information stored in the unit 240, and which, based on the first similarity, identifies a group to be matched with the first input information; and a determination unit 232 which calculates a second similarity between the encrypted input information and the encrypted information to be matched that belongs to the group identified, in a state in which the input information and the information to be matched are encrypted, wherein the unit 232 determines the presence or absence of information to be matched which makes the calculated second similarity satisfy criteria.
Abstract:
An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of matching between a first encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data is divided by segmenting unit and that is registered with a storage device and a second encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data to be matched is divided by segmenting unit, the verification being performed by using a Hamming distance between plaintexts; and a matching determining unit that takes a difference between the first and second encrypted text, and determines whether a Hamming distance between plaintexts that corresponds to the difference between the first and second encrypted text is equal to or less than a predetermined certain value.