Abstract:
When data analysis is made in a server to which data is entrusted according to the technique disclosed in JP 5679018, individual cipher text is required to be decrypted in the server. That is, when basic statistics are computed in the server, a problem occurs that plain text of individual data is disclosed to the server side. The key generator according to the present invention transmits the sum of random numbers which is a key used when individual plaintext data is encrypted to the server as a key for decrypting the sum of ciphertext data, and the server decrypts the sum of ciphertext data using the key.
Abstract:
A first computer, in data registration processing: determines a type of biometric information for encryption with which the data is to be encrypted; acquires the determined type of biometric information for encryption from a user of the first computer; generates, from each piece of the acquired biometric information for encryption, a public key based on a predetermined algorithm; transmits the public key to a second computer; and transmits the data encrypted with the public key to the third computer, the first computer, in data presentation processing: acquires the encrypted data from a third computer; acquires the determined type of biometric information for decryption from the user of the first computer; generates, from each piece of the acquired biometric information for decryption, a private key based on the predetermined algorithm; decrypts the encrypted data with use of the private key; and presents each piece of the decrypted registered data.
Abstract:
A data analysis server holds base-point-added information, wherein the base-point-added information includes a value of an explanatory variable encrypted by first high-performance encryption, a value of a response variable encrypted by a predetermined encryption scheme, and a base point based on frequencies of the value of the explanatory variable in information for learning are associated with one another, wherein the data analysis server: executes decision tree generation processing for generating a decision tree having a leaf node associated with the value of the response variable encrypted by the predetermined encryption scheme, which is included in the base-point-added information; and execute branching rule determine processing in decision tree generation processing without decrypting the value of the explanatory variable and the base point corresponding.
Abstract:
A database management method for controlling, by a computer including a processor, a memory, and a storage device, an in-memory database for storing all tables and indices in the memory and a disk type database for storing a part of a table stored in the storage device in a buffer included in the memory, in which the computer acquires information of the tables and the indices of the in-memory type database, determines the type of reduction operation for reducing an area on the memory used by the indices, executes the type of reduction operation determined for the indices, and adds, to the buffer, an area reduced from the area of the memory used by the indices of the in-memory type database by the reduction operation to expand the buffer of the disk type database.
Abstract:
This auditing equipment includes a processor and a memory. The processor accepts a first transaction including information pertaining to a remittance source, an electronic value, and a cipher text, accepts a second transaction including information pertaining to a remittance destination, the electronic value, and a first preimage value, calculates a first plain text using a prescribed parameter and the first preimage value in the second transaction, calculates a second plain text by decrypting the cipher text in the first transaction, compares the first plain text to the second plain text, and associates the information pertaining to the remittance source in the first transaction with the information pertaining to the remittance destination in the second transaction if the first plain text matches the second plain text.
Abstract:
A system for retrieving an encrypted graph, in which a first computer generates an encrypted graph, and a second computer retrieves the encrypted graph, wherein: the first computer generates a secret key, encrypts a graph that includes a start point, an edge, and an end point to generate an encrypted graph, generates an encryption query, transmits encrypted graph data in which the encrypted graph and the encryption query are correlated for each edge and a searchable encryption matching function to the second computer, generates an encrypted graph retrieval query in which a graph to be retrieved is encrypted by the retrievable cryptogram query function, and transmits the generated retrieval query to the second computer; and the second computer, accepts the received encrypted graph retrieval query and encrypted graph data as inputs, and executes a retrieval process using the searchable encryption matching function.
Abstract:
A computer system includes a plurality of processing nodes constituting a blockchain network and a connection apparatus connecting to the blockchain network. The processing node holds information. The connection apparatus includes a connection processing unit that transmits a transaction to the processing node. The connection processing unit includes an encryption processing unit that generates searchable ciphertext from a keyword based on a probabilistic encryption method. The encryption processing unit generates, from the keyword, the searchable ciphertext to be used as an address indicating a transmission source or a transmission destination of the transaction, and generates the transaction including the searchable ciphertext.
Abstract:
A searchable encryption processing system includes a server including: a communication device to communicate with another device; a storage device configured to store as search target data, secret data obtained by concealing plaintext data, and a secret index obtained by concealing a plaintext index to classify the plaintext data; and an arithmetic device to execute a process including receiving, from a search client, a secret data query obtained by concealing a plaintext query, and a secret index query obtained by concealing a plaintext index, searching the storage device for a secret index matching the secret index query based on a predetermined searchable encryption technique, searching a secret data group classified by the matching secret index for secret data matching the secret data query, and returning the searched secret data to the search client.
Abstract:
A method for generating blockchain bug bounty. The method may include performing, by a first processor, bug detection by issuing a transaction for execution in runtime of a private blockchain system, wherein the private blockchain system is set in a first node of a plurality of nodes, and the first node is a private blockchain node; monitoring the transaction in the runtime and outputting first feature values associated with the transaction, wherein the first feature values are generated by performing feature extraction on the transaction.
Abstract:
Provided is a data processing system having a processor and a storage apparatus coupled to the processor, wherein: the storage apparatus holds a plurality of encrypted data that are generated by encrypting a plurality of plain text data, and a plurality of encrypted queries for retrieving the plurality of encrypted data directly in an encrypted state; and the processor retrieves each of the encrypted data using each of the encrypted queries and thereby calculates the number of appearances of encrypted data that are retrieved using each of the encrypted queries, changes at least two of the plurality of encrypted data on the basis of the number of appearances of encrypted data that are retrieved using each of the encrypted queries so that predetermined anonymity is satisfied, and outputs a plurality of encrypted data.