Abstract:
Provided is a criteria generation device and the like that al low high-speed that achieves high-speed search even if a database contains unsearchable information. The criteria generation device reads, from a memory, target search criteria including first search criteria and second search criteria representing criteria for retrieving information from a database; calculates, regarding the read target search criteria, truth values indicating whether or not search criteria being a subset of the first search criteria are satisfied; sets the calculated truth values for the subset of the search criteria; and generates third search criteria depending on whether the second search criteria are true or false in accordance with whether or not the target search criteria for which the truth values are set are satisfied.
Abstract:
A secure computation system configured to perform multi-party computation on a value of a predetermined function whose argument includes secret data, comprises a plurality of server apparatuses; wherein the plurality of server apparatuses, comprise: storage units that store shares that are bases over (of) a finite field generated by performing secret sharing on the secret data; share expansion units that generate extended shares by expanding the shares; OR operation units that perform OR operations included in the predetermined functions using the extended shares; and NOT operation units that perform NOT operations included in the predetermined functions using the extended shares.
Abstract:
Provided is a database search device that, when searching an external database, efficiently executes any search command even if the usable search commands are restricted. The database search device comprises: a search command separating unit that separates input search commands into a first search command that can be executed in a prescribed database and a second search command that cannot be executed in the prescribed database; and a search command execution unit that provides the search results obtained by executing the second search command on the search results obtained by executing the first search command in the prescribed database, as the search results for the input search command.
Abstract:
A risk evaluation device acquires target data including an explanatory variable value list and a target variable value, calculates a confidence score for each partial model of a target model, wherein the target model includes the partial model for each of a plurality of ways of performing the first class classification, and wherein the partial model indicates, for each class in a class classification performed using a combination of the first class classification and the second class classification, a degree to which an element of a second set generated for each partial model from a predetermined first set is classified into the class, and evaluates a possibility that the target data is included in the first set based on the confidence score of each partial model.
Abstract:
The terminal apparatus comprises a machine learning part that can execute a process of computing a first model update parameter of a first neural network using training data and a process of computing a second model update parameter of a second neural network using training data for a simulated attack; an encryption processing part that encrypts the first, the second model update parameter using a predetermined homomorphic encryption; a data transmission part that transmits the encrypted first, second model update parameters to a predetermined computation apparatus; and an update part that receives from the computation apparatus model update parameters of the first, the second neural networks computed using the first, the second model update parameters received from another terminal apparatus and updates the first, the second neural networks.
Abstract:
Provided is a technique to prevent an attribute inference attack against a federated learning model. An information processing apparatus (2) includes: a detection section (21) that detects, as an outlier, an output value which falls outside a normal range in terms of magnitude of a value among output values of a decision tree which is undergoing federated learning; and a determination section (22) that determines, in a case where the outlier has been detected, that the decision tree has vulnerability to an attack to infer an attribute value included in training data which has been used to train the decision tree.
Abstract:
An intermediate apparatus that upon reception of a request from an application apparatus, instructs a plurality of secure computation apparatuses to perform a secret computation processing, in accordance with the request, performs a part of operation of the request from the application apparatus, on at least one of a part of data included in the request or data reconstructed from shares received from a plurality of secure computation apparatuses.
Abstract:
A registration apparatus generates shares by secret sharing of a character string with a plurality of modulus and sends the shares to a plurality of server apparatuses to be stored therein. A retrieval apparatus sends shares generated by secret sharing of a retrieval character string with the plurality of modulus to the plurality of server apparatuses. The plurality of server apparatuses execute a subroutine for shares of the each registration character string stored in a storage unit and for each of the plurality of modulus, reconstruct an execution result, and determine whether or not to return the shares of the registration character string stored in the storage unit as a retrieval result. A retrieval apparatus reconstructs shares returned from the plurality of server apparatuses and obtains a retrieval result in which the retrieval character string hits, from the reconstructed result by the Chinese remainder theorem.
Abstract:
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configures security information of data stored in database.
Abstract:
An encryption device comprises: a storage module for pre-storing an encryption key which is necessary for encryption processing; a pre-processing function unit which applies a pre-processing function to plaintext which converts an input value which in general may possibly not have a uniform distribution to an output value which has a uniform distribution; and an encryption unit which outputs encrypted text which is obtained by encrypting by order-preserving encryption, using the encryption key, the plaintext to which the pre-processing function is applied, and in which an order is maintained. This pre-processing function adds an arbitrarily selected random number to a value which is obtained by inputting an input value into a cumulative probability distribution function of an integer set with which the input value is associated, and treating same as an output value.