SECURE CONSOLIDATION SYSTEM, INFORMATION PROCESSING APPARATUS, SECURE CONSOLIDATION METHOD, AND PROGRAM

    公开(公告)号:US20240214213A1

    公开(公告)日:2024-06-27

    申请号:US18556931

    申请日:2021-05-21

    CPC classification number: H04L9/3242 H04L9/0618

    Abstract: The secure join system includes the first and second information-processing-apparatuses respectively holding first and second data. The second information-processing-apparatus is configured to: create third and fourth vectors in which a hash-value related to a key-value of the first data in a first vector and a ciphertext of the first data corresponding to the key-value in a second vector are rearranged by permutation; and create a fifth vector having a hash-value related to a key-value of the second data. The first information-processing-apparatus is configured to: search for j in which a hash-value of an i-th element of the fifth vector matches a j-th element value of the third vector for each i and create encrypted data in which a ciphertext of a j-th element value of the fourth vector is set when j is found and a ciphertext of a dummy value is set when j is not found.

    SECURE COMPUTATION SYSTEM, SECURE COMPUTATION APPARATUS, METHOD, AND PROGRAM

    公开(公告)号:US20240176908A1

    公开(公告)日:2024-05-30

    申请号:US18552075

    申请日:2021-04-19

    CPC classification number: G06F21/6245 G06F7/582

    Abstract: A secure computation system includes first, second, and third secure-computation-apparatuses each having a tripartite-share of a concealed input vector. The first secure-computation-apparatus converts its tripartite-share into a bipartite-share with the third secure-computation-apparatus; calculates a third vector obtained by subtracting a second permutation of a first vector and a second vector from its permutation of its bipartite-share; and transmits the third vector and the second permutation to the second secure-computation-apparatus. The third secure-computation-apparatus converts its tripartite-share into a bipartite-share with the first secure-computation-apparatus; calculates a fourth vector obtained by adding the first vector to a first permutation of its bipartite-share; transmits the fourth vector to the third secure-computation-apparatus: set the second vector as a bipartite-share with the second secure-computation-apparatus. The second secure-computation-apparatus sets a vector obtained by adding the second permutation of the fourth vector to the third vector, as a bipartite-share with the third secure-computation-apparatus.

    ENCRYPTED DATA ANALYSIS DEVICE, ENCRYPTED DATA ANALYSIS METHOD, AND PROGRAM

    公开(公告)号:US20230090900A1

    公开(公告)日:2023-03-23

    申请号:US17791833

    申请日:2020-01-14

    Abstract: The encrypted data analysis device includes a sorting unit that sorts by [Time Information] and then sorts by [User ID] an encrypted data set group including a plurality of encrypted data sets, each of the plurality of encrypted data sets including a [Location ID], the [User ID], and the [Time Information], an encoding unit that generates a [Flow], and encoding the [Location ID] extracted, and an equal sign determination unit that determines whether a [User ID] and another [User ID] adjacent to each other are equal, and when not equal, replaces a corresponding [Flow] with a [predetermined value that represents invalid].

    APPROXIMATE FUNCTION CALCULATION APPARATUS, METHOD AND PROGRAM

    公开(公告)号:US20220335104A1

    公开(公告)日:2022-10-20

    申请号:US17762740

    申请日:2019-10-10

    Inventor: Koki HAMADA

    Abstract: An approximate function calculation apparatus includes: a first error upper bound calculating unit which obtains an upper bound of a first error of an approximation of a function f(x) by the function gb(x) in a section [x0, b]; an expansion position calculating unit which obtains an expansion position b′ that represents a maximum b at which the upper bound of the first error; a second error upper bound calculating unit which obtains an upper bound of a second error of an approximation of the function f(x) by a function gb′(x) in a section [b′, x2]; a right end position calculating unit which calculates a right end position x2′ that represents a maximum x2 at which the upper bound of the second error; and a control unit which repeats processing of the respective units with a section [x2′, x1] as the section D.

    SECURE ARRAY ACCESS APPARATUS, SECURE ARRAY ACCESS METHOD, AND PROGRAM

    公开(公告)号:US20220114110A1

    公开(公告)日:2022-04-14

    申请号:US17414318

    申请日:2020-01-09

    Abstract: Access to an array is efficiently performed without reveling an accessed position. A storage 10 stores an array of concealed values [x′→] of an array x′→ and an array of addresses a′→ corresponding to respective elements of the array of concealed values [x′→]. A refresh unit 11 determines a concealed value [F] of a random parameter F, an array of concealed values [x→] of an array x→ generated by permutating the array x′→ with random permutation ρ, and an array of public tags b→ calculated from respective elements of the array of addresses a→ with the function TagF. An access unit 12 performs a desired access to an element of the array of concealed values [x→] corresponding to a tag that is calculated from a concealed value [j] of an access position j with the function Tag and the concealed value [F] of the parameter.

    SECURE READING APPARATUS, SECURE WRITING APPARATUS, METHOD THEREOF, AND PROGRAM

    公开(公告)号:US20200218833A1

    公开(公告)日:2020-07-09

    申请号:US16648436

    申请日:2018-09-11

    Inventor: Koki HAMADA

    Abstract: Data is efficiently read from a sequence without a read position being revealed. A secure reading apparatus 1 receives a secret text sequence and a secret text of a read position as input, and outputs an element at the read position of the secret text sequence. A vector creating part (12) creates a vector expressing the read position. A compression computing part (13) repeatedly generates a new secret text sequence in which an inner product of a vector based on the secret text sequence and a vector expressing the read position is set as an element. The reading part (14) outputs the new secret text sequence having the number of elements of one as the element at the read position of the secret text sequence.

    SECURE EQUIJOIN SYSTEM, SECURE EQUIJOIN DEVICE, SECURE EQUIJOIN METHOD, AND PROGRAM

    公开(公告)号:US20190228010A1

    公开(公告)日:2019-07-25

    申请号:US16330212

    申请日:2017-09-14

    Abstract: A secure equijoin technique of generating one table from two tables while curbing the volume of communications traffic is provided. The technique includes: a first permutation generating means 110 that generates a permutation from an element sequence which is generated from the first column of a table L and the first column of a table R; a first column generating means 120 that generates, for j=2, . . . , a, by using the permutation , a prefix sum, and an inverse permutation , the j-th column of a table J from an element sequence which is generated from the to j-th column of the table L; a join-result element sequence generating means 130 that generates a join-result element sequence from an element sequence ([[1]], . . . , [[1]], [[0]], . . . , [[0]], [[−1]], . . . , [[−1]]) by using the permutation , the prefix sum, and the inverse permutation ; a second column generating means 140 that generates, for j=a+1, . . . , a+b−1, the j-th column of the table J by using the join-result element sequence and the j−a+1-th column of the table R; and a third column generating means 150 that generates the first column of the table J by using the join-result element sequence and the first column of the table R.

Patent Agency Ranking