Encrypted data analysis device, encrypted data analysis method, and program

    公开(公告)号:US12189807B2

    公开(公告)日:2025-01-07

    申请号:US17791833

    申请日:2020-01-14

    Abstract: The encrypted data analysis device includes a sorting unit that sorts by [Time Information] and then sorts by [User ID] an encrypted data set group including a plurality of encrypted data sets, each of the plurality of encrypted data sets including a [Location ID], the [User ID], and the [Time Information], an encoding unit that generates a [Flow], and encoding the [Location ID] extracted, and an equal sign determination unit that determines whether a [User ID] and another [User ID] adjacent to each other are equal, and when not equal, replaces a corresponding [Flow] with a [predetermined value that represents invalid].

    Secure division system, secure computation apparatus, secure division method, and program

    公开(公告)号:US12010220B2

    公开(公告)日:2024-06-11

    申请号:US17615106

    申请日:2019-06-10

    Inventor: Koki Hamada

    CPC classification number: H04L9/085 G06F7/535

    Abstract: Division is realized with a small number of processing stages. A secure computation apparatus (1) obtains a secret value representing a result of divided N by D using a secret value [N] of a real number N and a secret value [D] of a natural number D. An initialization unit (12) sets a secret value [PL1] of a partial remainder PL1 to 0. A parallel comparison unit (13) computes secret values [E1], . . . , [ER−1] of comparison results E1, . . . , ER−1 of comparing a secret value [n] of a partial divisor n=Pj+1R+Nj with [D]×g for each integer g not less than 1 and less than R in parallel. An update unit (14) computes a secret value [Qj] of a quotient Qj and a secret value [Pj] of a partial remainder Pj that satisfy n=DQj+Pj using the secret values [E1], . . . , [ER−1] of the comparison results E1, . . . , ER−1. An iterative control unit (15) executes the parallel comparison unit (13) and the update unit (14) for each integer j from L1−1 to −L0.

    Secure joining system, method, secure computing apparatus and program

    公开(公告)号:US11888973B2

    公开(公告)日:2024-01-30

    申请号:US17267837

    申请日:2019-08-08

    CPC classification number: H04L9/085 G06F7/726 G06F7/766 G06F7/768 G06F7/78

    Abstract: A secure joining system is a secure joining system including a plurality of secure computing apparatuses. The plurality of secure computing apparatuses include a first vector joining unit, a first permutation calculation unit, a first vector generation unit, a second vector joining unit, a first permutation application unit, a second vector generation unit, a first inverse permutation application unit, a first vector extraction unit, a second permutation application unit, a third vector generation unit, a second inverse permutation application unit, a second vector extraction unit, a modified second table generation unit, a third permutation application unit, a fourth vector generation unit, a shifting unit, a third inverse permutation application unit, a bit inversion unit, a third vector extraction unit, a modified first table generation unit, a first table joining unit, and a first table formatting unit.

    Secure computation apparatus, secure computation method and program

    公开(公告)号:US10679522B2

    公开(公告)日:2020-06-09

    申请号:US15737915

    申请日:2016-06-13

    Abstract: A secret sharing value of a value represented by a “first target bit string” is used to obtain a secret sharing value of a value represented by a “first check bit string” obtained by setting a value of the most significant bit of the “first target bit string” to a value of a “first check bit” that is lower than the most significant bit. Here, the “first target bit string” corresponds to a null value when the most significant bit is 1 and corresponds to a real number when the most significant bit is 0. Next, the secret sharing value of the value represented by the “first check bit string” is used to obtain secret sharing values of bit values of the least significant bit to “first check bit” of the “first check bit string”.

    Inconsistency detecting method, inconsistency detecting system, inconsistency detecting device, and program

    公开(公告)号:US10665137B2

    公开(公告)日:2020-05-26

    申请号:US15541410

    申请日:2016-02-01

    Abstract: An inconsistency in shares is detected with a small volume of communications traffic. n inconsistency detecting devices generate random numbers si and make the random numbers si public. The n inconsistency detecting devices generate a common random number s which is the sum total of the random numbers s0, . . . , sn−1. The n inconsistency detecting devices calculate shares [c]i. The n inconsistency detecting devices generate shares [r]i, each of which would become a random number r by reconstruction. The n inconsistency detecting devices calculate shares [d]i, each of which would become a judgment value d by reconstruction. One inconsistency detecting device receives shares [d]1, . . . , [d]n−1 from n−1 inconsistency detecting devices. The one inconsistency detecting device restores n−k shares [d]′k, . . . , [d]′n−1 from k shares [d]0, . . . , [d]k−1. The one inconsistency detecting device judges, for j=k, . . . , n−1, whether or not a share [d]j and a share [d]′j coincide with each other.

    Secret parallel processing device, secret parallel processing method, and program

    公开(公告)号:US10083314B2

    公开(公告)日:2018-09-25

    申请号:US15025486

    申请日:2014-10-03

    Abstract: A secret parallel processing device reducing communication amount includes: a randomization unit that obtains a non-randomized input sequence and outputs a randomized sequence obtained by joining the non-randomized sequence and a dummy record sequence formed of a disclosed value and subjecting the joined sequences to random replacement processing and concealed random replacement data obtained by concealing used random replacement data; a calculation unit that obtains the non-randomized sequence, the randomized sequence, and the dummy record sequence, applies a predetermined function to the sequences, and generates an output checksum for each sequence by using calculation procedure data used in the processing of applying the function; and a correctness verification unit that obtains the output checksum for each sequence and the concealed random replacement data, assesses the output checksum for each sequence, and outputs a final test result determining whether the predetermined function has been correctly applied on the non-randomized sequence.

    Analysis query response system, analysis query execution apparatus, analysis query verification apparatus, analysis query response method, and program

    公开(公告)号:US12141322B2

    公开(公告)日:2024-11-12

    申请号:US17413578

    申请日:2019-12-19

    Abstract: An analysis query response system comprises a user terminal 1 that generates and transmits an analysis query, and a database apparatus 2 including an analysis query verification apparatus 22 that includes a verification execution part 222 that performs a first verification of whether the analysis query satisfies a predetermined privacy preservation indicator, and an analysis query execution apparatus 21 that includes a personal data storage part 211 that stores personal data and an analysis query execution and preservation part 214 that, in a case where the first verification is successful, performs an analysis corresponding to the analysis query on the personal data read from the personal data storage part to acquire an analysis result, and applies a predetermined privacy-preserving mechanism to the acquired analysis result.

Patent Agency Ranking