Abstract:
There is provided an information processing apparatus including a first computation protocol generation unit configured to generate a first computation protocol that does not include a confidentiality securing protocol that is executed in order to maintain confidentiality of a plurality of input values on the basis of a secure computation protocol in which a plurality of operation processing apparatuses compute an output value on the basis of the input values, and a second computation protocol generation unit configured to generate a second computation protocol by arranging the confidentiality securing protocol to a position at which the confidentiality is secured in the first computation protocol.
Abstract:
[Object] To perform a desired operation in response to an operation even with a compact apparatus.[Solution] An information processing apparatus according to the present disclosure includes: a fingerprint information acquisition unit configured to acquire fingerprint information; a determination unit configured to determine an action of a finger on the basis of the fingerprint information; and a processing unit configured to perform specified processing predetermined depending on the action on the basis of the determined action. This configuration makes it possible to perform a desired operation depending on the operation even with a compact apparatus, thereby enhancing user convenience.
Abstract:
An authentication device includes circuitry that holds L (L≧2) secret keys si (i=1 to L) and L public keys yi that satisfy yi=F(si) with respect to a set F of multivariate polynomials of n-th order (n≧2). The circuitry also performs with a verifier, an interactive protocol for proving knowledge of (L−1) secret keys si that satisfy yi=F(si). The circuitry receives L challenges from the verifier, arbitrarily selects (L−1) challenges from the L challenges received. The circuitry also generates, by using the secret keys si, (L−1) responses respectively for the (L−1) challenges selected, and transmits the (L−1) responses generated.
Abstract:
[Object] To provide an information processing system capable of making it difficult to be easily recognized as being a key at a glance by others. [Solution] Provided is an information processing system including a state acquisition unit configured to acquire information on a state of an object, and an authentication information acquisition unit configured to acquire authentication information corresponding to the information on the state of the object acquired by the state acquisition unit. According to such an information processing system, it is made difficult to be easily recognized as being a key at a glance by others.
Abstract:
There is provided an information processing apparatus including an authentication process unit configured to obtain an authentication request from another apparatus, and perform an authentication process between the information processing apparatus and the another apparatus in response to the authentication request, and a notification generation unit configured to, when the authentication process unit performs the authentication process between the information processing apparatus and the another apparatus, generate information for notifying a result of the authentication process and information for limiting use of the another apparatus.
Abstract:
Provided is an information processing apparatus including a sensor data obtaining unit configured to obtain predetermined information from a sensor, the sensor obtaining the predetermined information by sensing, and a key generation unit configured to generate key information for use in an authentication process, based on the information which is obtained by the sensor data obtaining unit during a predetermined period of time.
Abstract:
There is provided an information processing device including an information storage unit configured to store information about a state in which a first secret key used during authentication is held in devices, and information about connection between the devices, and a communication unit configured to send the first secret key so that the first secret key is delivered to the devices based on the information stored in the information storage unit.