摘要:
A content distribution/browsing system is disclosed. First to (m−1)th encrypted content items E(K1, C1∥K2,1), . . . , E(Km−1, Cm−1∥Km,1) contain second to m-th (next in order) sharing keys K2,1, . . . , Km,1, respectively. When desirous of browsing an (i+1)th content item Ci+1, the (i+1)th sharing key Ki+1,1 is acquired by browsing an immediately preceding i-th content item Ci.
摘要:
A secret sharing apparatus according to the present invention is based on a (k,n)-threshold scheme with a threshold of at least 4 but is still operational with a threshold of at least 2. The secret sharing apparatus generates a generator matrix (G) of GF(2) in which any k of n column vectors are at a full rank, divides secret information into n−1 pieces to generate divided secret data (K(1), . . . , K(n−1)), generates random data (U(0,1), . . . , U(k−2,n−1)), calculates the product of matrixes of the divided secret data, the random data, and the generator matrix (G), assigns the j×(n−1)+ith column of the calculation result to sharing partial data (D(j,i)) to calculate sharing partial data (D(j,1)), generates header information (H(j)), and individually distributes n pieces of sharing information (D(0), . . . , D(n−1)) made up of the header information (H(j)) and sharing partial data (D(j,i)) to n storage apparatuses.
摘要:
A secret sharing device of (k, n) threshold scheme creates a generator matrix G, first divided secret data, and random number data, calculates shared partial data based on the product of matrices with the random number data, the divided secret data, and the generator matrix G, and delivers the shared information formed by the shared partial data and the header information individually to the storage units. The secret sharing device calculates a recovery matrix and multiplies the shared information by the recovery matrix, hence to recover the secret information.
摘要:
A secret sharing device of (k, n) threshold scheme creates a generator matrix G, first divided secret data, and random number data, calculates shared partial data based on the product of matrices with the random number data, the divided secret data, and the generator matrix G, and delivers the shared information formed by the shared partial data and the header information individually to the storage units. The secret sharing device calculates a recovery matrix and multiplies the shared information by the recovery matrix, hence to recover the secret information.
摘要:
A content distribution/browsing system is disclosed. First to (m−1)th encrypted content items E(K1, C1∥K2,1), . . . , E(Km−1, Cm−1∥Km,1) contain second to m-th (next in order) sharing keys K2,1, . . . , Km,1, respectively. When desirous of browsing an (i+1)th content item Ci+1, the (i+1)th sharing key Ki+1,1 is acquired by browsing an immediately preceding i-th content item Ci.
摘要:
A purchaser apparatus stores “anonymous order information including an order ID and purchaser identity verifying information” and “purchaser identity proving secret information”. A shop apparatus stores “anonymous order information including an order ID and purchaser identity verifying information”. If necessary, a purchaser sends a request including an order ID and zero knowledge proving information that a purchaser knows the purchaser identity proving secret information, from a purchaser apparatus to a shop apparatus. A shop apparatus verifies the zero knowledge proving information, based on purchaser identity verifying information retrieved from an order ID included in the request. Therefore, the unlinkability for past use is eliminated if necessary, and inconvenience caused by the unlinkability is eliminated.
摘要:
A purchaser apparatus stores “anonymous order information including an order ID and purchaser identity verifying information” and “purchaser identity proving secret information”. A shop apparatus stores “anonymous order information including an order ID and purchaser identity verifying information”. If necessary, a purchaser sends a request including an order ID and zero knowledge proving information that a purchaser knows the purchaser identity proving secret information, from a purchaser apparatus to a shop apparatus. A shop apparatus verifies the zero knowledge proving information, based on purchaser identity verifying information retrieved from an order ID included in the request. Therefore, the unlinkability for past use is eliminated if necessary, and inconvenience caused by the unlinkability is eliminated.
摘要:
A data processing apparatus for managing an information file to be utilized when contents are used is provided. The data processing system includes an update information file creator for creating an update information file on the basis of an information file including multiple kinds of data stored in a predetermined file storage area to be stored in the predetermined file storage area, a first digest calculator for calculating a digest value from the update information file created by the update information file creator, a digest updater for updating a digest value stored in a predetermined digest value storage area to the digest value calculated by the first digest calculator, a file eraser for erasing the information file used to create the update information file, and a first file setter for setting the update information file as an information file.
摘要:
According to one embodiment, an access control apparatus suspends the resource access event prior to access of the resource access device when the resource access event is started. The access control apparatus acquires attribute information from the attribute management device by using the deny-type policy in the access control policy and decides the permission or the denial of the access based on this attribute information and the deny-type policy. The access control apparatus releases the suspension when a result of decision in the supplied access decision result is indicative of the permission and no obligation-type policy is present in the access decision response.
摘要:
According to one embodiment, an access control apparatus suspends the resource access event prior to access of the resource access device when the resource access event is started. The access control apparatus acquires attribute information from the attribute management device by using the deny-type policy in the access control policy and decides the permission or the denial of the access based on this attribute information and the deny-type policy. The access control apparatus releases the suspension when a result of decision in the supplied access decision result is indicative of the permission and no obligation-type policy is present in the access decision response.