TOP > 外国特許検索 > CALCULATING DEVICE RELATING TO CONCEALMENT COMPUTATION SYSTEM EMPLOYING DISTRIBUTION OF SECRETS

CALCULATING DEVICE RELATING TO CONCEALMENT COMPUTATION SYSTEM EMPLOYING DISTRIBUTION OF SECRETS UPDATE コモンズ 新技術説明会

外国特許コード F160008873
整理番号 G2015-023
掲載日 2016年10月6日
出願国 世界知的所有権機関(WIPO)
国際出願番号 2016JP051934
国際公開番号 WO 2016129363
国際出願日 平成28年1月22日(2016.1.22)
国際公開日 平成28年8月18日(2016.8.18)
優先権データ
  • 特願2015-025825 (2015.2.12) JP
発明の名称 (英語) CALCULATING DEVICE RELATING TO CONCEALMENT COMPUTATION SYSTEM EMPLOYING DISTRIBUTION OF SECRETS UPDATE コモンズ 新技術説明会
発明の概要(英語) Distributed values of concealed secret information are obtained from secret information by concealing the secret information. A combined value α is generated from random numbers α1 to αk, which are k or more items of secret information (42). The combined value α is multiplied by new secret information a to generate concealed secret information αa, and distributed values Wa'(xi) of the concealed secret information, and distributed values Wa1(xi) to Wak(xi) of each of the random numbers, which are the k or more items of secret information, are calculated (44). The distributed values Wa'(xi) and Wa1(xi) to Wak(xi) are transmitted to first to nth servers (46). The distributed values Wa'(xi) of the concealed secret information αa, obtained by concealing the secret information α1 to αk, can be obtained from the secret information α1 to αk.
従来技術、競合技術の概要(英語) BACKGROUND ART
In recent years, cloud computing is a new network technology has attracted attention. Cloud computing is a user data included in a cloud of a plurality of servers on the network is referred to as a virtual large-capacity storage distributed, stored, the data required by the user from anywhere via a network in accordance with the access technology. Further, in order to effectively utilize the stored data, as well as the storage to the data, distributed on the cloud, using data stored in the individual data while concealing a confidential calculation for the calculation of any technology is demanded.
This concealment calculation 1 as one of the techniques for achieving the use of the secret sharing scheme has attracted attention. Secret sharing scheme is one of n 1 and the secret information is dispersed, dispersion of the values of the two n, k (k ≦ n) to collect one of the original secret information can be restored in the art. In addition, k is less than the dispersion value of the confidential information cannot be obtained information. The secret sharing method as a, (k, n) secret sharing scheme by Shamir is well known. Shamir (k, n) secret sharing scheme of a conventional secret sharing system has a dispersion value n stored in the one data server, the secret information is distributed to the dealer or restoration to restore the secret information from the terminal. That is, when the own is the owner of the secret is a secret information distribution request to a dealer, the dealer may have the secret sharing method and a dispersion value of n, the value of the n pieces of data stored in each distributed server. In general, the dealer is present only when the secret sharing scheme. On the other hand, a user who desires to restore the secret information k to restore the contents of the dispersion value relative to the collected terminal data from a data server for restoration is restored. This restoration terminal is also common, data exist only at the time of restoration.
Specifically, the Shamir (k, n) secret sharing scheme such as the following formula (1) to set k-1 polynomial (s secret information, the random number k-1 a 1-a) and, the server ID of each of n xj (j=1, ..., N) and (xj) W when the variance value stored in each server. K is a polynomial of k-1 this variance value W (x1), ..., If W is solved (xk) (the secret information s is obtained) and comes to be. On the other hand, the variance is less than k unstable solution cannot be determined at all. W (x) =s + a1x + a2x2 +...+ak-1xk-1 (1)
Further, 2 a and 2 b with respect to the secret one variance values (xj) Wa and Wb (xj) (formula (2) ) (formula (3) ) is one of the servers n has been stored (j=1, ..., N) time, the addition of the dispersion values are given (formula (4)). =a + a1xj + a2xj Wa Wb2 +...+ak-1xjk-1 (2) (xj) =b + b1xj + b2xj=(xj) (xj) + Wb Wa2 +...+bk-1xjk-1 (3) xj + (a2 + b2 (a + b) + (a1 + b1) ) xj2 +...+(ak-1+bk-1) xjk-1 (4)
In this case, the addition result of the formula (4) may also be expressed by a polynomial of k-1, the sum of the dispersion values (xj) Wa + Wb (xj) is the polynomial by solving a k are collected, rather than individual items of information that a+ b b that the sum of the secret information is obtained. Similarly to the multiplication (xj) (xj) Wa and Wb of the product of a constant term, b that are different between the secret information as the product of the product of the dispersion value is calculated and the polynomial is solved, a clearance obtained by the product of the secret information 1:. In this manner, a, b that the sum or the product of the individual information without obtaining the confidentiality of the calculation result is referred to as calculated, multiplied by the secret sharing method is unchanged with respect to addition and subtraction can be applied to calculate the concealment has been known. However, the secret used to calculate the secret sharing problem still remains unsolved as described below is known.
  • 出願人(英語)
  • ※2012年7月以前掲載分については米国以外のすべての指定国
  • TOKYO UNIVERSITY OF SCIENCE FOUNDATION
  • 発明者(英語)
  • IWAMURA KEIICHI
国際特許分類(IPC)
指定国 National States: AE AG AL AM AO AT AU AZ BA BB BG BH BN BR BW BY BZ CA CH CL CN CO CR CU CZ DE DK DM DO DZ EC EE EG ES FI GB GD GE GH GM GT HN HR HU ID IL IN IR IS JP KE KG KN KP KR KZ LA LC LK LR LS LU LY MA MD ME MG MK MN MW MX MY MZ NA NG NI NO NZ OM PA PE PG PH PL PT QA RO RS RU RW SA SC SD SE SG SK SL SM ST SV SY TH TJ TM TN TR TT TZ UA UG US UZ VC VN ZA ZM ZW
ARIPO: BW GH GM KE LR LS MW MZ NA RW SD SL SZ TZ UG ZM ZW
EAPO: AM AZ BY KG KZ RU TJ TM
EPO: AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
OAPI: BF BJ CF CG CI CM GA GN GQ GW KM ML MR NE SN ST TD TG
上記の特許・技術に関心のある方は、下記問合せ先にご相談下さい。

PAGE TOP

close
close
close
close
close
close