CN103975553B - 数据处理装置以及数据处理方法 - Google Patents
数据处理装置以及数据处理方法 Download PDFInfo
- Publication number
- CN103975553B CN103975553B CN201180075191.2A CN201180075191A CN103975553B CN 103975553 B CN103975553 B CN 103975553B CN 201180075191 A CN201180075191 A CN 201180075191A CN 103975553 B CN103975553 B CN 103975553B
- Authority
- CN
- China
- Prior art keywords
- data
- public key
- encrypted
- random number
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2011/077623 WO2013080320A1 (ja) | 2011-11-30 | 2011-11-30 | データ処理装置及びデータ処理方法及びプログラム |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN103975553A CN103975553A (zh) | 2014-08-06 |
| CN103975553B true CN103975553B (zh) | 2016-10-12 |
Family
ID=48534844
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201180075191.2A Expired - Fee Related CN103975553B (zh) | 2011-11-30 | 2011-11-30 | 数据处理装置以及数据处理方法 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20140247939A1 (enExample) |
| EP (1) | EP2787681B1 (enExample) |
| JP (1) | JP5586795B2 (enExample) |
| CN (1) | CN103975553B (enExample) |
| IN (1) | IN2014CN04372A (enExample) |
| WO (1) | WO2013080320A1 (enExample) |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013111284A1 (ja) | 2012-01-25 | 2013-08-01 | 三菱電機株式会社 | データ検索装置、データ検索方法、データ検索プログラム、データ登録装置、データ登録方法、データ登録プログラムおよび情報処理装置 |
| CN104995621B (zh) | 2013-02-25 | 2018-06-05 | 三菱电机株式会社 | 服务器装置以及隐匿检索系统 |
| US8966277B2 (en) * | 2013-03-15 | 2015-02-24 | Mitsubishi Electric Research Laboratories, Inc. | Method for authenticating an encryption of biometric data |
| CN106165339A (zh) * | 2014-03-26 | 2016-11-23 | 大陆-特韦斯股份有限公司 | 用于在通信过程中改进数据安全性的方法和系统 |
| US10592682B2 (en) * | 2015-02-20 | 2020-03-17 | Mitsubishi Electric Corporation | Data storage apparatus, data processing method, and computer readable medium adding a user attribute of a revoked user to an embedded decryption condition while encrypted data remains in an encrypted state |
| WO2019014425A1 (en) * | 2017-07-13 | 2019-01-17 | Pindrop Security, Inc. | SAFE PARTY WITH SEVERAL PARTIES KNOWING NO VOICE IMPRESSIONS |
| KR102578428B1 (ko) * | 2018-02-13 | 2023-09-14 | 핑거프린트 카드즈 아나카툼 아이피 에이비 | 생체 인식 템플릿 보호 키 업데이트 |
| US10665244B1 (en) | 2018-03-22 | 2020-05-26 | Pindrop Security, Inc. | Leveraging multiple audio channels for authentication |
| US11354422B2 (en) * | 2018-11-02 | 2022-06-07 | Rank One Computing Corporation | Optimizations for privacy-preserving distance metric computation |
| US20220052841A1 (en) * | 2018-12-12 | 2022-02-17 | Nec Corporation | Matching system, client and server |
| WO2020121461A1 (ja) * | 2018-12-12 | 2020-06-18 | 日本電気株式会社 | 照合システム、クライアントおよびサーバ |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| JP7563496B2 (ja) | 2021-01-29 | 2024-10-08 | 日本電気株式会社 | 生体認証システム、そのテンプレート更新方法、テンプレート更新プログラム、生体認証クライアント装置及び生体認証サーバ装置 |
| US12493417B2 (en) * | 2022-06-02 | 2025-12-09 | Micron Technology, Inc. | Verified key replacement in secure memory devices |
| US20230396431A1 (en) * | 2022-06-02 | 2023-12-07 | Micron Technology, Inc. | Error reduction during cryptographic key updates in secure memory devices |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
| CN101057448A (zh) * | 2004-11-16 | 2007-10-17 | 皇家飞利浦电子股份有限公司 | 安全地计算相似性度量 |
| JP2011211593A (ja) * | 2010-03-30 | 2011-10-20 | Fujitsu Ltd | 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4961214B2 (ja) | 2006-03-29 | 2012-06-27 | 株式会社日立情報制御ソリューションズ | 生体認証方法およびシステム |
| US8995665B1 (en) * | 2008-08-20 | 2015-03-31 | Symantec Corporation | Role based encryption without key management system |
| WO2011052056A1 (ja) | 2009-10-29 | 2011-05-05 | 三菱電機株式会社 | データ処理装置 |
-
2011
- 2011-11-30 CN CN201180075191.2A patent/CN103975553B/zh not_active Expired - Fee Related
- 2011-11-30 US US14/350,740 patent/US20140247939A1/en not_active Abandoned
- 2011-11-30 IN IN4372CHN2014 patent/IN2014CN04372A/en unknown
- 2011-11-30 JP JP2013546896A patent/JP5586795B2/ja not_active Expired - Fee Related
- 2011-11-30 EP EP11876549.4A patent/EP2787681B1/en not_active Not-in-force
- 2011-11-30 WO PCT/JP2011/077623 patent/WO2013080320A1/ja not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
| CN101057448A (zh) * | 2004-11-16 | 2007-10-17 | 皇家飞利浦电子股份有限公司 | 安全地计算相似性度量 |
| JP2011211593A (ja) * | 2010-03-30 | 2011-10-20 | Fujitsu Ltd | 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| JPWO2013080320A1 (ja) | 2015-04-27 |
| EP2787681A4 (en) | 2015-10-14 |
| EP2787681A1 (en) | 2014-10-08 |
| EP2787681B1 (en) | 2016-10-12 |
| IN2014CN04372A (enExample) | 2015-09-04 |
| JP5586795B2 (ja) | 2014-09-10 |
| WO2013080320A1 (ja) | 2013-06-06 |
| US20140247939A1 (en) | 2014-09-04 |
| CN103975553A (zh) | 2014-08-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103975553B (zh) | 数据处理装置以及数据处理方法 | |
| CN102598576B (zh) | 数据处理装置 | |
| EP2680488B1 (en) | Similarity calculation system, similarity calculation device, computer program, and similarity calculation method | |
| CN110300112B (zh) | 区块链密钥分层管理方法 | |
| Souyah et al. | An image encryption scheme combining chaos-memory cellular automata and weighted histogram | |
| Yang et al. | Fuzzy identity based signature with applications to biometric authentication | |
| Blanton et al. | Secure and efficient protocols for iris and fingerprint identification | |
| CN102415047B (zh) | 密码处理系统 | |
| CN103444126B (zh) | 密码处理系统、密钥生成装置、加密装置、解密装置以及密码处理方法 | |
| CN117828627B (zh) | 一种兼顾鲁棒性和隐私保护的联邦机器学习方法及系统 | |
| CN104871477A (zh) | 加密系统、重加密密钥生成装置、重加密装置、加密方法和加密程序 | |
| CN114065169A (zh) | 一种隐私保护生物认证方法和装置、电子设备 | |
| JP7524205B2 (ja) | 秘匿認証方法および秘匿認証システム | |
| JPWO2020072690A5 (enExample) | ||
| Prasanalakshmi et al. | ECC based biometric encryption of compressed image for security over network channels | |
| CN117831102A (zh) | 一种基于同态加密的分级人脸识别方法 | |
| Yang et al. | Inner product encryption from middle-product learning with errors | |
| Lakum et al. | A key-ordered decisional learning parity with noise (DLPN) scheme for public key encryption scheme in cloud computing | |
| Hu et al. | Efficient batch identity‐based fully homomorphic encryption scheme in the standard model<? show [AQ ID= Q1]?> | |
| Tan et al. | Breaking two PSI-CA protocols in polynomial time | |
| Sahai et al. | Fuzzy Identities and Attribute-Based Encryption | |
| JP2006229929A (ja) | 秘密計算方法及びシステム、並びにプログラム | |
| Shah | Research on electronic travel document protocols using lattice-based cryptography | |
| BLANTON¹ et al. | 2DEPARTMENT OF COMPUTER SCIENCE, NEW YORK INSTITUTE | |
| Sarıer | Biometric Cryptosystems: Authentication, Encryption and Signature |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161012 Termination date: 20191130 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |