ES2509345T3 - Cálculo de protocolo de descifrado de umbral de seguridad - Google Patents

Cálculo de protocolo de descifrado de umbral de seguridad Download PDF

Info

Publication number
ES2509345T3
ES2509345T3 ES06832130.6T ES06832130T ES2509345T3 ES 2509345 T3 ES2509345 T3 ES 2509345T3 ES 06832130 T ES06832130 T ES 06832130T ES 2509345 T3 ES2509345 T3 ES 2509345T3
Authority
ES
Spain
Prior art keywords
encrypted
random number
sum
security threshold
decryption protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES06832130.6T
Other languages
English (en)
Inventor
Pim T. Tuyls
Berry Schoenmakers
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips NV filed Critical Koninklijke Philips NV
Application granted granted Critical
Publication of ES2509345T3 publication Critical patent/ES2509345T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

Un procedimiento para convertir un conjunto de datos cifrados en un cifrado de bits individuales que representan el conjunto de datos, comprendiendo el procedimiento las etapas de: generar un número aleatorio y calcular un cifrado basado en bits del número aleatorio; calcular de manera segura una suma cifrada en función del conjunto de datos cifrados y el número aleatorio cifrado; descifrar la suma cifrada y determinar una representación binaria de la suma; y crear el cifrado de dichos bits individuales que representan el conjunto de datos cifrados procesando la representación binaria de la suma con el número aleatorio cifrado.

Description

imagen1
imagen2
imagen3
imagen4
imagen5
imagen6

Claims (1)

  1. imagen1
    imagen2
ES06832130.6T 2005-12-13 2006-12-07 Cálculo de protocolo de descifrado de umbral de seguridad Active ES2509345T3 (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP05112048 2005-12-13
EP05112048 2005-12-13
PCT/IB2006/054646 WO2007069146A2 (en) 2005-12-13 2006-12-07 Secure threshold decryption protocol computation

Publications (1)

Publication Number Publication Date
ES2509345T3 true ES2509345T3 (es) 2014-10-17

Family

ID=38038539

Family Applications (1)

Application Number Title Priority Date Filing Date
ES06832130.6T Active ES2509345T3 (es) 2005-12-13 2006-12-07 Cálculo de protocolo de descifrado de umbral de seguridad

Country Status (6)

Country Link
US (2) US9077509B2 (es)
EP (1) EP1964305B1 (es)
JP (1) JP5537032B2 (es)
CN (1) CN101331706B (es)
ES (1) ES2509345T3 (es)
WO (1) WO2007069146A2 (es)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7392295B2 (en) 2004-02-19 2008-06-24 Microsoft Corporation Method and system for collecting information from computer systems based on a trusted relationship
US7856100B2 (en) * 2005-12-19 2010-12-21 Microsoft Corporation Privacy-preserving data aggregation using homomorphic encryption
JP4996904B2 (ja) * 2006-10-04 2012-08-08 株式会社日立製作所 生体認証システム、登録端末、認証端末、及び認証サーバ
JP5578754B2 (ja) * 2007-01-22 2014-08-27 日本電信電話株式会社 暗号変換方法および装置、並びにプログラム
US8410902B2 (en) * 2007-05-14 2013-04-02 Priv Id B.V. Apparatuses, system and method for authentication
JP5271669B2 (ja) * 2008-10-31 2013-08-21 株式会社日立製作所 生体認証方法およびシステム
JP5103407B2 (ja) * 2009-01-19 2012-12-19 日本電信電話株式会社 暗号化数値二進変換システム、暗号化数値二進変換方法、暗号化数値二進変換プログラム
US8249250B2 (en) * 2009-03-30 2012-08-21 Mitsubishi Electric Research Laboratories, Inc. Secure similarity verification between homomorphically encrypted signals
US8631053B2 (en) * 2009-08-31 2014-01-14 Mitsubishi Electric Research Laboratories, Inc. Method for securely determining Manhattan distances
US8972742B2 (en) * 2009-09-04 2015-03-03 Gradiant System for secure image recognition
JP5573293B2 (ja) * 2010-03-30 2014-08-20 富士通株式会社 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム
US8532289B2 (en) * 2010-08-16 2013-09-10 International Business Machines Corporation Fast computation of a single coefficient in an inverse polynomial
JP5677252B2 (ja) * 2010-09-24 2015-02-25 ミツビシ・エレクトリック・リサーチ・ラボラトリーズ・インコーポレイテッド 第1のベクトルおよび第2のベクトルに関数を適用した結果を求めるための方法、および第3のプロセッサを用いて第1のベクトルおよび第2のベクトルに関数を適用した結果を求めるためのシステム
FR2969875B1 (fr) * 2010-12-23 2013-01-04 Thales Sa Procede et systeme pour l'authentification multi-modale multi-seuil utilisant le partage de secret
US8891772B2 (en) * 2011-06-17 2014-11-18 Microsoft Corporation Cloud key escrow system
US8627508B2 (en) 2011-06-17 2014-01-07 Microsoft Corporation Cloud key directory for federating data exchanges
US9281941B2 (en) 2012-02-17 2016-03-08 International Business Machines Corporation Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
CN102594820B (zh) * 2012-02-17 2014-09-10 南京邮电大学 基于物联网场景的安全多方计算隐私保护测评方法
WO2014175326A1 (ja) * 2013-04-24 2014-10-30 日本電気株式会社 暗号文照合システムと方法とプログラム
WO2014175334A1 (ja) * 2013-04-24 2014-10-30 日本電気株式会社 暗号文照合システムと方法とプログラム
WO2014175320A1 (ja) * 2013-04-24 2014-10-30 日本電気株式会社 暗号文照合システムと方法とプログラム
CN103248478A (zh) * 2013-05-08 2013-08-14 天津大学 基于多方安全协议的密封式电子拍卖方案与验证方法
US9646306B1 (en) 2014-02-11 2017-05-09 Square, Inc. Splicing resistant homomorphic passcode encryption
US10719828B2 (en) * 2014-02-11 2020-07-21 Square, Inc. Homomorphic passcode encryption
EP3089091B1 (en) 2014-05-02 2020-03-11 Barclays Execution Services Limited Transaction authentication
US10432409B2 (en) 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
JP6384314B2 (ja) * 2014-12-22 2018-09-05 富士通株式会社 情報処理方法、情報処理プログラムおよび情報処理装置
US10333696B2 (en) 2015-01-12 2019-06-25 X-Prime, Inc. Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
US10079674B2 (en) * 2015-02-26 2018-09-18 New York University Systems and methods for privacy-preserving functional IP verification utilizing fully homomorphic encryption
US10958452B2 (en) 2017-06-06 2021-03-23 Analog Devices, Inc. System and device including reconfigurable physical unclonable functions and threshold cryptography
JP2021502636A (ja) * 2017-11-09 2021-01-28 エヌチェーン ホールディングス リミテッドNchain Holdings Limited 検証可能な計算のためのcライクなスマートコントラクトの算術的強化
CN111324897B (zh) * 2018-12-13 2022-08-09 中国科学院深圳先进技术研究院 一种图像加密方法、装置及图像解密方法、装置
US11120160B2 (en) 2019-05-31 2021-09-14 Advanced New Technologies Co., Ltd. Distributed personal data storage and encrypted personal data service based on secure computation
JP7294431B2 (ja) * 2019-09-18 2023-06-20 日本電気株式会社 情報照合システム、クライアント端末、サーバ、情報照合方法、及び情報照合プログラム
US11250116B2 (en) * 2019-10-25 2022-02-15 Visa International Service Association Optimized private biometric matching
CN111026359B (zh) * 2019-12-17 2021-10-15 支付宝(杭州)信息技术有限公司 多方联合判定隐私数据的数值范围的方法和装置
US11038683B1 (en) * 2020-01-24 2021-06-15 Via Science, Inc. Secure data processing
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
US11799643B2 (en) * 2021-01-19 2023-10-24 Bank Of America Corporation Collaborative architecture for secure data sharing
US12081644B2 (en) * 2021-02-01 2024-09-03 Sap Se Efficient distributed privacy-preserving computations

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5619575A (en) * 1994-08-22 1997-04-08 United Technologies Automotive, Inc. Pseudorandom composition-based cryptographic authentication process
US6035041A (en) * 1997-04-28 2000-03-07 Certco, Inc. Optimal-resilience, proactive, public-key cryptographic system and method
US20050242923A1 (en) * 1998-04-16 2005-11-03 David Pearson Passive entry systems for vehicles and other applications
US6862354B1 (en) * 2000-09-29 2005-03-01 Cisco Technology, Inc. Stream cipher encryption method and apparatus that can efficiently seek to arbitrary locations in a key stream
US20030012372A1 (en) * 2001-04-25 2003-01-16 Cheng Siu Lung System and method for joint encryption and error-correcting coding
WO2005043808A1 (en) 2003-11-03 2005-05-12 Koninklijke Philips Electronics N.V. Method and device for efficient multiparty multiplication

Also Published As

Publication number Publication date
US9077509B2 (en) 2015-07-07
EP1964305A2 (en) 2008-09-03
JP5537032B2 (ja) 2014-07-02
US20080304657A1 (en) 2008-12-11
JP2009519490A (ja) 2009-05-14
EP1964305B1 (en) 2014-07-30
CN101331706B (zh) 2012-09-05
US20150288519A1 (en) 2015-10-08
CN101331706A (zh) 2008-12-24
WO2007069146A3 (en) 2007-10-11
WO2007069146A2 (en) 2007-06-21
US10050785B2 (en) 2018-08-14

Similar Documents

Publication Publication Date Title
ES2509345T3 (es) Cálculo de protocolo de descifrado de umbral de seguridad
MX2024004991A (es) Metodo de codificacion de datos tridimensionales, metodo de decodificacion de datos tridimensionales, dispositivo codificador de datos tridimensionales y dispositivo decodificador de datos tridimensionales.
ATE490618T1 (de) Sichere multicast-übertragung
ES2566160T3 (es) Método para generar una clave de cifrado/descifrado
EP2560318A3 (en) Cryptographic circuit and method therefor
SG165174A1 (en) Method of authenticating a consumable
TW200802110A (en) Method of coded marking of a product of small size, and marked product obtained according to said method
Juneja et al. An improved LSB based Steganography with enhanced Security and Embedding/Extraction
EP2544400A3 (en) PUF based Cryptographic communication system and cryptographic communication method
WO2008148784A3 (fr) Procedes et dispositifs cryptographiques de generation pseudo-aleatoire de chiffrement de donnees et de hachage cryptographique d'un message
Rathod et al. Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm)
NZ603822A (en) Permutation data transform to enhance security
WO2006082984A3 (en) Methods and apparatus for providing a message authentication code using a pipeline
WO2006071380A3 (en) Securely field configurable device
GB2530972A (en) Encrypted purging of data from content node storage
EP2658165A3 (en) Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
CO5611229A2 (es) Sistemas y metodos para la autenticacion acustica de dos factores
WO2008091978A3 (en) Methods and apparatus for enhancing privacy of objects associated with radio-frequency identification tags
JP2015072685A5 (es)
SG165203A1 (en) Information storage medium, authentication data generation method, and medium authentication system
EP2423918A3 (en) Information processing device, information processing method, and program
JP2016525836A5 (es)
Pitropakis et al. A practical steganographic approach for matroska based high quality video files
WO2015166701A1 (ja) 暗号化方法、プログラム、および、システム
WO2015188202A3 (en) Point-to-point secure data store and communication system and method