ES2509345T3 - Cálculo de protocolo de descifrado de umbral de seguridad - Google Patents
Cálculo de protocolo de descifrado de umbral de seguridad Download PDFInfo
- Publication number
- ES2509345T3 ES2509345T3 ES06832130.6T ES06832130T ES2509345T3 ES 2509345 T3 ES2509345 T3 ES 2509345T3 ES 06832130 T ES06832130 T ES 06832130T ES 2509345 T3 ES2509345 T3 ES 2509345T3
- Authority
- ES
- Spain
- Prior art keywords
- encrypted
- random number
- sum
- security threshold
- decryption protocol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Un procedimiento para convertir un conjunto de datos cifrados en un cifrado de bits individuales que representan el conjunto de datos, comprendiendo el procedimiento las etapas de: generar un número aleatorio y calcular un cifrado basado en bits del número aleatorio; calcular de manera segura una suma cifrada en función del conjunto de datos cifrados y el número aleatorio cifrado; descifrar la suma cifrada y determinar una representación binaria de la suma; y crear el cifrado de dichos bits individuales que representan el conjunto de datos cifrados procesando la representación binaria de la suma con el número aleatorio cifrado.
Description
Claims (1)
-
imagen1 imagen2
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05112048 | 2005-12-13 | ||
EP05112048 | 2005-12-13 | ||
PCT/IB2006/054646 WO2007069146A2 (en) | 2005-12-13 | 2006-12-07 | Secure threshold decryption protocol computation |
Publications (1)
Publication Number | Publication Date |
---|---|
ES2509345T3 true ES2509345T3 (es) | 2014-10-17 |
Family
ID=38038539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ES06832130.6T Active ES2509345T3 (es) | 2005-12-13 | 2006-12-07 | Cálculo de protocolo de descifrado de umbral de seguridad |
Country Status (6)
Country | Link |
---|---|
US (2) | US9077509B2 (es) |
EP (1) | EP1964305B1 (es) |
JP (1) | JP5537032B2 (es) |
CN (1) | CN101331706B (es) |
ES (1) | ES2509345T3 (es) |
WO (1) | WO2007069146A2 (es) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7392295B2 (en) | 2004-02-19 | 2008-06-24 | Microsoft Corporation | Method and system for collecting information from computer systems based on a trusted relationship |
US7856100B2 (en) * | 2005-12-19 | 2010-12-21 | Microsoft Corporation | Privacy-preserving data aggregation using homomorphic encryption |
JP4996904B2 (ja) * | 2006-10-04 | 2012-08-08 | 株式会社日立製作所 | 生体認証システム、登録端末、認証端末、及び認証サーバ |
JP5578754B2 (ja) * | 2007-01-22 | 2014-08-27 | 日本電信電話株式会社 | 暗号変換方法および装置、並びにプログラム |
US8410902B2 (en) * | 2007-05-14 | 2013-04-02 | Priv Id B.V. | Apparatuses, system and method for authentication |
JP5271669B2 (ja) * | 2008-10-31 | 2013-08-21 | 株式会社日立製作所 | 生体認証方法およびシステム |
JP5103407B2 (ja) * | 2009-01-19 | 2012-12-19 | 日本電信電話株式会社 | 暗号化数値二進変換システム、暗号化数値二進変換方法、暗号化数値二進変換プログラム |
US8249250B2 (en) * | 2009-03-30 | 2012-08-21 | Mitsubishi Electric Research Laboratories, Inc. | Secure similarity verification between homomorphically encrypted signals |
US8631053B2 (en) * | 2009-08-31 | 2014-01-14 | Mitsubishi Electric Research Laboratories, Inc. | Method for securely determining Manhattan distances |
US8972742B2 (en) * | 2009-09-04 | 2015-03-03 | Gradiant | System for secure image recognition |
JP5573293B2 (ja) * | 2010-03-30 | 2014-08-20 | 富士通株式会社 | 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム |
US8532289B2 (en) * | 2010-08-16 | 2013-09-10 | International Business Machines Corporation | Fast computation of a single coefficient in an inverse polynomial |
JP5677252B2 (ja) * | 2010-09-24 | 2015-02-25 | ミツビシ・エレクトリック・リサーチ・ラボラトリーズ・インコーポレイテッド | 第1のベクトルおよび第2のベクトルに関数を適用した結果を求めるための方法、および第3のプロセッサを用いて第1のベクトルおよび第2のベクトルに関数を適用した結果を求めるためのシステム |
FR2969875B1 (fr) * | 2010-12-23 | 2013-01-04 | Thales Sa | Procede et systeme pour l'authentification multi-modale multi-seuil utilisant le partage de secret |
US8891772B2 (en) * | 2011-06-17 | 2014-11-18 | Microsoft Corporation | Cloud key escrow system |
US8627508B2 (en) | 2011-06-17 | 2014-01-07 | Microsoft Corporation | Cloud key directory for federating data exchanges |
US9281941B2 (en) | 2012-02-17 | 2016-03-08 | International Business Machines Corporation | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
CN102594820B (zh) * | 2012-02-17 | 2014-09-10 | 南京邮电大学 | 基于物联网场景的安全多方计算隐私保护测评方法 |
WO2014175326A1 (ja) * | 2013-04-24 | 2014-10-30 | 日本電気株式会社 | 暗号文照合システムと方法とプログラム |
WO2014175334A1 (ja) * | 2013-04-24 | 2014-10-30 | 日本電気株式会社 | 暗号文照合システムと方法とプログラム |
WO2014175320A1 (ja) * | 2013-04-24 | 2014-10-30 | 日本電気株式会社 | 暗号文照合システムと方法とプログラム |
CN103248478A (zh) * | 2013-05-08 | 2013-08-14 | 天津大学 | 基于多方安全协议的密封式电子拍卖方案与验证方法 |
US9646306B1 (en) | 2014-02-11 | 2017-05-09 | Square, Inc. | Splicing resistant homomorphic passcode encryption |
US10719828B2 (en) * | 2014-02-11 | 2020-07-21 | Square, Inc. | Homomorphic passcode encryption |
EP3089091B1 (en) | 2014-05-02 | 2020-03-11 | Barclays Execution Services Limited | Transaction authentication |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
JP6384314B2 (ja) * | 2014-12-22 | 2018-09-05 | 富士通株式会社 | 情報処理方法、情報処理プログラムおよび情報処理装置 |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
US10079674B2 (en) * | 2015-02-26 | 2018-09-18 | New York University | Systems and methods for privacy-preserving functional IP verification utilizing fully homomorphic encryption |
US10958452B2 (en) | 2017-06-06 | 2021-03-23 | Analog Devices, Inc. | System and device including reconfigurable physical unclonable functions and threshold cryptography |
JP2021502636A (ja) * | 2017-11-09 | 2021-01-28 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | 検証可能な計算のためのcライクなスマートコントラクトの算術的強化 |
CN111324897B (zh) * | 2018-12-13 | 2022-08-09 | 中国科学院深圳先进技术研究院 | 一种图像加密方法、装置及图像解密方法、装置 |
US11120160B2 (en) | 2019-05-31 | 2021-09-14 | Advanced New Technologies Co., Ltd. | Distributed personal data storage and encrypted personal data service based on secure computation |
JP7294431B2 (ja) * | 2019-09-18 | 2023-06-20 | 日本電気株式会社 | 情報照合システム、クライアント端末、サーバ、情報照合方法、及び情報照合プログラム |
US11250116B2 (en) * | 2019-10-25 | 2022-02-15 | Visa International Service Association | Optimized private biometric matching |
CN111026359B (zh) * | 2019-12-17 | 2021-10-15 | 支付宝(杭州)信息技术有限公司 | 多方联合判定隐私数据的数值范围的方法和装置 |
US11038683B1 (en) * | 2020-01-24 | 2021-06-15 | Via Science, Inc. | Secure data processing |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US11799643B2 (en) * | 2021-01-19 | 2023-10-24 | Bank Of America Corporation | Collaborative architecture for secure data sharing |
US12081644B2 (en) * | 2021-02-01 | 2024-09-03 | Sap Se | Efficient distributed privacy-preserving computations |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5619575A (en) * | 1994-08-22 | 1997-04-08 | United Technologies Automotive, Inc. | Pseudorandom composition-based cryptographic authentication process |
US6035041A (en) * | 1997-04-28 | 2000-03-07 | Certco, Inc. | Optimal-resilience, proactive, public-key cryptographic system and method |
US20050242923A1 (en) * | 1998-04-16 | 2005-11-03 | David Pearson | Passive entry systems for vehicles and other applications |
US6862354B1 (en) * | 2000-09-29 | 2005-03-01 | Cisco Technology, Inc. | Stream cipher encryption method and apparatus that can efficiently seek to arbitrary locations in a key stream |
US20030012372A1 (en) * | 2001-04-25 | 2003-01-16 | Cheng Siu Lung | System and method for joint encryption and error-correcting coding |
WO2005043808A1 (en) | 2003-11-03 | 2005-05-12 | Koninklijke Philips Electronics N.V. | Method and device for efficient multiparty multiplication |
-
2006
- 2006-12-07 EP EP06832130.6A patent/EP1964305B1/en active Active
- 2006-12-07 WO PCT/IB2006/054646 patent/WO2007069146A2/en active Application Filing
- 2006-12-07 JP JP2008545178A patent/JP5537032B2/ja active Active
- 2006-12-07 US US12/096,802 patent/US9077509B2/en active Active
- 2006-12-07 CN CN2006800469412A patent/CN101331706B/zh active Active
- 2006-12-07 ES ES06832130.6T patent/ES2509345T3/es active Active
-
2015
- 2015-05-19 US US14/715,666 patent/US10050785B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9077509B2 (en) | 2015-07-07 |
EP1964305A2 (en) | 2008-09-03 |
JP5537032B2 (ja) | 2014-07-02 |
US20080304657A1 (en) | 2008-12-11 |
JP2009519490A (ja) | 2009-05-14 |
EP1964305B1 (en) | 2014-07-30 |
CN101331706B (zh) | 2012-09-05 |
US20150288519A1 (en) | 2015-10-08 |
CN101331706A (zh) | 2008-12-24 |
WO2007069146A3 (en) | 2007-10-11 |
WO2007069146A2 (en) | 2007-06-21 |
US10050785B2 (en) | 2018-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2509345T3 (es) | Cálculo de protocolo de descifrado de umbral de seguridad | |
MX2024004991A (es) | Metodo de codificacion de datos tridimensionales, metodo de decodificacion de datos tridimensionales, dispositivo codificador de datos tridimensionales y dispositivo decodificador de datos tridimensionales. | |
ATE490618T1 (de) | Sichere multicast-übertragung | |
ES2566160T3 (es) | Método para generar una clave de cifrado/descifrado | |
EP2560318A3 (en) | Cryptographic circuit and method therefor | |
SG165174A1 (en) | Method of authenticating a consumable | |
TW200802110A (en) | Method of coded marking of a product of small size, and marked product obtained according to said method | |
Juneja et al. | An improved LSB based Steganography with enhanced Security and Embedding/Extraction | |
EP2544400A3 (en) | PUF based Cryptographic communication system and cryptographic communication method | |
WO2008148784A3 (fr) | Procedes et dispositifs cryptographiques de generation pseudo-aleatoire de chiffrement de donnees et de hachage cryptographique d'un message | |
Rathod et al. | Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm) | |
NZ603822A (en) | Permutation data transform to enhance security | |
WO2006082984A3 (en) | Methods and apparatus for providing a message authentication code using a pipeline | |
WO2006071380A3 (en) | Securely field configurable device | |
GB2530972A (en) | Encrypted purging of data from content node storage | |
EP2658165A3 (en) | Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium | |
CO5611229A2 (es) | Sistemas y metodos para la autenticacion acustica de dos factores | |
WO2008091978A3 (en) | Methods and apparatus for enhancing privacy of objects associated with radio-frequency identification tags | |
JP2015072685A5 (es) | ||
SG165203A1 (en) | Information storage medium, authentication data generation method, and medium authentication system | |
EP2423918A3 (en) | Information processing device, information processing method, and program | |
JP2016525836A5 (es) | ||
Pitropakis et al. | A practical steganographic approach for matroska based high quality video files | |
WO2015166701A1 (ja) | 暗号化方法、プログラム、および、システム | |
WO2015188202A3 (en) | Point-to-point secure data store and communication system and method |