JP7582477B2 - 秘密計算システム、装置、方法及びプログラム - Google Patents

秘密計算システム、装置、方法及びプログラム Download PDF

Info

Publication number
JP7582477B2
JP7582477B2 JP2023532977A JP2023532977A JP7582477B2 JP 7582477 B2 JP7582477 B2 JP 7582477B2 JP 2023532977 A JP2023532977 A JP 2023532977A JP 2023532977 A JP2023532977 A JP 2023532977A JP 7582477 B2 JP7582477 B2 JP 7582477B2
Authority
JP
Japan
Prior art keywords
ciphertext
vector
calculation units
calculation
generate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2023532977A
Other languages
English (en)
Japanese (ja)
Other versions
JPWO2023281693A1 (https=
Inventor
亮 菊池
大 五十嵐
弘貴 須藤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Inc
NTT Inc USA
Original Assignee
Nippon Telegraph and Telephone Corp
NTT Inc USA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp, NTT Inc USA filed Critical Nippon Telegraph and Telephone Corp
Publication of JPWO2023281693A1 publication Critical patent/JPWO2023281693A1/ja
Application granted granted Critical
Publication of JP7582477B2 publication Critical patent/JP7582477B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/16Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Computational Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Algebra (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
JP2023532977A 2021-07-08 2021-07-08 秘密計算システム、装置、方法及びプログラム Active JP7582477B2 (ja)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2021/025769 WO2023281693A1 (ja) 2021-07-08 2021-07-08 秘密計算システム、装置、方法及びプログラム

Publications (2)

Publication Number Publication Date
JPWO2023281693A1 JPWO2023281693A1 (https=) 2023-01-12
JP7582477B2 true JP7582477B2 (ja) 2024-11-13

Family

ID=84801623

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2023532977A Active JP7582477B2 (ja) 2021-07-08 2021-07-08 秘密計算システム、装置、方法及びプログラム

Country Status (5)

Country Link
US (1) US12412487B2 (https=)
EP (1) EP4350561A4 (https=)
JP (1) JP7582477B2 (https=)
CN (1) CN117581227A (https=)
WO (1) WO2023281693A1 (https=)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014164145A (ja) 2013-02-26 2014-09-08 Nippon Telegr & Teleph Corp <Ntt> 秘密集合演算装置及び方法
WO2016120975A1 (ja) 2015-01-26 2016-08-04 株式会社日立製作所 データ集計分析システム及びその方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9043250B2 (en) * 2012-01-10 2015-05-26 Telcordia Technologies, Inc. Privacy-preserving aggregated data mining
US8572405B2 (en) * 2012-03-15 2013-10-29 Sap Ag Collusion-resistant outsourcing of private set intersection
WO2019203262A1 (ja) * 2018-04-20 2019-10-24 日本電信電話株式会社 秘密集約順位システム、秘密計算装置、秘密集約順位方法、およびプログラム
CN109255247B (zh) * 2018-08-14 2020-08-14 阿里巴巴集团控股有限公司 多方安全计算方法及装置、电子设备
JP7121195B2 (ja) * 2020-02-14 2022-08-17 グーグル エルエルシー セキュアマルチパーティリーチおよび頻度推定
EP4165846B1 (en) * 2020-06-12 2024-01-03 Swiss Reinsurance Company Ltd. Digital cross-network platform, and method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014164145A (ja) 2013-02-26 2014-09-08 Nippon Telegr & Teleph Corp <Ntt> 秘密集合演算装置及び方法
WO2016120975A1 (ja) 2015-01-26 2016-08-04 株式会社日立製作所 データ集計分析システム及びその方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
菊池亮 他,横断的動線分析を秘密計算でやってみよう,2020年 暗号と情報セキュリティシンポジウム予稿集,2020年01月,pp.1-8

Also Published As

Publication number Publication date
JPWO2023281693A1 (https=) 2023-01-12
EP4350561A1 (en) 2024-04-10
CN117581227A (zh) 2024-02-20
US12412487B2 (en) 2025-09-09
WO2023281693A1 (ja) 2023-01-12
EP4350561A4 (en) 2025-04-16
US20250131855A1 (en) 2025-04-24

Similar Documents

Publication Publication Date Title
JP6973632B2 (ja) 秘密集約総和システム、秘密計算装置、秘密集約総和方法、およびプログラム
JP6973633B2 (ja) 秘密集約最大値システム、秘密集約最小値システム、秘密計算装置、秘密集約最大値方法、秘密集約最小値方法、およびプログラム
WO2019114122A1 (zh) 登录信息的加密方法、装置、电子设备及介质
WO2019130528A1 (ja) 変換鍵生成装置、暗号文変換装置、秘匿情報処理システム、変換鍵生成方法、変換鍵生成プログラム、暗号文変換方法及び暗号文変換プログラム
JP7589815B2 (ja) 秘密計算システム、装置、方法及びプログラム
JP6973634B2 (ja) 秘密集約中央値システム、秘密計算装置、秘密集約中央値方法、およびプログラム
JP2020519968A (ja) ビット分解秘密計算装置、ビット結合秘密計算装置、方法およびプログラム
US11200346B2 (en) Secure computation for reading multiple elements from a secure text array
JP7359225B2 (ja) 秘密最大値計算装置、方法及びプログラム
Bijwe et al. Implementing grover oracle for lightweight block ciphers under depth constraints
JP6977882B2 (ja) 秘密一括近似システム、秘密計算装置、秘密一括近似方法、およびプログラム
JP7540599B2 (ja) 秘密計算システム、秘密計算装置、秘密計算方法、及びプログラム
JP7582477B2 (ja) 秘密計算システム、装置、方法及びプログラム
WO2020070973A1 (ja) 復号装置、暗号システム、復号方法及び復号プログラム
CN106796765B (zh) 非减序列判定装置、非减序列判定方法以及记录介质
JP7772205B2 (ja) 秘密計算装置、秘密計算方法、プログラム
US20250192983A1 (en) Privacy-preserving and non-interactive training of regression trees
JP7747192B2 (ja) 秘密属性選択システム、秘密属性選択装置、秘密属性選択方法、プログラム
WO2025062484A1 (ja) 秘密パーセンタイル値計算装置、秘密パーセンタイル値計算方法
US20250150265A1 (en) Secure computation apparatus, secure computation method, and program
JP7743929B2 (ja) 秘密検索システム、秘密検索装置、秘密検索方法、プログラム
JP7747215B2 (ja) クライアント装置、秘密テーブル管理システム、レコード登録要求生成方法、レコード登録方法、処理要求実行方法、プログラム
US20250192979A1 (en) Training optimization of regression trees using fully homomorphic encryption
US20250148095A1 (en) Secure computation apparatus, secure computation method, and program
CN114981864B (zh) 秘密选择积计算系统、秘密选择积计算方法、秘密计算装置以及程序产品

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20231214

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20241001

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20241014

R150 Certificate of patent or registration of utility model

Ref document number: 7582477

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

S533 Written request for registration of change of name

Free format text: JAPANESE INTERMEDIATE CODE: R313533

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350