WO2021149105A1 - 秘密計算装置、秘密計算方法、およびプログラム - Google Patents

秘密計算装置、秘密計算方法、およびプログラム Download PDF

Info

Publication number
WO2021149105A1
WO2021149105A1 PCT/JP2020/001682 JP2020001682W WO2021149105A1 WO 2021149105 A1 WO2021149105 A1 WO 2021149105A1 JP 2020001682 W JP2020001682 W JP 2020001682W WO 2021149105 A1 WO2021149105 A1 WO 2021149105A1
Authority
WO
WIPO (PCT)
Prior art keywords
secret
value
calculation
secret calculation
calculation unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2020/001682
Other languages
English (en)
French (fr)
Japanese (ja)
Inventor
大 五十嵐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Inc
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to CN202080093270.5A priority Critical patent/CN114981859B/zh
Priority to EP20915434.3A priority patent/EP4095829A4/en
Priority to AU2020424993A priority patent/AU2020424993B2/en
Priority to JP2021572127A priority patent/JP7318743B2/ja
Priority to US17/790,769 priority patent/US11934564B2/en
Priority to PCT/JP2020/001682 priority patent/WO2021149105A1/ja
Publication of WO2021149105A1 publication Critical patent/WO2021149105A1/ja
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/544Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices for evaluating functions by calculation
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Definitions

  • the present invention relates to a secret calculation technique.
  • Non-Patent Document 1 describes a method of performing such a calculation by secret calculation.
  • Non-Patent Document 1 has a problem that the calculation cost is large.
  • the present invention has been made in view of these points, and reduces the calculation cost when one secret sharing value is divided by a plurality of divisors or right-shifted by a plurality of shift amounts in a secret calculation.
  • the purpose is to do.
  • the secret sharing value [q] of the quotient q of a / p is obtained by the secret sharing value [a] and the secret calculation using the method p, and the secret sharing value [a], [q], the divisor d 0 , ..., D.
  • [ ⁇ ] is the secret dispersion value of ⁇
  • a is a real number
  • n is an integer of 2 or more
  • d 0 is a real number
  • d n-1 is a divisor of a real number
  • p is a positive integer. It is a law
  • q is the quotient of a positive integer.
  • the secret sharing value [q] is diverted to the calculation of a plurality of [a / d 0 ], ..., [A / d n-1 ], one secret sharing value is used in a plurality of secret calculations. It is possible to reduce the calculation cost when dividing by a divisor or shifting to the right by multiple shift amounts.
  • FIG. 1 is a block illustrating the functional configuration of the secret calculation device of the first embodiment.
  • FIG. 2 is a flow chart for explaining the processing of the first embodiment.
  • FIG. 3 is a block illustrating the functional configuration of the secret calculation device of the second embodiment.
  • FIG. 4A is a block diagram illustrating the details of the secret calculation unit 21 of FIG.
  • FIG. 4B is a block diagram illustrating the details of the secret calculation unit 212 of FIG. 4A.
  • FIG. 5A is a flow chart for explaining the processing of the second embodiment.
  • FIG. 5B is a flow chart for exemplifying the details of step S21 of FIG. 5A.
  • FIG. 5C is a flow chart for exemplifying the details of step S212 of FIG. 5B.
  • FIG. 6 is a block diagram for explaining a hardware configuration.
  • one secret sharing value (share) may be divided by a plurality of divisors or may be shifted to the right by a plurality of shift amounts.
  • such processing is streamlined.
  • the real number a to be calculated is generally expressed as in the equation (1), and the additive secret-shared value ai is used as the secret-sharing value [a].
  • i 0, ..., M-1
  • m is an integer of 1 or more (for example, m is an integer of 2 or more)
  • p is a positive integer method.
  • the public decimal point position for an integer on the ring it can be regarded as a fixed-point real number.
  • the fixed-point real number represented on the ring in this way is simply expressed as a real number.
  • the secret sharing value [q] is obtained once, the value obtained by dividing the real number a by a plurality of divisors or right-shifting by a plurality of shift amounts is calculated by secret calculation.
  • the calculation of quotient in secret calculation requires a large amount of communication, and if the number of calculations can be reduced, the processing efficiency can be greatly improved.
  • the communication volume is reduced by 30% as compared with the case where the public value division is performed independently by the secret calculation.
  • the amount of communication is reduced by 60% compared to the case where the public value division is performed independently by secret calculation. Since the right shift is equivalent to the division by a power of 2, the same applies to the process of obtaining the value of the real number a right-shifted by a plurality of shift amounts by secret calculation.
  • the secret calculation device 1 of the first embodiment has secret calculation units 11 and 12 and a control unit 19.
  • the secret calculation device 1 executes each process under the control of the control unit 19.
  • [ ⁇ ] is the secret dispersion value of ⁇
  • a is a real number
  • n is an integer of 2 or more
  • d 0 is a real number
  • d n-1 is a divisor of a real number
  • p is a positive integer.
  • q is the quotient of a positive integer.
  • the secret-sharing value [ ⁇ ] is an additive secret-sharing value ⁇ i by expressing the real number ⁇ as in Eq. (3). That is, [ ⁇ ] is a secret sharing value (share) in which the element ⁇ on the quotient ring modulo p is linearly secret-shared.
  • the secret sharing value [a] of the real number a, the method p of the positive integer, the divisors d 0 , ..., D n-1 are input to the secret computing device 1 (step S10).
  • the secret sharing value [a] and the method p are input to the secret calculation unit 11.
  • the secret calculation unit 11 obtains and outputs the secret sharing value [q] of the quotient q of a / p by the secret calculation using the secret sharing value [a] and the method p (step S11).
  • the secret sharing values [a], [q], divisors d 0 , ..., d n-1 and method p are input to the secret calculation unit 12.
  • step S11 since one secret sharing value [q] obtained in step S11 is shared for the secret calculation of a plurality of [a / d 0 ], ..., [A / d n-1], the calculation cost Can be reduced.
  • one of the two public values m 0 and m 1 is multiplied by the secret sharing value [a] of the real number a according to the condition c ⁇ ⁇ 0, 1 ⁇ . If the size of the published values m 0 and m 1 is large, the effective number of bits of the multiplied value (the number of bits required to express that number in binary) increases, and the number cannot be multiplied any more. Therefore, it may be necessary to shift to the right. In the present embodiment, such processing is streamlined.
  • the secret calculation device 2 of the present embodiment has secret calculation units 21 and 22 and a control unit 29.
  • the secret calculation device 2 executes each process under the control of the control unit 29.
  • the secret calculation unit 21 of the present embodiment has secret calculation units 211 and 212.
  • the secret calculation unit 212 of the present embodiment includes a public value calculation unit 212a, a secret calculation unit 212b, and a secret calculation unit 212c.
  • the secret computing device 2 has a secret sharing value [a] of a real number a, a secret sharing value [c] of a value c ⁇ ⁇ 0,1 ⁇ representing a condition, and a public value.
  • the real multipliers m 0 , m 1 , and the method p are input (step S20).
  • the secret sharing value [a], the multipliers m 0 , m 1 , and the method p are input to the secret calculation unit 21.
  • the secret calculation unit 21 obtains and outputs secret sharing values [m 0 a] and [m 1 a] by secret calculation using the secret sharing value [a] and the multipliers m 0 , m 1 , and the method p (step). S21). A specific example of the process in step S21 will be described later.
  • the secret sharing values [m 0 a], [m 1 a], and [c] are input to the secret calculation unit 22.
  • step S21 A specific example of processing in step S21 will be described.
  • the process of step S21 is made more efficient by using the method of the second embodiment.
  • p is the method of positive integers
  • q is the quotient of positive integers.
  • the secret sharing value [a] and the method p are input to the secret calculation unit 211 of the secret calculation device 21 (FIG. 4A).
  • the secret calculation unit 21 obtains and outputs the secret sharing value [q] of the quotient q of a / p by the secret calculation using the secret sharing value [a] and the method p (step S211).
  • the secret sharing values [a], [q], divisors d 0 , d 1, and method p are input to the secret calculation unit 212.
  • a specific example of the process of step S212 will be described below.
  • step S212 ⁇ Specific example of processing in step S212>
  • a right shift may be required in step S212.
  • the calculation cost is reduced by simultaneously performing the right shift and the multiplication by the published values m 0 and m 1.
  • positive integers which are the number of bits representing these right shift amounts, are represented as ⁇ 0 and ⁇ 1, respectively.
  • ⁇ 0 ⁇ 1 or ⁇ 0 ⁇ ⁇ 1.
  • the multipliers m 0 and m 1 and the positive integers ⁇ 0 and ⁇ 1 are input to the public value calculation unit 212a of the secret calculation unit 212.
  • Public value calculating unit 212a is a multiplier m 0, m 1 and a positive integer .sigma.0, public values 2 ⁇ 0 / m 0, 2 ⁇ 1 / m 1 the obtained output using .sigma.1 (step S212a).
  • the secret sharing values [a] and [q], the method p, and the public values 2 ⁇ 0 / m 0 and 2 ⁇ 1 / m 1 are input to the secret calculation unit 212b.
  • the secret calculation unit 212b divides the public value using the secret sharing values [a] and [q] and the method p and the public values 2 ⁇ 0 / m 0 and 2 ⁇ 1 / m 1 obtained by the public value calculation unit 212a.
  • Secret calculation [a + qp] / (2 ⁇ 0 / m 0 ), [a + qp] / (2 ⁇ 1 / m 1 ) is performed, and (a + qp) m 0 is right-shifted by ⁇ 0 bits.
  • m 0 ] and (a + qp) m 1 are right-shifted by ⁇ 1 bit to obtain a secret sharing value [(a + qp) m 1 ] and output (step S212b).
  • the secret sharing value [(a + qp) m 0 ], [(a + qp) m 1 ], [q], method p, multiplier m 0 , m 1 are input to the secret calculation unit 212c.
  • the if-then-else gate generates a secret sharing value [mc] corresponding to the secret sharing value [ c ], that is, [m 0 ] or [m 1 ], and then [ mc ]. Multiplying [a] with [m c a].
  • the secret sharing value [m 0 a] and give [m 1 a] step S21
  • the secret sharing value [c], [m 0 a ], [m 1 a ] by the private calculation using the secret variance of m c a [c? m 0 a: m 1 a] is obtained (step S22).
  • step S21 By executing step S21 before step S22, the secret sharing value [m ca ] is multiplied by the public value of the public value multiplier m 0 , m 1 and the secret sharing value [a], which have a low calculation cost. Can be achieved by. Therefore, in this embodiment, the calculation cost can be reduced. In particular, even if a right shift is required in step S212 when the multipliers m 0 and m 1 are large as in the specific example of the processing in step S212, the multiplication by the right shift and the published values m 0 and m 1 The calculation cost can be reduced by performing and at the same time. This process can be applied because the multipliers m 0 and m 1 are public values, which can be achieved by executing step S22 after step S21. Further, as in the specific example of the process of step S21, the calculation cost can be further reduced by improving the efficiency of the process of step S21 by using the method of the second embodiment.
  • the secret computing devices 1 and 2 in the embodiment include, for example, a processor (hardware processor) such as a CPU (central processing unit) and a memory such as a RAM (random-access memory) and a ROM (read-only memory).
  • a processor such as a CPU (central processing unit) and a memory such as a RAM (random-access memory) and a ROM (read-only memory).
  • This computer may have one processor and memory, or may have a plurality of processors and memory.
  • This program may be installed in a computer or may be recorded in a ROM or the like in advance.
  • a part or all of the processing units may be configured by using an electronic circuit that realizes a processing function independently, instead of an electronic circuit (circuitry) that realizes a function configuration by reading a program like a CPU. ..
  • the electronic circuit constituting one device may include a plurality of CPUs.
  • FIG. 6 is a block diagram illustrating the hardware configurations of the secret calculation devices 1 and 2 in the embodiment.
  • the secret computing device 1 of this example includes a CPU (Central Processing Unit) 10a, an output unit 10b, an output unit 10c, a RAM (RandomAccessMemory) 10d, a ROM (ReadOnlyMemory) 10e, and an auxiliary. It has a storage device 10f and a bus 10g.
  • the CPU 10a of this example has a control unit 10aa, a calculation unit 10ab, and a register 10ac, and executes various arithmetic processes according to various programs read into the register 10ac.
  • the output unit 10b is an output terminal, a display, or the like on which data is output.
  • the output unit 10c is a LAN card or the like controlled by the CPU 10a that has read a predetermined program.
  • the RAM 10d is a SRAM (Static Random Access Memory), a DRAM (Dynamic Random Access Memory), or the like, and has a program area 10da in which a predetermined program is stored and a data area 10db in which various data are stored.
  • the auxiliary storage device 10f is, for example, a hard disk, MO (Magneto-Optical disc), a semiconductor memory, or the like, and has a program area 10fa for storing a predetermined program and a data area 10fb for storing various data.
  • the bus 10g connects the CPU 10a, the output unit 10b, the output unit 10c, the RAM 10d, the ROM 10e, and the auxiliary storage device 10f so that information can be exchanged.
  • the CPU 10a writes the program stored in the program area 10fa of the auxiliary storage device 10f to the program area 10da of the RAM 10d according to the read OS (Operating System) program.
  • the CPU 10a writes various data stored in the data area 10fb of the auxiliary storage device 10f to the data area 10db of the RAM 10d. Then, the address on the RAM 10d in which this program or data is written is stored in the register 10ac of the CPU 10a.
  • the control unit 10ab of the CPU 10a sequentially reads out these addresses stored in the register 10ac, reads a program or data from the area on the RAM 10d indicated by the read address, and causes the arithmetic unit 10ab to sequentially execute the operations indicated by the program.
  • the calculation result is stored in the register 10ac. With such a configuration, the functional configuration of the secret calculation devices 1 and 2 is realized.
  • the above program can be recorded on a computer-readable recording medium.
  • a computer-readable recording medium is a non-transitory recording medium. Examples of such a recording medium are a magnetic recording device, an optical disk, a photomagnetic recording medium, a semiconductor memory, and the like.
  • the distribution of this program is carried out, for example, by selling, transferring, renting, etc., a portable recording medium such as a DVD or CD-ROM on which the program is recorded.
  • the program may be stored in the storage device of the server computer, and the program may be distributed by transferring the program from the server computer to another computer via a network.
  • the computer that executes such a program first temporarily stores, for example, the program recorded on the portable recording medium or the program transferred from the server computer in its own storage device. Then, when the process is executed, the computer reads the program stored in its own storage device and executes the process according to the read program.
  • a computer may read the program directly from a portable recording medium and execute processing according to the program, and further, the program is transferred from the server computer to this computer. Each time, the processing according to the received program may be executed sequentially.
  • the above processing is executed by a so-called ASP (Application Service Provider) type service that realizes the processing function only by the execution instruction and result acquisition without transferring the program from the server computer to this computer. May be.
  • the program in this embodiment includes information to be used for processing by a computer and equivalent to the program (data that is not a direct command to the computer but has a property of defining the processing of the computer, etc.).
  • the present device is configured by executing a predetermined program on a computer, but at least a part of these processing contents may be realized by hardware.
  • the present invention is not limited to the above-described embodiment.
  • the present invention can be used, for example, for the calculation of elementary functions such as inverse function, square root function, exponential function, and logarithmic function in machine learning and data mining performed by secret calculation while concealing data.
  • elementary functions such as inverse function, square root function, exponential function, and logarithmic function

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Software Systems (AREA)
  • Computational Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Complex Calculations (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Devices For Executing Special Programs (AREA)
  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
PCT/JP2020/001682 2020-01-20 2020-01-20 秘密計算装置、秘密計算方法、およびプログラム Ceased WO2021149105A1 (ja)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CN202080093270.5A CN114981859B (zh) 2020-01-20 2020-01-20 秘密计算装置、秘密计算方法、计算机程序产品以及记录介质
EP20915434.3A EP4095829A4 (en) 2020-01-20 2020-01-20 SECURE CALCULATION DEVICE, SECURE CALCULATION METHOD AND PROGRAM
AU2020424993A AU2020424993B2 (en) 2020-01-20 2020-01-20 Secure computation apparatus, secure computation method, and program
JP2021572127A JP7318743B2 (ja) 2020-01-20 2020-01-20 秘密計算装置、秘密計算方法、およびプログラム
US17/790,769 US11934564B2 (en) 2020-01-20 2020-01-20 Secure computation apparatus, secure computation method, and program
PCT/JP2020/001682 WO2021149105A1 (ja) 2020-01-20 2020-01-20 秘密計算装置、秘密計算方法、およびプログラム

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2020/001682 WO2021149105A1 (ja) 2020-01-20 2020-01-20 秘密計算装置、秘密計算方法、およびプログラム

Publications (1)

Publication Number Publication Date
WO2021149105A1 true WO2021149105A1 (ja) 2021-07-29

Family

ID=76992092

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2020/001682 Ceased WO2021149105A1 (ja) 2020-01-20 2020-01-20 秘密計算装置、秘密計算方法、およびプログラム

Country Status (6)

Country Link
US (1) US11934564B2 (https=)
EP (1) EP4095829A4 (https=)
JP (1) JP7318743B2 (https=)
CN (1) CN114981859B (https=)
AU (1) AU2020424993B2 (https=)
WO (1) WO2021149105A1 (https=)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014164144A (ja) * 2013-02-26 2014-09-08 Nippon Telegr & Teleph Corp <Ntt> 秘密表除算装置及び方法

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4288966B2 (ja) * 2003-03-07 2009-07-01 沖電気工業株式会社 秘密分散装置、秘密再構成装置、秘密分散再構成システム、秘密分散方法、及び秘密再構成方法
KR20050088506A (ko) * 2004-03-02 2005-09-07 삼성전자주식회사 다중 세정도를 지원하는 확장형 몽고메리 모듈러 곱셈기
US8995657B2 (en) * 2012-06-14 2015-03-31 Kabushiki Kaisha Toshiba Device and method for certifying one's own authenticity
CN103259650B (zh) * 2013-04-25 2015-12-09 河海大学 一种对诚实参与者公平的理性多秘密分享方法
CN105593919B (zh) * 2013-10-10 2018-01-30 日本电信电话株式会社 秘密商转移装置及方法、秘密比特分解装置及方法、秘密模数转换装置及方法
JP5957126B1 (ja) * 2015-06-24 2016-07-27 日本電信電話株式会社 秘密計算装置、秘密計算方法、およびプログラム
CN105007284B (zh) * 2015-08-12 2019-04-12 南京理工大学 多管理者群组共享数据中具有隐私保护的公开审计方法
GB2556902A (en) * 2016-11-24 2018-06-13 Payfont Ltd Method and system for securely storing data using a secret sharing scheme
EP3402118A1 (en) * 2017-05-10 2018-11-14 Koninklijke Philips N.V. Key agreement devices and method
JP7041951B2 (ja) * 2018-02-20 2022-03-25 惠市 岩村 入力者装置、演算支援装置、及びプログラム

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014164144A (ja) * 2013-02-26 2014-09-08 Nippon Telegr & Teleph Corp <Ntt> 秘密表除算装置及び方法

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ALIASGARI, M. ET AL.: "Secure Computation on Floating Point Numbers", CRYPTOLOGY EPRINT ARCHIVE, 10 December 2012 (2012-12-10), pages 1 - 31, XP061007014, Retrieved from the Internet <URL:https://eprint.iacr.org/2012/405> *
IGARASHI, DAI: "Secure Real Number Operations for Secure A1 - 0(lpl)-Bit Communication and 0(1)-Round Right Shift Protocol", PROCEEDINGS OF COMPUTER SECURITY SYMPOSIUM 2019, 14 October 2019 (2019-10-14), Japan, pages 1557 - 1564, XP009530110, ISSN: 1882-0840 *
KANAOKA AKIRA, MIYANISHI YOHTARO, HAN XIAOGONG, KITAGAMI SHINJI, SATO FUMIAKI, URANO YOSHIYORI, SHIRATORI NORIO: "A Study of Lightweight Secure Multi-party Computation enabling Real Number Arithmetic", PROCEEDINGS OF THE 2014 COMPUTER SECURITY SYMPOSIUM, 15 October 2014 (2014-10-15), pages 682 - 687, XP055842838 *
See also references of EP4095829A4 *

Also Published As

Publication number Publication date
US11934564B2 (en) 2024-03-19
CN114981859B (zh) 2025-03-07
EP4095829A4 (en) 2023-10-18
JP7318743B2 (ja) 2023-08-01
US20230013830A1 (en) 2023-01-19
CN114981859A (zh) 2022-08-30
AU2020424993A1 (en) 2022-07-14
EP4095829A1 (en) 2022-11-30
JPWO2021149105A1 (https=) 2021-07-29
AU2020424993B2 (en) 2023-08-03

Similar Documents

Publication Publication Date Title
Ye et al. Low-complexity VLSI design of large integer multipliers for fully homomorphic encryption
CN109740115A (zh) 一种实现矩阵乘法运算的方法、装置及设备
US12452042B2 (en) Secure computation apparatus, secure computation method, and program
JP7318743B2 (ja) 秘密計算装置、秘密計算方法、およびプログラム
CN114981858B (zh) 秘密计算装置、秘密计算方法以及计算机程序产品
JP7290178B2 (ja) 秘密計算装置、秘密計算方法、およびプログラム
CN110800034A (zh) 秘密计算系统、秘密计算装置、秘密计算方法、程序以及记录介质
JP7205623B2 (ja) 秘密共役勾配法計算システム、秘密計算装置、共役勾配法計算装置、秘密共役勾配法計算方法、共役勾配法計算方法、およびプログラム
Ye et al. High-performance NTT architecture for large integer multiplication
WO2022219768A1 (ja) 関数変換装置、関数変換方法、およびプログラム
CN114981865B (zh) 秘密平方根计算系统、秘密归一化系统、它们的方法、秘密计算装置以及程序
CN119576409B (zh) stencil计算的方法、装置和计算设备
US20240143327A1 (en) Fast carry-calculation oriented redundancy-tolerated fixed-point number coding for massive parallel alu circuitry design in gpu, tpu, npu, ai infer chip, cpu, and other computing devices
WO2024224490A1 (ja) 秘密計算装置、秘密計算方法、およびプログラム
Tembhurne Parallel Multiplication of Big Integer on GPU
CN120179973A (zh) 一种矩阵计算方法及装置
JP2022180257A (ja) 内積計算装置、内積計算方法、および、内積計算プログラム
WO2021149101A1 (ja) 秘密選択積計算システム、秘密選択積計算方法、秘密計算装置、およびプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20915434

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021572127

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2020424993

Country of ref document: AU

Date of ref document: 20200120

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020915434

Country of ref document: EP

Effective date: 20220822

WWG Wipo information: grant in national office

Ref document number: 202080093270.5

Country of ref document: CN