Title:
DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND PROGRAM
Document Type and Number:
WIPO Patent Application WO/2013/080320
Kind Code:
A1
Abstract:
A storage portion (301) stores a public key generated on the basis of a doubly homomorphic encryption algorithm, and a template used for authentication of data encrypted using the public key. A random number generator (203), using at least a portion of the public key in the storage portion (301), generates a random number. A template updater (307) performs an operation using the random number generated by a random number generator (305), and updates the template. The storage portion (301) stores the updated template, overwriting the template prior to the update.
More Like This:
Inventors:
HATTORI MITSUHIRO (JP)
HIRANO TAKATO (JP)
MORI TAKUMI (JP)
ITO TAKASHI (JP)
MATSUDA NORI (JP)
HIRANO TAKATO (JP)
MORI TAKUMI (JP)
ITO TAKASHI (JP)
MATSUDA NORI (JP)
Application Number:
PCT/JP2011/077623
Publication Date:
June 06, 2013
Filing Date:
November 30, 2011
Export Citation:
Assignee:
MITSUBISHI ELECTRIC CORP (JP)
HATTORI MITSUHIRO (JP)
HIRANO TAKATO (JP)
MORI TAKUMI (JP)
ITO TAKASHI (JP)
MATSUDA NORI (JP)
HATTORI MITSUHIRO (JP)
HIRANO TAKATO (JP)
MORI TAKUMI (JP)
ITO TAKASHI (JP)
MATSUDA NORI (JP)
International Classes:
G09C1/00; H04L9/30
Domestic Patent References:
WO2011052056A1 | 2011-05-05 | |||
WO2011052056A1 | 2011-05-05 |
Foreign References:
JP2008521025A | 2008-06-19 | |||
JP2011211593A | 2011-10-20 | |||
JP2007293807A | 2007-11-08 |
Other References:
GOLLE, P. ET AL.: "Universal Re-encryption for Mixnets", LECTURE NOTES IN COMPUTER SCIENCE, vol. 2964, 30 January 2004 (2004-01-30), pages 163 - 178, XP019002807
BONEH, D. ET AL.: "Evaluating 2-DNF Formulas on Ciphertexts", LECTURE NOTES IN COMPUTER SCIENCE, vol. 3378, 27 January 2005 (2005-01-27), pages 325 - 341, XP047029378
OKAMOTO, T. ET AL.: "Homomorphic Encryption and Signatures from Vector Decomposition", LECTURE NOTES IN COMPUTER SCIENCE, vol. 5209, 25 August 2008 (2008-08-25), pages 57 - 74, XP008155972
MITSUHIRO HATTORI ET AL.: "Secure Biometric Authentication Using 2-DNF Homomorphic Encryption", IEICE TECHNICAL REPORT, vol. 109, no. 272, 5 November 2009 (2009-11-05), pages 113 - 120, XP008171585
TAKATO HIRANO; TAKUMI MORI; MITSUHIRO HATTORI; TAKASHI ITO; NORI MATSUDA: "Homomorphic encryption based countermeasure against active attacks in privacy-preserving biometric authentication", IEICE TRANSACTIONS, ISEC 2010-73, 2011, pages 7 - 14
T. OKAMOTO; K. TAKASHIMA: "Homomorphic encryption and signatures from vector decomposition", PAIRING 2008, LECTURE NOTES IN COMPUTER SCIENCE, vol. 5209, 2008, pages 57 - 74, XP019103359
D. BONEH; E.-J. GOH; K. NISSIM: "Evaluating 2-DNF formulas on ciphertexts", THEORY OF CRYPTOGRAPHY CONFERENCE, LECTURE NOTES IN COMPUTER SCIENCE, vol. 3378, 2005, pages 325 - 341, XP047029378
C. GENTRY: "Fully homomorphic encryption using ideal lattices", ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, pages 169 - 178, XP058164708, DOI: doi:10.1145/1536414.1536440
D. FREEMAN; M. SCOTT; E. TESKE: "A taxonomy of pairing-friendly elliptic curves", JOURNAL OF CRYPTOLOGY, June 2009 (2009-06-01)
See also references of EP 2787681A4
BONEH, D. ET AL.: "Evaluating 2-DNF Formulas on Ciphertexts", LECTURE NOTES IN COMPUTER SCIENCE, vol. 3378, 27 January 2005 (2005-01-27), pages 325 - 341, XP047029378
OKAMOTO, T. ET AL.: "Homomorphic Encryption and Signatures from Vector Decomposition", LECTURE NOTES IN COMPUTER SCIENCE, vol. 5209, 25 August 2008 (2008-08-25), pages 57 - 74, XP008155972
MITSUHIRO HATTORI ET AL.: "Secure Biometric Authentication Using 2-DNF Homomorphic Encryption", IEICE TECHNICAL REPORT, vol. 109, no. 272, 5 November 2009 (2009-11-05), pages 113 - 120, XP008171585
TAKATO HIRANO; TAKUMI MORI; MITSUHIRO HATTORI; TAKASHI ITO; NORI MATSUDA: "Homomorphic encryption based countermeasure against active attacks in privacy-preserving biometric authentication", IEICE TRANSACTIONS, ISEC 2010-73, 2011, pages 7 - 14
T. OKAMOTO; K. TAKASHIMA: "Homomorphic encryption and signatures from vector decomposition", PAIRING 2008, LECTURE NOTES IN COMPUTER SCIENCE, vol. 5209, 2008, pages 57 - 74, XP019103359
D. BONEH; E.-J. GOH; K. NISSIM: "Evaluating 2-DNF formulas on ciphertexts", THEORY OF CRYPTOGRAPHY CONFERENCE, LECTURE NOTES IN COMPUTER SCIENCE, vol. 3378, 2005, pages 325 - 341, XP047029378
C. GENTRY: "Fully homomorphic encryption using ideal lattices", ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, pages 169 - 178, XP058164708, DOI: doi:10.1145/1536414.1536440
D. FREEMAN; M. SCOTT; E. TESKE: "A taxonomy of pairing-friendly elliptic curves", JOURNAL OF CRYPTOLOGY, June 2009 (2009-06-01)
See also references of EP 2787681A4
Attorney, Agent or Firm:
MIZOI, Shoji et al. (JP)
Shoji Mizoi (JP)
Shoji Mizoi (JP)
Download PDF:
Claims: