Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND PROGRAM
Document Type and Number:
WIPO Patent Application WO/2013/080320
Kind Code:
A1
Abstract:
A storage portion (301) stores a public key generated on the basis of a doubly homomorphic encryption algorithm, and a template used for authentication of data encrypted using the public key. A random number generator (203), using at least a portion of the public key in the storage portion (301), generates a random number. A template updater (307) performs an operation using the random number generated by a random number generator (305), and updates the template. The storage portion (301) stores the updated template, overwriting the template prior to the update.

Inventors:
HATTORI MITSUHIRO (JP)
HIRANO TAKATO (JP)
MORI TAKUMI (JP)
ITO TAKASHI (JP)
MATSUDA NORI (JP)
Application Number:
PCT/JP2011/077623
Publication Date:
June 06, 2013
Filing Date:
November 30, 2011
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
MITSUBISHI ELECTRIC CORP (JP)
HATTORI MITSUHIRO (JP)
HIRANO TAKATO (JP)
MORI TAKUMI (JP)
ITO TAKASHI (JP)
MATSUDA NORI (JP)
International Classes:
G09C1/00; H04L9/30
Domestic Patent References:
WO2011052056A12011-05-05
WO2011052056A12011-05-05
Foreign References:
JP2008521025A2008-06-19
JP2011211593A2011-10-20
JP2007293807A2007-11-08
Other References:
GOLLE, P. ET AL.: "Universal Re-encryption for Mixnets", LECTURE NOTES IN COMPUTER SCIENCE, vol. 2964, 30 January 2004 (2004-01-30), pages 163 - 178, XP019002807
BONEH, D. ET AL.: "Evaluating 2-DNF Formulas on Ciphertexts", LECTURE NOTES IN COMPUTER SCIENCE, vol. 3378, 27 January 2005 (2005-01-27), pages 325 - 341, XP047029378
OKAMOTO, T. ET AL.: "Homomorphic Encryption and Signatures from Vector Decomposition", LECTURE NOTES IN COMPUTER SCIENCE, vol. 5209, 25 August 2008 (2008-08-25), pages 57 - 74, XP008155972
MITSUHIRO HATTORI ET AL.: "Secure Biometric Authentication Using 2-DNF Homomorphic Encryption", IEICE TECHNICAL REPORT, vol. 109, no. 272, 5 November 2009 (2009-11-05), pages 113 - 120, XP008171585
TAKATO HIRANO; TAKUMI MORI; MITSUHIRO HATTORI; TAKASHI ITO; NORI MATSUDA: "Homomorphic encryption based countermeasure against active attacks in privacy-preserving biometric authentication", IEICE TRANSACTIONS, ISEC 2010-73, 2011, pages 7 - 14
T. OKAMOTO; K. TAKASHIMA: "Homomorphic encryption and signatures from vector decomposition", PAIRING 2008, LECTURE NOTES IN COMPUTER SCIENCE, vol. 5209, 2008, pages 57 - 74, XP019103359
D. BONEH; E.-J. GOH; K. NISSIM: "Evaluating 2-DNF formulas on ciphertexts", THEORY OF CRYPTOGRAPHY CONFERENCE, LECTURE NOTES IN COMPUTER SCIENCE, vol. 3378, 2005, pages 325 - 341, XP047029378
C. GENTRY: "Fully homomorphic encryption using ideal lattices", ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, pages 169 - 178, XP058164708, DOI: doi:10.1145/1536414.1536440
D. FREEMAN; M. SCOTT; E. TESKE: "A taxonomy of pairing-friendly elliptic curves", JOURNAL OF CRYPTOLOGY, June 2009 (2009-06-01)
See also references of EP 2787681A4
Attorney, Agent or Firm:
MIZOI, Shoji et al. (JP)
Shoji Mizoi (JP)
Download PDF:
Claims: