Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECRET CALCULATION METHOD, SECRET CALCULATION SYSTEM, SECRET CALCULATION SERVER, REGISTRANT TERMINAL, USER TERMINAL AND PROGRAM
Document Type and Number:
WIPO Patent Application WO/2015/114947
Kind Code:
A1
Abstract:
The purpose of the present invention is to provide a secret calculation method whereby data processing is carried out while personal information is kept confidential. A registrant terminal (2) distributes registration entry passwords to secret calculation servers (1) via secret sharing. The secret calculation servers (1) verify whether or not the passwords match. The registrant terminal (2) distributes data to be processed to the secret sharing servers (1) via secret sharing. The secret calculation servers (1) store the data shares. A user terminal (3) distributes utilization entry passwords to the secret calculation servers (1) via secret sharing. The secret calculation servers (1) verify whether or not the passwords match. The user terminal (3) transmits a data processing request to the secret calculation servers (1). The secret calculation servers (1) carry out secret calculation on the data shares to create shares for processing results. The user terminal (3) combines the shares for processing results to obtain the processing results.

Inventors:
MIYATA TERUKO (JP)
TAKIGUCHI HIROYOSHI (JP)
KIRIBUCHI NAOTO (JP)
CHIDA KOJI (JP)
IKARASHI DAI (JP)
MOROHASHI GEMBU (JP)
FUJI HITOSHI (JP)
KAYAGUCHI SHIGERU (JP)
Application Number:
PCT/JP2014/082220
Publication Date:
August 06, 2015
Filing Date:
December 05, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NIPPON TELEGRAPH & TELEPHONE (JP)
International Classes:
G09C1/00; G06F21/60; G06F21/62
Other References:
GENBU MOROHASHI ET AL.: "Statistical Analysis System for Clinical Study Using Secure Multi-party Computation", COMPUTER SECURITY SYMPOSIUM 2012 RONBUNSHU, 23 October 2012 (2012-10-23), pages 533 - 538, XP055355836
KOKI HAMADA ET AL.: "Privacy preserving medical data analysis using a secure function evaluation system", IEICE TECHNICAL REPORT, vol. 111, no. 470, 1 March 2012 (2012-03-01), pages 177 - 181, XP008183901
DAN BOGDANOV; MARGUS NIITSOO; TOMAS TOFT; JAN WILLEMSON: "High-performance secure multi-party computation for data mining applications", INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 11, no. 6, 2012, pages 403 - 418
MARTIN BURKHART; MARIO STRASSER; DILIP MANY; XENOFONTAS DIMITROPOULOS: "SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics", USENIX SECURITY, 2010
RALUCA ADA POPA; CATHERINE M. S; REDFIELD, NICKOLAI ZELDOVICH; HARI BALAKRISHNAN: "CryptDB: Protecting Confidentiality with Encrypted Query Processing", SOSP '11 PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, pages 85 - 100
STOC '09 PROCEEDINGS OF THE 41ST ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, pages 169 - 178
ORACLE ADVANCED SECURITY, 24 January 2014 (2014-01-24), Retrieved from the Internet
SEARCHABLE ENCRYPTION PLATFORM SOFTWARE, 24 January 2014 (2014-01-24), Retrieved from the Internet
IBM INFOSPHERE OPTIM DATA MASKING SOLUTION FOR ORACLE E-BUSINESS SUITE, 24 January 2014 (2014-01-24), Retrieved from the Internet
FUJITSU DEVELOPS WORLD'S FIRST HOMOMORPHIC ENCRYPTION TECHNOLOGY THAT ENABLES STATISTICAL CALCULATIONS AND BIOMETRIC AUTHENTICATION, 24 January 2014 (2014-01-24), Retrieved from the Internet
NEC DEVELOPS WORLD'S FIRST SECRET COMPUTATION TECHNOLOGY THAT ENABLES SEARCH OVER ENCRYPTED DATABASES, 24 January 2014 (2014-01-24), Retrieved from the Internet
A. SHAMIR: "How to share a secret", COMMUNICATIONS OF THE ACM, vol. 22, no. 11, 1979, pages 612 - 613
KOJI CHIDA; KOKI HAMADA; DAI IKARASHI; KATSUMI TAKAHASHI: "A Three-Party Secure Function Evaluation with Lightweight Verifiability Revisited", COMPUTER SECURITY SYMPOSIUM, 2010
KOJI CHIDA; MASAYUKI TERADA; TAKAYASU YAMAGUCHI; DAI IKARASHI; KOKI HAMADA; KATSUMI TAKAHASHI: "A Secure Matching Protocol with Statistical Disclosure Control", IPSJ SIG TECHNICAL REPORT, vol. CSEC-52, no. 12, 2011
KOKI HAMADA; DAI IKARASHI; KOJI CHIDA; KATSUMI TAKAHASHI: "A linear time sorting algorithm on secure function evaluation", COMPUTER SECURITY SYMPOSIUM, 2011
THE R PROJECT FOR STATISTICAL COMPUTING, 14 January 2014 (2014-01-14), Retrieved from the Internet
Attorney, Agent or Firm:
NAKAO, Naoki et al. (JP)
Naoki Nakao (JP)
Download PDF: