Title:
SECRET INFORMATION RESTORABLE VALUE DISTRIBUTION SYSTEM AND METHOD
Document Type and Number:
WIPO Patent Application WO/2019/049408
Kind Code:
A1
Abstract:
Provided is a secret information restorable value distribution system. This method is designed to be executed by a computer and involves: a step in which n secret information restorable values are generated on the basis of secret information used to process predetermined information, the secret information being information that can be restored using at least k secret information restorable values among the generated n shares (n>=k>=2); a step in which the generated n secret information restorable values are stored in corresponding n physical storage devices; and a step in which the generated secret information is deleted.
Inventors:
NODA KEIICHI (JP)
YONEMOTO KUMIKO (JP)
YONEMOTO KUMIKO (JP)
Application Number:
PCT/JP2018/013207
Publication Date:
March 14, 2019
Filing Date:
March 29, 2018
Export Citation:
Assignee:
HEALTH MEDIA INC (JP)
International Classes:
H04L9/08; G09C1/00
Domestic Patent References:
WO2008096608A1 | 2008-08-14 | |||
WO2017082237A1 | 2017-05-18 |
Foreign References:
JP2009104575A | 2009-05-14 | |||
JP2007304962A | 2007-11-22 | |||
JP2007072613A | 2007-03-22 | |||
JP2007134952A | 2007-05-31 |
Other References:
KOGURE, JUN ET AL.: "Blockchain Technology for Next Generation ICT", FUJITSU SCIENCE TECHNOLOGY, vol. 68, no. 5, 1 September 2017 (2017-09-01), pages 56 - 61, XP055581298
See also references of EP 3681097A4
HIROSHI DOI: "Jouhou Security Sougou Kagaku", vol. 4, November 2012, INSTITUTE OF INFORMATION SECURITY, article "Himitsu Bunsan Hou To Sono Ouyou Ni Tsuite"
G. R. BLAKLEY: "Safeguarding cryptographic keys", PROC. OF THE NATIONAL COMPUTER CONFERENCE, vol. 48, 1979, pages 313 - 317, XP000566416, Retrieved from the Internet>
See also references of EP 3681097A4
HIROSHI DOI: "Jouhou Security Sougou Kagaku", vol. 4, November 2012, INSTITUTE OF INFORMATION SECURITY, article "Himitsu Bunsan Hou To Sono Ouyou Ni Tsuite"
G. R. BLAKLEY: "Safeguarding cryptographic keys", PROC. OF THE NATIONAL COMPUTER CONFERENCE, vol. 48, 1979, pages 313 - 317, XP000566416, Retrieved from the Internet
Attorney, Agent or Firm:
TANI & ABE, P.C. (JP)
Download PDF: