Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECRET TAMPER DETECTION SYSTEM, SECRET TAMPER DETECTION DEVICE, METHOD FOR DETECTING SECRET TAMPER, AND PROGRAM
Document Type and Number:
WIPO Patent Application WO/2018/216512
Kind Code:
A1
Abstract:
The present invention makes it possible to detect tampering during secret calculation while preserving secrecy with little communication load. A random number generation unit (11) generates [→ri], [→si]. A random multiplication unit (12) calculates [→ti]:=[→ri →si]. A secret multiplication unit (13) calculates [→z]:=[→x→y]. A random number verification unit (14) discloses a pi,j-th element of [→ri], [→si], [→ti], and verifies whether the element works as multiplier. A random number substitution unit (15) substitutes the elements in [→ri], [→si], [→ti] except the pi,j-th element at random to generate [→r'i], [→s'i], [→t'i]. A subtraction value disclosure unit (16) calculates [→x−→r'i], [→y−→s'i]. A verification value calculation unit (17) calculates [→ci]:=[→z]−(→x−→r'i)[→y]−(→y−→s'i)[→r'i]−[→t'i]. A verification value confirmation unit (18) confirms that verification values ci are all zero.

Inventors:
IKARASHI DAI (JP)
Application Number:
PCT/JP2018/018389
Publication Date:
November 29, 2018
Filing Date:
May 11, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NIPPON TELEGRAPH & TELEPHONE (JP)
International Classes:
G09C1/00
Domestic Patent References:
WO2014112550A12014-07-24
WO2017099117A12017-06-15
WO2014112550A12014-07-24
Foreign References:
JP2016126354A2016-07-11
JP2016146530A2016-08-12
JP2016146530A2016-08-12
Other References:
FURUKAWA, JUN ET AL.: "High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority", CRYPTOLOGY EPRINT ARCHIVE, February 2017 (2017-02-01), pages 1 - 36, XP061022445, Retrieved from the Internet [retrieved on 20180803]
IKARASHI, DAI ET AL.: "Actively Private and Correct MPC Scheme in t < n/2 from Passively Secure Schemes with Small Overhead", CRYPTOLOGY EPRINT ARCHIVE, May 2014 (2014-05-01), pages 1 - 18, XP061016122, Retrieved from the Internet [retrieved on 20180803]
J. FURUKAWAY. LINDELLA. NOFO. WEINSTEIN: "High-throughput secure three-party computation for malicious adversaries and an honest majority", IACR CRYPTOLOGY EPRINT ARCHIVE, vol. 2016, 2016, pages 944
D. IKARASHIR. KIKUCHIK. HAMADAK. CHIDA: "Actively private and correct MPC scheme in t R. CRAMERI. DAMGARDY. ISHAI: "TCC, Vol. 3378 of Lecture Notes in Computer Science", vol. 3378, 2005, SPRINGER, article "Share conversion, pseudorandom secret-sharing and applications to secure computation", pages: 342 - 362
See also references of EP 3633656A4
Attorney, Agent or Firm:
NAKAO, Naoki et al. (JP)
Download PDF: