Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURE COMPUTATION METHOD, SECURE COMPUTATION SYSTEM, SECURE COMPUTATION DEVICE, AND PROGRAM
Document Type and Number:
WIPO Patent Application WO/2018/135511
Kind Code:
A1
Abstract:
The purpose of the present invention is to perform exponentiation at high speed by communicating a small number of times. A secure computation system including three or more secure computation devices computes a share [aν] that is the ν-th power of data a while concealing the data a from a share [a] of the data a. The share [a] of the data a and an exponent ν are inputted to an input unit (step S11). A local operation unit computes the pu-th power of a share [at] that is the t-th power of the data a without communicating with another secure computation device (step S12). A secure computation unit finds the share [aν] by computing a multiplication in which at least one number is a computation result [a( t*p^u )] of the local operation unit, by secure computation requiring communication with the other secure computation device (step S13). The share [aν] is outputted from an output unit (step S14).

Inventors:
IKARASHI, Dai (9-11 Midori-cho 3-chome, Musashino-sh, Tokyo 85, 〒1808585, JP)
KIKUCHI, Ryo (9-11 Midori-cho 3-chome, Musashino-sh, Tokyo 85, 〒1808585, JP)
Application Number:
JP2018/001135
Publication Date:
July 26, 2018
Filing Date:
January 17, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (5-1 Otemachi 1-chome, Chiyoda-ku Tokyo, 16, 〒1008116, JP)
International Classes:
G09C1/00
Domestic Patent References:
WO2016104476A12016-06-30
Other References:
IKARASHI, D. ET AL.: "Actively private and correct MPC scheme in t < n/2 from passively secure schemes with small overhead", CRYPTOLOGY EPRINT ARCHIVE, 19 May 2014 (2014-05-19), XP061016122, Retrieved from the Internet [retrieved on 20180309]
ARAKI, T. ET AL.: "High-throughput semi-honest secure three-party computation with an honest majority", PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS' 16), October 2016 (2016-10-01), pages 805 - 817, XP058280073, Retrieved from the Internet [retrieved on 20180309]
DAI, IKARASHI ET AL.: "MEVAL2 vs. CCS best paper on MPC-AES", COLLECTED SUMMARIES OF 2017 CIPHER AND INTELLIGENCE SECURITY SYMPOSIUM, 24 January 2017 (2017-01-24)
DAI IKARASHIRYO KIKUCHIKOKI HAMADAKOJI CHIDA: "Actively private and correct MPC scheme in t < n/2 from passively secure schemes with small overhead", IACR CRYPTOLOGY EPRINT ARCHIVE, vol. 2014, 2014, pages 304
TOSHINORI ARAKIJUN FURUKAWAYEHUDA LINDELLARIEL NOFKAZUMA OHARA: "High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority", ACM CCS, 2016
Attorney, Agent or Firm:
NAKAO, Naoki et al. (6th Floor, Shinjuku NSO Building 1-22, Shinjuku 3-chome, Shinjuku-k, Tokyo 22, 〒1600022, JP)
Download PDF: