To certainly prevent spoofing even if secret information about a user is leaked to a third party when using service.
First, in this secret information management system 1, the secret information S is divided into a plurality of pieces of data by use of a secret dispersion method (hereinafter called a secret dispersion method A) by original secret dispersion algorithm, and the division data D are stored in storage servers 3a, 3b and a terminal 2. When using the service, redivision data D' wherein the division data D are synchronized and updated are generated and stored in the secret information management system 1 and the terminal 2. When transmitting the division data D' generated by the terminal 2 to the secret information management system 1 from the terminal 2, the secret information management system 1 restores the original secret information S from each piece of the redivision data D' by use of the secret dispersion method A and transmits the secret information S to a service provision system 5.
COPYRIGHT: (C)2006,JPO&NCIPI
Makoto Kagaya
Susumu Nomura
JP2004053969A | ||||
JP11317734A | ||||
JP2003132229A | ||||
JP2004147218A |
秘密分散システムの暗号システムへの応用について,1991年電子情報通信学会春季全国大会講演論文集,1991年 3月15日
尾形わかは 黒沢馨,秘密分散共有法とその応用,電子情報通信学会誌,1999年12月25日,Vol,82 No.12 pp.1228 1236
Masakazu Ito
Shunichi Takahashi
Toshio Takamatsu