Data processing device
First Claim
1. A data processing device for share-encoding secret information using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n, comprising:
- a holding unit operable to acquire and hold secret information;
a reception unit operable to receive from each of n number of users at a time of a user registration, a user ID unique to the user and a password determined by the user;
a user information generation unit operable to generate for each user from the user ID and the password received from the user, user information uniquely determined for the user;
a registration unit operable to generate registration information for each user, and to register the user by storing the generated registration information in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the held secret information using the (k,n) threshold scheme and (ii) user information generated for the user; and
a deletion unit operable to delete the held secret information after the n number of users has been registered by the registration unit.
1 Assignment
0 Petitions
Accused Products
Abstract
A data processing device for share-encoding secret information using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n. The data processing device includes a holding unit operable to acquire and hold secret information, a reception unit operable to receive from each of n number of users at a time of a user registration, a user ID unique to the user and a password determined by the user, a user information generation unit operable to generate for each user from the user ID and the password received from the user, user information uniquely determined for the user, a registration unit operable to generate registration information for each user, and to register the user by storing the generated registration information in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the held secret information using the (k,n) threshold scheme and (ii) user information generated for the user, and a deletion unit operable to delete the held secret information after the n number of users has been registered by the registration unit.
33 Citations
17 Claims
-
1. A data processing device for share-encoding secret information using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n, comprising:
-
a holding unit operable to acquire and hold secret information;
a reception unit operable to receive from each of n number of users at a time of a user registration, a user ID unique to the user and a password determined by the user;
a user information generation unit operable to generate for each user from the user ID and the password received from the user, user information uniquely determined for the user;
a registration unit operable to generate registration information for each user, and to register the user by storing the generated registration information in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the held secret information using the (k,n) threshold scheme and (ii) user information generated for the user; and
a deletion unit operable to delete the held secret information after the n number of users has been registered by the registration unit. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A data processing device for recovering secret information, based on information share-encoded using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n, comprising:
-
a reception unit operable to receive from each of n number of users at a time of a secret information recovery, a user ID unique to the user and a password determined by the user;
a user information generation unit operable to generate for each user from the user ID and the password received from the user, user information uniquely determined for the user;
a storage unit having registration information stored therein for each of the n number of users in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the secret information using the (k,n) threshold scheme and (ii) user information generated for the user;
an extraction unit operable to extract, from the storage unit, registration information corresponded to the user ID received from each user; and
a recovery unit operable, after registration information for k number of users has been extracted by the extraction unit, to recover the secret information using (i) the registration information for the k number of users and (ii) user information generated for the k number of users. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A data processing method for share-encoding secret information using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n, comprising:
-
a holding step of acquiring and holding secret information;
a reception step of receiving from each of n number of users at a time of a user registration, a user ID unique to the user and a password determined by the user;
a user information generation step of generating for each user from the user ID and the password received from the user, user information uniquely determined for the user;
a registration step of generating registration information for each user, and registering the user by storing the generated registration information in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the held secret information using the (k,n) threshold scheme and (ii) user information generated for the user; and
a deletion step of deleting the held secret information after the n number of users has been registered in the registration step.
-
-
15. A data processing method used in a data processing device for recovering secret information, based on information share-encoded using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n, the data processing device including a storage unit that has registration information stored therein for each of n number of users in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the secret information using the (k,n) threshold scheme and (ii) user information generated for the user, comprising:
-
a reception step of receiving from each of the n number of users at a time of a secret information recovery, a user ID unique to the user and a password determined by the user;
a user information generation step of generating for each user from the user ID and the password received from the user, user information uniquely determined for the user;
an extraction step of extracting, from the storage unit, registration information corresponded to the user ID received from each user; and
a recovery step of, after registration information for k number of users has been extracted in the extraction step, recovering the secret information using (i) the registration information for the k number of users and (ii) user information generated for the k number of users.
-
-
16. A data processing computer program for having a computer execute a plurality of steps for share-encoding secret information using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n, the steps including:
-
a holding step of acquiring and holding secret information;
a reception step of receiving from each of n number of users at a time of a user registration, a user ID unique to the user and a password determined by the user;
a user information generation step of generating for each user from the user ID and the password received from the user, user information uniquely determined for the user;
a registration step of generating registration information for each user, and registering the user by storing the generated registration information in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the held secret information using the (k,n) threshold scheme and (ii) user information generated for the user; and
a deletion step of deleting the held secret information after the n number of users has been registered in the registration step.
-
-
17. A data processing computer program for having a data processing device execute a plurality of steps for recovering secret information, based on information share-encoded using a (k,n) threshold scheme, where k and n are integers greater than or equal to 2, and k is less than or equal to n, the data processing device including a storage unit that has registration information stored therein for each of n number of users in relation to a corresponding user ID, the registration information corresponding to a difference between (i) shared information generated for each user by share-encoding the secret information using the (k,n) threshold scheme and (ii) user information generated for the user, the steps including:
-
a reception step of receiving from each of the n number of users at a time of a secret information recovery, a user ID unique to the user and a password determined by the user;
a user information generation step of generating for each user from the user ID and the password received from the user, user information uniquely determined for the user;
an extraction step of extracting, from the storage unit, registration information corresponded to the user ID received from each user; and
a recovery step of, after registration information for k number of users has been extracted in the extraction step, recovering the secret information using (i) the registration information for the k number of users and (ii) user information generated for the k number of users.
-
Specification