Secure computing system, secure computing method, secure computing apparatus, and program therefor
First Claim
1. A secure computing system that obtains a computation result f(m) of a logic circuit function f(x) for an input value m while concealing said input value m, comprising:
- a first secure computing apparatus that stores said logic circuit function f(x); and
a second secure computing apparatus which is independent from said first secure computing apparatus,wherein said first secure computing apparatus includes;
a first receiver that receives a segment B of said input value m, said input value m having been divided into a segment A and said segment B; and
a generator that uses said logic circuit function f(x) and said segment B to generate data T in which said logic circuit function f(x) and said segment B are concealed by concealing the specific logic gates used to achieve the logic circuit function f(X*B) where * is an operator, with segment B as an input, when generating the data T, said input value m corresponding to said segment A and said segment B; and
wherein said second secure computing apparatus includes;
a second receiver that receives said segment A and said data T; and
a calculator that obtains said computation result f(m) by using said segment A and said data T without using said segment B.
1 Assignment
0 Petitions
Accused Products
Abstract
A third secure computing apparatus generates data Wb associated with each bit b of a segment t that satisfies a relation mA=s*t for a first input value mA and an operator * and data W(1-b) associated with an inversion bit (1-b) of the bit b, transmits the data Wb to a first secure computing apparatus, and transmits data W including the data Wb and the data W(1-b) to a second secure computing apparatus. The second secure computing apparatus uses a segment s that satisfies the relation mA=s*t, a logic circuit function f and the data W to generate data T in which a logic circuit function f(s*X), which is the logic circuit function fin which the segment s is substituted, is concealed, and transmits the data T to the first secure computing apparatus. A computation result f(mA) can be determined from the data T and the data Wb. The first secure computing apparatus obtains the computation result f(mA) using the data T and the data Wb.
-
Citations
16 Claims
-
1. A secure computing system that obtains a computation result f(m) of a logic circuit function f(x) for an input value m while concealing said input value m, comprising:
-
a first secure computing apparatus that stores said logic circuit function f(x); and a second secure computing apparatus which is independent from said first secure computing apparatus, wherein said first secure computing apparatus includes; a first receiver that receives a segment B of said input value m, said input value m having been divided into a segment A and said segment B; and a generator that uses said logic circuit function f(x) and said segment B to generate data T in which said logic circuit function f(x) and said segment B are concealed by concealing the specific logic gates used to achieve the logic circuit function f(X*B) where * is an operator, with segment B as an input, when generating the data T, said input value m corresponding to said segment A and said segment B; and wherein said second secure computing apparatus includes; a second receiver that receives said segment A and said data T; and a calculator that obtains said computation result f(m) by using said segment A and said data T without using said segment B. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A secure computing apparatus, comprising:
-
a receiver that receives a segment B of said input value m, said input value m having been divided into a segment A and said segment B; and a generator that uses a logic circuit function f(x) and said segment B to generate data T in which said logic circuit function f(x) and said segment B are concealed by concealing the specific logic gates used to achieve the logic circuit function f(X*B) where * is an operator, with segment B as an input, when generating the data T, said input value m corresponding to said segment A and said segment B; and a transmitter that transmits said data T to another secure computing apparatus that receives said segment A; wherein computation result f(m) can be determined by using said data T and said segment A without using said segment B. - View Dependent Claims (16)
-
-
9. A secure computing method that obtains a computation result f(m) of a logic circuit function f(x) for an input value m while concealing said input value m, comprising:
-
(A) a step of receiving a segment B of said input value m by a first secure computing apparatus, said input value m having been divided into a segment A and said segment B; (B) a step of using said logic circuit function f(x) stored in said first secure computing apparatus and said segment B, by said first secure computing apparatus, to generate data T in which said logic circuit function f(x) and said segment B are concealed by concealing the specific logic gates used to achieve the logic circuit function f(X*B) where * is an operator, with segment B as an input, when generating the data T, said input value m corresponding to said segment A and said segment B; (C) a step of receiving said segment A and said data T by a second secure computing apparatus which is independent from said first secure computing apparatus; and (D) a step of obtaining said computation result f(m) by using said segment A and said data T by said second secure computing apparatus without using said segment B. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification