Systems and methods for generating and applying a secure statistical classifier

    公开(公告)号:US11315037B2

    公开(公告)日:2022-04-26

    申请号:US16353046

    申请日:2019-03-14

    Abstract: There is provided a system for computing a secure statistical classifier, comprising: at least one hardware processor executing a code for: accessing code instructions of an untrained statistical classifier, accessing a training dataset, accessing a plurality of cryptographic keys, creating a plurality of instances of the untrained statistical classifier, creating a plurality of trained sub-classifiers by training each of the plurality of instances of the untrained statistical classifier by iteratively adjusting adjustable classification parameters of the respective instance of the untrained statistical classifier according to a portion of the training data serving as input and a corresponding ground truth label, and at least one unique cryptographic key of the plurality of cryptographic keys, wherein the adjustable classification parameters of each trained sub-classifier have unique values computed according to corresponding at least one unique cryptographic key, and providing the statistical classifier, wherein the statistical classifier includes the plurality of trained sub-classifiers.

    Information processing apparatus, authentication method, and recording medium for recording computer program

    公开(公告)号:US11050745B2

    公开(公告)日:2021-06-29

    申请号:US15753053

    申请日:2016-08-18

    Abstract: An information processing apparatus that authenticates sets of distributed authentication information without collecting, the sets of distributed authentication information, to be collected at any one of apparatuses included in a system. The apparatus includes: a secure computation unit that determines whether master authentication information, which is stored in advance and is one information to be compared for authentication, matches authentication information, which is received from a first information processing apparatus and is the other information to be compared for authentication, by executing secure computation with a second information processing apparatus based on one set of distributed master authentication information obtained by distributing the master authentication information by using a secret distribution method and based on one set of distributed authentication information obtained by distributing the authentication information by the secret distribution method; and a process execution unit that executes a predetermined process based on the determination result.

    Re-encryption system, re-encryption method and re-encryption program
    4.
    发明授权
    Re-encryption system, re-encryption method and re-encryption program 有权
    重新加密系统,重新加密方式和重新加密程序

    公开(公告)号:US09455828B2

    公开(公告)日:2016-09-27

    申请号:US14421223

    申请日:2013-07-29

    Inventor: Jun Furukawa

    Abstract: Provided is a re-encryption system. The re-encryption system includes a replacement key generation unit. The replacement key generation unit receives a master key owned by a manager, an allowable decryptor set before change, and an allowable decryptor set after change. The re-encryption system generates and outputs a replacement key to convert a ciphertext which can be decrypted with a secret key of a decryptor belonging to the allowable decryptor set before change to a ciphertext which can be decrypted with a secret key of a decryptor belonging to the allowable decryptor set after change.

    Abstract translation: 提供了一种重新加密系统。 重新加密系统包括替换密钥生成单元。 替换密钥生成单元接收由管理者拥有的主密钥,更改前的容许解密器集合和更改后的允许解密器集合。 重新加密系统生成并输出替换密钥,以将可以用属于所允许的解密器集合的解密器的秘密密钥进行解密的密文转换成可以利用属于...的解密器的秘密密钥解密的密文 允许的解密器设置后更改。

    Encrypted database system, linking method, and medium
    5.
    发明授权
    Encrypted database system, linking method, and medium 有权
    加密数据库系统,链接方法和介质

    公开(公告)号:US09189647B2

    公开(公告)日:2015-11-17

    申请号:US14396560

    申请日:2013-04-12

    Inventor: Jun Furukawa

    Abstract: This encrypted database system is constituted by the connection of client terminal, which encrypts and outputs a first table having row a and row b data that has been input and a second table having row c data by means of a secret key stored in advance and sends a partial connection command that connects the row b and row c as a key for data in which the value for row a is greater than or equal to p and less than q in this table to the outside with a range search key generated from the secret key, and an encrypted database server, which receives and records the encrypted first and second tables, extracts data for each in which the values for row a from the encrypted first and second tables are greater than or equal to p and less than q using the range search key, and connects and returns row b and row c for this extracted data as a key.

    Abstract translation: 该加密数据库系统由客户终端的连接构成,客户终端通过预先存储的秘密密钥加密并输出已经输入的行a和行b数据的第一表和具有行c数据的第二表,并发送 将行b和行c作为数据的键连接的部分连接命令,其中行a的值大于等于p且小于该表中的p并且小于该表中的q,并且具有从秘密生成的范围搜索关键字 密钥和加密的数据库服务器,其接收并记录加密的第一和第二表,从加密的第一和第二表中提取用于行a的值的数据大于或等于p并且小于q的数据,其中使用 范围搜索键,并将该提取数据的行b和行c连接并返回为关键字。

    Secure computation system, secure computation apparatus, secure computation method, and secure computation program

    公开(公告)号:US11080393B2

    公开(公告)日:2021-08-03

    申请号:US16336953

    申请日:2017-07-06

    Inventor: Jun Furukawa

    Abstract: This invention is directed to a secure computation apparatus that protects a security against the malicious behavior while maintaining a processing amount small. The secure computation apparatus comprises a first multiplication triplet column generator that generates first multiplication triplet columns formed from a set of two secure distribution random numbers and a distribution value of a multiplication result obtained by performing secure multiplication of the two secure distribution random numbers, a second multiplication triplet column generator that generates second multiplication triplet columns formed from a set of two secure distribution input numbers and a distribution value of a multiplication result obtained by performing secure multiplication of the two secure distribution input numbers, in each multiplication process of semi-honest safe secure multiplication, and a multiplication validity verifier that generates a set of first multiplication triplets and second multiplication triplets by randomly selecting, from the first multiplication triplet columns, a number of rows of the first multiplication triplets as many as a number of rows of the second multiplication triplets in the second multiplication triplet columns, and verifies validity of secure multiplication based on the set of the first and second multiplication triplets.

    Authentication system, authentication method, and program

    公开(公告)号:US11063941B2

    公开(公告)日:2021-07-13

    申请号:US16085659

    申请日:2017-05-12

    Abstract: An authentication system is provided with: a user device; user side assistance device(s) to assist user authentication that authenticates a user of the user device, and apparatus authentication that authenticates the user device; and an apparatus authentication server device to perform apparatus authentication in association with the user device. The user side assistance device(s) use distributed shares of verification information to perform multi-party computation for user authentication in association with the user device, and use distributed shares of a secret key generated by the user device, to perform multi-party computation for apparatus authentication in association with the user device.

    Pre-calculation device, method, computer-readable recording medium, vector multiplication device, and method

    公开(公告)号:US10972260B2

    公开(公告)日:2021-04-06

    申请号:US16060082

    申请日:2016-12-07

    Inventor: Jun Furukawa

    Abstract: Provided is a pre-calculation device capable of keeping a secret against malicious behaviors of participants while keeping a processing load small. A Beaver triple generation processor generates a secret-shared Beaver triple formed of two secret-shared random numbers and a secret-shared value of a product of the two random numbers. A Beaver triple random inspection processor randomly selects a secret-shared Beaver triple, restores the Beaver triple through communication to and from other pre-calculation devices, and confirms that a product of first two elements is equal to a third element. The Beaver triple position stirring processor randomly replaces Beaver triples that have not been restored, to generate replaced secret-shared Beaver triples.

    Secret calculation system, secret calculation apparatus, and secret calculation method

    公开(公告)号:US10924270B2

    公开(公告)日:2021-02-16

    申请号:US15755888

    申请日:2016-08-29

    Inventor: Jun Furukawa

    Abstract: The secret calculation system comprises three secret calculation apparatuses. An ith secret calculation apparatus (i=1, 2, 3) comprises a holder that holds (S[i], T[i]) and (S′[i], T′[i]) as distributed values of an n-bit number W and an n-bit W′ (n is any natural number), respectively; a first multiplicator that derives a logical conjunction of S[i] and S′[i]; a second multiplicator that derives a logical conjunction of T[i] and T′[i]; and a first subtractor that derives a difference between the logical conjunction derived by the first multiplicator and the logical conjunction derived by the second multiplicator.

    Key exchange system, key exchange method, key exchange device, control method thereof, and recording medium for storing control program

    公开(公告)号:US09917692B2

    公开(公告)日:2018-03-13

    申请号:US15313124

    申请日:2015-05-20

    Inventor: Jun Furukawa

    Abstract: A key exchange device includes an initial setup unit that generates a verification key that serves as a public key and a signature key based on a discretionary random tape, a session identifier based on a first random tape, and a secret key based on a second random tape; an arithmetic unit that generates an encrypted second random tape by an arithmetic operation of a pseudo-random function having the second random tape and the secret key as variables and an encrypted third random tape by an arithmetic operation of the pseudo-random function having a third random tape and the secret key as variables; a key encapsulation processing unit that generates a key-encapsulated public key and a key-encapsulated secret key based on the encrypted second random tape to transmit the key-encapsulated public key to an other party of key exchange and decrypts a session key using the key-encapsulated public key and a key-encapsulated ciphertext received from the other party of key exchange; and a verification processing unit that generates a signature based on the signature key, a transmission message and the encrypted third random tape, transmits the signature to the other party of key exchange and verifies a signature received from the other party of key exchange based on a verification key that is a public key of the other party of key exchange, a received message and the signature received.

Patent Agency Ranking