SECRET CALCULATION DEVICE, SECRET CALCULATION AUTHENTICATION SYSTEM, SECRET CALCULATION METHOD, AND PROGRAM

A secure computation device obtains a first concealed verification value [z]i = [w-ω]i with secure computation by using concealed authentication information [w]i which is preliminarily stored and concealed authentication information [ω]i which is inputted, obtains a concealed extension field random...

Full description

Saved in:
Bibliographic Details
Main Authors CHIDA, Koji, MOROHASHI, Gembu, IKARASHI, Dai
Format Patent
LanguageEnglish
French
German
Published 30.12.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A secure computation device obtains a first concealed verification value [z]i = [w-ω]i with secure computation by using concealed authentication information [w]i which is preliminarily stored and concealed authentication information [ω]i which is inputted, obtains a concealed extension field random number [rm]i∈[Fε] which is a secret sharing value of an extension field random number rm, obtains a second concealed verification value [ym]i in which ym is concealed with secure computation by using the first concealed verification value [z]i, and obtains a third concealed verification value [rmym]i with secure computation by using the concealed extension field random number [rm]i and the second concealed verification value [ym]i and outputs the third concealed verification value [rmym]i.
Bibliography:Application Number: EP20190757721