SECURE COMPUTATION DEVICE, SECURE COMPUTATION AUTHENTICATION SYSTEM, SECURE COMPUTATION METHOD, AND PROGRAM
A secure computation device obtains a first concealed verification value [z]i=[w−ω]i with secure computation by using concealed authentication information [w]i which is preliminarily stored and concealed authentication information [ω]i which is inputted, obtains a concealed extension field random nu...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
28.01.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A secure computation device obtains a first concealed verification value [z]i=[w−ω]i with secure computation by using concealed authentication information [w]i which is preliminarily stored and concealed authentication information [ω]i which is inputted, obtains a concealed extension field random number [rm]i [Fε] which is a secret sharing value of an extension field random number rm, obtains a second concealed verification value [ym]i in which ym is concealed with secure computation by using the first concealed verification value [z]i, and obtains a third concealed verification value [rmym]i with secure computation by using the concealed extension field random number [rm]i and the second concealed verification value [ym]i and outputs the third concealed verification value [rmym]i. |
---|---|
Bibliography: | Application Number: US201916970552 |