SECURE COMPUTATION DEVICE, SECURE COMPUTATION AUTHENTICATION SYSTEM, SECURE COMPUTATION METHOD, AND PROGRAM

A secure computation device obtains a first concealed verification value [z]i=[w−ω]i with secure computation by using concealed authentication information [w]i which is preliminarily stored and concealed authentication information [ω]i which is inputted, obtains a concealed extension field random nu...

Full description

Saved in:
Bibliographic Details
Main Authors CHIDA, Koji, MOROHASHI, Gembu, IKARASHI, Dai
Format Patent
LanguageEnglish
Published 28.01.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A secure computation device obtains a first concealed verification value [z]i=[w−ω]i with secure computation by using concealed authentication information [w]i which is preliminarily stored and concealed authentication information [ω]i which is inputted, obtains a concealed extension field random number [rm]i [Fε] which is a secret sharing value of an extension field random number rm, obtains a second concealed verification value [ym]i in which ym is concealed with secure computation by using the first concealed verification value [z]i, and obtains a third concealed verification value [rmym]i with secure computation by using the concealed extension field random number [rm]i and the second concealed verification value [ym]i and outputs the third concealed verification value [rmym]i.
Bibliography:Application Number: US201916970552