IN2014CN04372A - - Google Patents

Info

Publication number
IN2014CN04372A
IN2014CN04372A IN4372CHN2014A IN2014CN04372A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A IN 4372CHN2014 A IN4372CHN2014 A IN 4372CHN2014A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A
Authority
IN
India
Prior art keywords
template
random number
public key
storage portion
stores
Prior art date
Application number
Inventor
Mitsuhiro Hattori
Takato Hirano
Takumi Mori
Takashi Ito
Nori Matsuda
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Publication of IN2014CN04372A publication Critical patent/IN2014CN04372A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A storage portion (301) stores a public key generated on the basis of a doubly homomorphic encryption algorithm and a template used for authentication of data encrypted using the public key. A random number generator (203) using at least a portion of the public key in the storage portion (301) generates a random number. A template updater (307) performs an operation using the random number generated by a random number generator (305) and updates the template. The storage portion (301) stores the updated template overwriting the template prior to the update.
IN4372CHN2014 2011-11-30 2011-11-30 IN2014CN04372A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2011/077623 WO2013080320A1 (en) 2011-11-30 2011-11-30 Data processing device, data processing method, and program

Publications (1)

Publication Number Publication Date
IN2014CN04372A true IN2014CN04372A (en) 2015-09-04

Family

ID=48534844

Family Applications (1)

Application Number Title Priority Date Filing Date
IN4372CHN2014 IN2014CN04372A (en) 2011-11-30 2011-11-30

Country Status (6)

Country Link
US (1) US20140247939A1 (en)
EP (1) EP2787681B1 (en)
JP (1) JP5586795B2 (en)
CN (1) CN103975553B (en)
IN (1) IN2014CN04372A (en)
WO (1) WO2013080320A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE48146E1 (en) 2012-01-25 2020-08-04 Mitsubishi Electric Corporation Data search device, data search method, computer readable medium storing data search program, data registration device, data registration method, computer readable medium storing data registration program, and information processing device
US10235539B2 (en) 2013-02-25 2019-03-19 Mitsubishi Electric Corporation Server device, recording medium, and concealed search system
US8966277B2 (en) * 2013-03-15 2015-02-24 Mitsubishi Electric Research Laboratories, Inc. Method for authenticating an encryption of biometric data
DE102015205428A1 (en) * 2014-03-26 2015-10-01 Continental Teves Ag & Co. Ohg Method and system for improving data security in a communication process
JP6272546B2 (en) * 2015-02-20 2018-01-31 三菱電機株式会社 Data storage device, data processing method, and data processing program
WO2019014425A1 (en) * 2017-07-13 2019-01-17 Pindrop Security, Inc. Zero-knowledge multiparty secure sharing of voiceprints
CN110574030B (en) * 2018-02-13 2021-05-11 指纹卡有限公司 Updating biometric template protection keys
US10665244B1 (en) 2018-03-22 2020-05-26 Pindrop Security, Inc. Leveraging multiple audio channels for authentication
US11354422B2 (en) * 2018-11-02 2022-06-07 Rank One Computing Corporation Optimizations for privacy-preserving distance metric computation
US20220052841A1 (en) * 2018-12-12 2022-02-17 Nec Corporation Matching system, client and server
US20240104182A1 (en) * 2021-01-29 2024-03-28 Nec Corporation Biometric authentication system, template updating method therefor, storage medium, biometric authentication client device, and biometric authentication server device
US20230393762A1 (en) * 2022-06-02 2023-12-07 Micron Technology, Inc. Verified key replacement in secure memory devices

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991414A (en) * 1997-09-12 1999-11-23 International Business Machines Corporation Method and apparatus for the secure distributed storage and retrieval of information
WO2006054208A1 (en) * 2004-11-16 2006-05-26 Koninklijke Philips Electronics N.V. Securely computing a similarity measure
JP4961214B2 (en) 2006-03-29 2012-06-27 株式会社日立情報制御ソリューションズ Biometric authentication method and system
US8995665B1 (en) * 2008-08-20 2015-03-31 Symantec Corporation Role based encryption without key management system
CN102598576B (en) * 2009-10-29 2014-09-17 三菱电机株式会社 Data processing device
JP5573293B2 (en) * 2010-03-30 2014-08-20 富士通株式会社 Authentication device, encryption device, token device, authentication method, and authentication program

Also Published As

Publication number Publication date
CN103975553A (en) 2014-08-06
WO2013080320A1 (en) 2013-06-06
JPWO2013080320A1 (en) 2015-04-27
CN103975553B (en) 2016-10-12
EP2787681A4 (en) 2015-10-14
US20140247939A1 (en) 2014-09-04
JP5586795B2 (en) 2014-09-10
EP2787681B1 (en) 2016-10-12
EP2787681A1 (en) 2014-10-08

Similar Documents

Publication Publication Date Title
IN2014CN04372A (en)
NZ720190A (en) System and methods for encrypting data
IN2015DN04037A (en)
BR112017017425A2 (en) non-transient computer readable storage medium configured to store instructions and computer-implemented process
MX2014002142A (en) Hierarchical attribute-based encryption and decryption.
MY176966A (en) Biometric template security and key generation
BR112017011967A2 (en) key generation device, public key encryption device, private key decryption device, key generation method configured to generate a public key, public key encryption method, private key decryption method, and program computer
MX2014004838A (en) System and method for key management for issuer security domain using global platform specifications.
GB2498039B (en) Password recovery service
IN2014CN04110A (en)
ATE496500T1 (en) METHOD FOR INDIVIDUALLY ADJUSTING A HEARING AID OR A HEARING AID
EP2544400A3 (en) PUF based Cryptographic communication system and cryptographic communication method
GB2490407B (en) Joint encryption of data
CN105450387A (en) Network distributed storage method based on hybrid encryption
IN2014MU00771A (en)
EP2264640A3 (en) Feature specific keys for executable code
NZ613485A (en) Method for authenticating first communication equipment by means of second communication equipment
IL237121B (en) System and method for fully encrypted remote web-based voting
EP3704829B8 (en) Cryptographic key generation system and method
FR2975248B1 (en) DEVICE AND METHOD FOR GENERATING REINFORCED SECURITY KEYS FOR FULLY HOMOMORPHIC ENCRYPTION ALGORITHM.
WO2015023368A3 (en) Apparatus and method for key update for use in a block cipher algorithm
MY159284A (en) A method for encrypting and decrypting data and a system therefor
WO2014164180A3 (en) Decoy bits method for direct encryption and key generation
MY153911A (en) Dual coding coherent phase protocol
WO2012106466A3 (en) Data encryption method