会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明公开
    • SECURE COMPUTATION SYSTEM, SECURE COMPUTATION DEVICE, METHOD, AND PROGRAM
    • EP4328893A1
    • 2024-02-28
    • EP21937817.1
    • 2021-04-19
    • Nippon Telegraph And Telephone Corporation
    • ICHIKAWA, AtsunoriHAMADA, Koki
    • G09C1/00
    • A secure computation system according to an embodiment is a secure computation system including a first secure computation apparatus, a second secure computation apparatus, and a third secure computation apparatus each having a tripartite share of a concealed input vector, wherein the first secure computation apparatus includes a first conversion unit configured to convert its own tripartite share into a bipartite share with the third secure computation apparatus; a first calculation unit configured to calculate a third vector obtained by subtracting, from a result of applying its own permutation to its own bipartite share, a result of applying a second permutation determined according to the permutation to a first vector determined by a predetermined method and a second vector determined by a predetermined method; and a first transmission unit configured to transmit the third vector and the second permutation to the second secure computation apparatus, the third secure computation apparatus includes a second conversion unit configured to convert its own tripartite share into a bipartite share with the first secure computation apparatus; a second calculation unit configured to calculate a fourth vector obtained by adding the first vector to a result of applying a first permutation determined according to the permutation to its own bipartite share; a second transmission unit configured to transmit the fourth vector to the third secure computation apparatus; a first output unit configured to set the second vector as a bipartite share, with the second secure computation apparatus, of a result of applying the permutation to the input vector, and the second secure computation apparatus includes a second output unit configured to set a vector obtained by adding a result of applying the second permutation to the fourth vector to the third vector, as a bipartite share, with the third secure computation apparatus, of a result of applying the permutation to the input vector.