SECURE COMPUTING DEVICE, SECURE COMPUTING SYSTEM, SECURE COMPUTING METHOD, AND PROGRAM

By using [x0,0], ..., [x0,r(0)-1], ..., [xL-1,0], ..., [xL-1,r(L-1)-1] obtained by concealing L sets X0 = {x0,0, ..., X0,r(0)-1}, ..., XL-1 = {xL-1,0, ..., xL-1,r(L-1)-1}, [c0], ..., [cm-1] obtained by concealing the number cp of elements representing kp among x0,0, ..., x0,r(0)-1, ..., xL-1,0, ...,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: IKARASHI, Dai, SUDO, Hiroki
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:By using [x0,0], ..., [x0,r(0)-1], ..., [xL-1,0], ..., [xL-1,r(L-1)-1] obtained by concealing L sets X0 = {x0,0, ..., X0,r(0)-1}, ..., XL-1 = {xL-1,0, ..., xL-1,r(L-1)-1}, [c0], ..., [cm-1] obtained by concealing the number cp of elements representing kp among x0,0, ..., x0,r(0)-1, ..., xL-1,0, ..., xL-1,r(L-1)-1 for p = 0, ..., m-1 are obtained, [eq0], ..., [eqm-1] obtained by concealing eqp = T when cp is L and eqp = F when cp is not L for p = 0, ..., m-1 are obtained, and a data structure including [kp] and [eqp] associated with each other is output as a concealed operation result of a product set of X0, ..., XL-1.