SECURE COMPUTING DEVICE, SECURE COMPUTING SYSTEM, SECURE COMPUTING METHOD, AND PROGRAM
By using [x0,0], ..., [x0,r(0)-1], ..., [xL-1,0], ..., [xL-1,r(L-1)-1] obtained by concealing L sets X0 = {x0,0, ..., X0,r(0)-1}, ..., XL-1 = {xL-1,0, ..., xL-1,r(L-1)-1}, [c0], ..., [cm-1] obtained by concealing the number cp of elements representing kp among x0,0, ..., x0,r(0)-1, ..., xL-1,0, ...,...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | By using [x0,0], ..., [x0,r(0)-1], ..., [xL-1,0], ..., [xL-1,r(L-1)-1] obtained by concealing L sets X0 = {x0,0, ..., X0,r(0)-1}, ..., XL-1 = {xL-1,0, ..., xL-1,r(L-1)-1}, [c0], ..., [cm-1] obtained by concealing the number cp of elements representing kp among x0,0, ..., x0,r(0)-1, ..., xL-1,0, ..., xL-1,r(L-1)-1 for p = 0, ..., m-1 are obtained, [eq0], ..., [eqm-1] obtained by concealing eqp = T when cp is L and eqp = F when cp is not L for p = 0, ..., m-1 are obtained, and a data structure including [kp] and [eqp] associated with each other is output as a concealed operation result of a product set of X0, ..., XL-1. |
---|