åãã« ååç´¹ä»ããlifted ElGamalæå·æå士ã¯ããã¢ãªã³ã°ã¨ããæ¼ç®ã使ãã¨ãæãç®ããç¹ã«æå·æãã¯ãã«ã®å ç©ãè¨ç®ã§ãã¾ãã ããã§ã¯ãã¢ãªã³ã°ã¨ASIA CCS2018ã§çºè¡¨ããæãç®æ¹æ³ãç´¹ä»ãã¾ãã ãã¢ãªã³ã° G_1, G_2ãæ¥åæ²ç·ã®ç¹éåã«ããä½æ°rã®å æ³å·¡å群ãG_Tãæéä½ã®1ã®ã¹ãä¹æ ¹ã®éåãããªãä½æ°rã®ä¹æ³ç¾¤ã¨ãã¾ããG_1ã®çæå ãP, G_2ã®çæå ãQã¨ãã¾ãã P=\Set{0,P,2P,\dots,(r-1)P}, Q=\Set{0,Q,2Q,\dots,(r-1)Q}. ãã¢ãªã³ã°e:G_1 \times G_2 \rightarrow G_Tã¨ã¯ãg:=e(P,Q)ãG_Tã®çæå ã§ãä»»æã®æ´æ°a, bã«å¯¾ã㦠e(aP,bQ)=e(P,Q)^{ab} ã¨ãªãååã§ãã é ã追ã£ã¦èª¬æãã¾ãããããã¢ãªã³ã°ã使ãã¨æ¥åæ²ç·ã®2åã®ç¹ã
åãã« ãããããã°ããæºååæå·ã®ä¸æ¹å¼CKKS (Cheon-Kim-Kim-Song)ãç´¹ä»ãã¾ããMicrosoftãéçºãã¦ããSEALãªã©ã§å®è£ ããã¦ãã¾ãã CKKSã®è¨äºä¸è¦§ æºååæå·CKKSãã®1 å¤é å¼ç°ï¼ãã®è¨äºï¼ æºååæå·CKKSãã®2 ã¨ã³ã³ã¼ãã¨ãã³ã¼ã æºååæå·CKKSãã®3 æå·åã»å¾©å·ã¨æ¼ç® æºååæå·CKKSãã®4 Pythonã«ããåä½ç¢ºèª å®å ¨æºååæå·ã®æ¦è¦ å®å ¨æºååæå·FHE(fully homomorphic encryption)ã¨ã¯æå·æã復å·ãããã¨ãªããæå·æãæä½ã§ããæå·ã§ããæ°å¦çã«ã¯æå·æã®å ç®ã¨ä¹ç®ãä»»æåè¨ç®ã§ãã¾ããå®éã«ã¯æ¼ç®åæ°ãå¶éãããå ´åãå¤ãããã®å ´åã¯å³å¯ã«ã¯ã¬ãã«ã(leveled)æºååæå·ã¨ããã¾ãã ãã¨ãã°ãçæAIã¯ä¾¿å©ã§ããä¼æ¥ã§ä½¿ãå ´åã¯æ å ±æ¼æ´©ãå¿é ã§ããããAIãµã¼ãã®ãã¼ã¿å¦çã«
NTTåºç¤æ°å¦ç 究ã»ã³ã¿ã§ã¯ãæ°å¦ã®åºç¤ç 究ãã¨ããã¦ç§å¦æè¡ã®æºæ³ã§ãããç¥ã®æ³ããããè±ãã«ãããã¨èãã¦ãã¾ããæ¬ç¨¿ã§ã¯ã¾ããNTTåºç¤æ°å¦ç 究ã»ã³ã¿ã§ã®ç 究ã®å ¨ä½åã俯ç°ãã¾ããããã«ãã»ã³ã¿ã®ä¸å¿çãªç 究é åã§ãããæ°è«ãç¹ã«æ°è«åå¦ç³»ãã代æ°å¹¾ä½ã»æ°è«å¹¾ä½ãã表ç¾è«ã»ä¿åå½¢å¼ãã«ã¤ãã¦ç´¹ä»ãã¾ãã ããã2500å¹´åã®ã®ãªã·ã£ã§ãç´ æ°ã®ç 究ããªããããã¨ã¯é©ãã§ããç´ æ°ãç¡éã«åå¨ãããã¨ãèªç¶æ°ãç´ æ°ã®ç©ã«ä¸æã«å解ã§ãããã¨ã示ããã¦ãã¾ãããã©ããªåæ©ããã£ãã®ãã¯ä¸æã§ããããã1977å¹´ã®ãªãã¹ããã·ã£ãã¢ãã¨ã¼ãã«ãã³ã«ããRSAæå·æ¹å¼ã®çºæã¾ã§ããã®å·¥å¦ã社ä¼ã§ã®å¿ç¨ã¯æå¾ ããããã¾ããã§ãããå ãã¦RSAã®éµã¨ãªãã ãç´ æ°ã ãæ´æ°ã¨ããã° ãæãç«ã¤ãã¨ãããã§ã«ãã¼ã®å°å®çï¼1ï¼ã®çºè¦ï¼è¨¼æã¯ã©ã¤ããããï¼å¾ãããã®ç¢ºç«ã«300å¹´ä½ãè¦ãã¾ããã æ°è«ï¼
When appointing computation of private data to a third party, privacy is an issue. How can one delegate computation without giving up one's secrets? This gets trickier when multiple parties are involved. Several works on Multi-Party Computation (MPC) addressed this issue, but a new approach has started to emerge: Fully Homomorphic Encryption (FHE). What is FHE? Once upon a time, Alice was an emplo
ããã¾ã§Bitcoinã®P2Pã¬ã¤ã¤ã¼ã®éä¿¡ã¯æå·åããã¦ãããå¹³æã§ã¡ãã»ã¼ã¸ãããã¨ãããã¦ãããåºæ¬çã«Bitcoinã®å ´åããããã¯ããã©ã³ã¶ã¯ã·ã§ã³ãªã©ã®ãã¼ã¿ã¯èª°ããå ±æããå°å¸³ãã¼ã¿ã§æ©å¯æ§ã®ãããã¼ã¿ã§ã¯ãªãããã ãã ããªã¬ã¼ããããã¼ã¿èªä½ã¯å ¬éãã¼ã¿ã§ãããã®ã®ãå¹³æã®éä¿¡ã«ã¯ä»¥ä¸ã®ãããªèª²é¡ãããï¼ ãã¼ãã®P2Pæ¥ç¶ã観å¯å¯è½ãªãã¬ã¼ã¤ã¼ï¼ISPãªã©ï¼ã«å¯¾ãã¦ããã©ã³ã¶ã¯ã·ã§ã³ã½ã¼ã¹ãã¿ã¤ãã³ã°ã«é¢ããæ å ±ãä¸ãããã¨ã«ãªãã å¹³æãªã®ã§éä¸ã§ãã¼ã¿ã®æ¹ãããªã¹ã¯ãããããã®æ¤åºãé£ããã æ¥ç¶æã«åºæã®ãã¸ãã¯ãã¤ãã§éä¿¡ãå§ã¾ãã®ã§Bitcoinã®P2Pæ¥ç¶ã§ãããã¨ãç°¡åã«èå¥ãããã¨ãã§ããã BIP-324ã§ã¯ããããã«å¯¾å¦ãããããã©ã³ã¹ãã¼ã層ã®éä¿¡ãæå·åããv2ãã©ã³ã¹ãã¼ããããã³ã«ãå®ç¾©ãã¦ãããv2ãã©ã³ã¹ãã¼ããããã³ã«ãå©ç¨ããã¨ããã
ããã«ã¡ã¯ãå¯å£«æ¦®ã§ãã ã¡ãã£ã¨åã«ææã§ãã¡ãã¡ãªèªè¨¼ç³»ã®æè¡å®è£ ã£ã¦ãªãã ããããããã¨ãã話ããã¦ãããã¨ãXã§åããã¨ãããè²ã ã¨ãæè¦ãé ãã¾ããã®ã§ã¾ã¨ãã¦æ¸ãã¦ããã¾ãã
è±èªã®ãAuthenticationããæ´çãã ããããã¯å ã»ã©ã®åé¡ã§è¨ãã¨ããã®ãã¦ã¼ã¶èªè¨¼ãã¨ãã¦ã®ãèªè¨¼ããã¤ã¾ãè±èªã®ãAuthenticationãã«è©²å½ãããèªè¨¼ãã«ã¤ãã¦ãããã«æ´çãé²ãã¦ããã¾ãã å ã»ã©ããã¦ã¼ã¶èªè¨¼ãããã·ã¹ãã ãå©ç¨ãããã¨ãã¦ããã¦ã¼ã¶ããã·ã¹ãã ã«ç»é²æ¸ã¿ã®ã¦ã¼ã¶ãã©ããèå¥ããã¦ã¼ã¶ã主張ãã身å ãæ¤è¨¼ããããã»ã¹ãã¨èª¬æãã¾ããããã¦ã¼ã¶ã®èå¥ãã¨ã身å ã®æ¤è¨¼ãã¯ã¦ã¼ã¶èªè¨¼ã«æ¬ ããã¾ããããå®éã¯ä»ã«ããã¦ã¼ã¶ã®æå¹ï¼ç¡å¹ç¶æ ã®ç¢ºèªãããæ¤è¨¼ã«æåããå ´åã®èº«å ã®ä¿è¨¼ï¼ã¢ã¯ã»ã¹ãã¼ã¯ã³ã®çºè¡çï¼ããªã©ã®å¦çãä¸è¬çã«ã¦ã¼ã¶èªè¨¼ã®ããã»ã¹ã«ã¯å«ã¾ãã¾ãã ããã§åé ã®ãââèªè¨¼ããæ¯ãè¿ãã¾ãããããã¹ã¯ã¼ãèªè¨¼ãSMSèªè¨¼ãæç´èªè¨¼ãé¡èªè¨¼ã¯å®ã¯ããã§è¨ãã¦ã¼ã¶èªè¨¼ã«ã¯è©²å½ãããã¦ã¼ã¶èªè¨¼ä¸ã®ä¸å¦çã§ããã身å ã®æ¤è¨¼ããæ ã£ã¦ãããã¨ãã
æ¦è¦ ç§å¯è¨ç®ã¨ã³ã¸ãã¢ãå§ãã¦ãããï¼å¹´ãçµã£ã¦ãã¾ãã¾ããã æã®æµãã¯é常ã«æ©ããã®ã§ãç§ãç§å¯è¨ç®ã«ã¤ãã¦åå¼·ãããããããªå®è£ ãè¡ãã®ã¨ä¸¦è¡ãã¦ã ç§å¯è¨ç®ã«å¯¾ãã注ç®åº¦ãã¦ã¼ã¹ã±ã¼ã¹ã®åµåºãã¾ãã¯ç§å¯è¨ç®ã®æ¼ç®å®è¡ã¹ãã¼ãã¨ãããã®ããã®ï¼å¹´ãéãã¦ããªãé²æãããã¾ããã ä»åã¯ä»ä¸åº¦ãç§å¯è¨ç®ã¨ããæè¡å ¨ä½ã«å¯¾ãã¦ãããã«ãã®ä¸ã§ãæºååæå·ã¨ããæå·æè¡ã«ã¤ãã¦ãèªåã®ç¥ã£ã¦ãããã¨ãã¾ã¨ãã¦ããããã¨æãã¾ãã å»å¹´åããããªè¨äºãæ¸ããã¨ãã¦æ¸ããã®ããã¡ãã§ãã èå³ã®ããæ¹ã¯ãã¡ããã¿ã¦ããã ããã°å¬ããã§ãã ãã®è¨äºã§ä½ãæ¸ãã è¯ãè¨äºãããã°ããã§ãªãè¨äºããããããã£ããªã¨è¨æ¶ãã¦ãã¾ããããã®4å¹´éã§ç§å¯è¨ç®ã«é¢ããè¨äºãæ¸ãã¦ãã¾ããã æè¿ã¯ç§å¯è¨ç®ä»¥å¤ã®ãã¨ãããããã¨æ¸ãã¦ããããè¨äºæ°ãå¤ããªãã ç§å¯è¨ç®ã«ã¤ãã¦ã¯èªåã§ãä½ãä»ã¾ã§æ¸ããã®
Deleted articles cannot be recovered. Draft of this article would be also deleted. Are you sure you want to delete this article? æ¦è¦ ããªãå¦è¡ããã®è«æã«ã¯ãªãã¾ããããã¤ã¯ãã½ãããªãµã¼ãã¯æ ¼åæå·ãã¼ã¹ã®æºååæå·ãç¨ããã©ã¤ãã©ãªéçºã«åãå ¥ãã¦ãã¾ãã ãã®ãªãã§ãç§å¯è¨ç®ã®å¿ç¨å ã¨ãã¦ããªããã¼ãºãé«ããã®ããããã«ããã¼ããç¨ããæ ¼åæå·ã§ããããã¯ãè¤æ°ã®ãã¼ã¿ãªã¼ãã¼ãããããç°ãªãç§å¯éµãæã¡ãã¼ã¿ãæå·åãã¦å ±æããéã«ãå¥ã ã®éµã§æå·åããããã¼ã¿å士ã®æ¼ç®ãè¡ããã¨ãã§ãã工夫ã®ãã¨ã§ããããã«ãããæå·åãã¦ãã¼ã¿å ±æããããã®å ±æããããã¼ã¿ãï¼ã¤ã®ããã°ãã¼ã¿ã¨ãã¦è§£æãè¡ãã¤ã¤ãè¨ç®çµæããã¼ã¿ãªã¼ãã¼å士ã®åæã®ãã¨ã§å¾©å·ã§ã
NECãªã©3社ã¯2æ18æ¥ããã¼ã¿ãæå·åããã¾ã¾åæãããç§å¯è¨ç®ãã®æ®åãç®çã¨ãã¦ãç§å¯è¨ç®ç 究ä¼ããç«ã¡ä¸ããã¨çºè¡¨ãããçºè¶³æã®åå ä¼æ¥ã¯NECããã¸ã¿ã«ã¬ã¬ã¼ã¸ãã½ããã¦ã§ã¢éçºä¼æ¥ã®ã¬ããã ï¼æ±äº¬é½æ¸è°·åºï¼ãé¢é£ä¼æ¥ãç 究æ©é¢ãªã©ã¨ååããæè¡ã®è©ä¾¡åºæºä½ããæ å ±çºä¿¡ã«åãçµãã æå·åãããã¼ã¿ã¯é常ãä¸åº¦å¾©å·ããªãã¨è¨ç®å¦çãã§ããªããç§å¯è¨ç®ã¯æå·åãã¼ã¿ã®ã¾ã¾çµ±è¨åæãªã©ãè¡ããæè¡ã§ãæ©å¯æ§ã®é«ããã¼ã¿ãã¯ã©ã¦ããµã¼ãã¹ãè¤æ°ã®çµç¹éãªã©ã§å®å ¨ã«æ±ãæ¹æ³ã¨ãã¦æå¾ ããã¦ããã ä¸æ¹ã§ç§å¯è¨ç®ã«ã¯ãç§å¯åæ£ãããæºååæå·ããªã©å¤æ°ã®æ¹å¼ãåå¨ããããããç¬ç«ã«ç 究éçºãé²ãããã¦ããã¨ããããã®ãããå®å ¨æ§ãæ§è½ãªã©ãè©ä¾¡ããåºæºãåå¨ããªãã£ããNECãã¯ããããç¶æ³ã社ä¼å®è£ ã®å¦¨ãã«ãªã£ã¦ããã¨ãã¦ãç 究ä¼ãç«ã¡ä¸ããã ç§å¯è¨ç®ã¯ãã¾ãã¾ãªåéã§æ´»ç¨ãæå¾ ãã
ç§å¯è¨ç®ã¨ã³ã¸ãã¢ãå§ãã¦ï¼å¹´ãçµã£ããï¼ã¤ãã«æ©æ¢°å¦ç¿ã¢ãã«ã®æå·ç¶æ ã§ã®å¦ç¿ã«ã¤ãã¦è¨åãã¾ããï¼encryptionãã¥ã¼ã©ã«ãããã¯ã¼ã¯æå·æè¡æºååæå·æ ¼åæå· @kenmaroã§ãã æ®æ®µã¯ä¸»ã«ç§å¯è¨ç®ãæºååæå·ãªã©ã®è¨äºã«ã¤ãã¦æ稿ãã¦ãã¾ãã ç§å¯è¨ç®ã«é¢é£ããã¾ã¨ãã®è¨äºã«é¢ãã¦ã¯ä»¥ä¸ãã覧ãã ããã ç§å¯è¨ç®ã¨ã³ã¸ãã¢ãå§ãã¦ï¼å¹´ãçµã£ãã ç§å¯è¨ç®ã¨ã³ã¸ãã¢ãå§ãã¦ï¼å¹´åãçµã£ãã æ¦è¦ æºååæå·ã¨ããæè¡ã«ã¤ãã¦ããããã¨è¨äºãæ¸ãã¦ãã¦ãããï¼å¹´ãçµã¨ãã¨ãã¦ãã¾ãã ãã®ã¢ããã³ãã«ã¬ã³ãã¼ããã£ããã¨ãã¦ããã¾ã§æ¸ãã¦ããè¨äºãªã©ãã¾ã¨ãã æºååæå·ãã¼ã¹ã®ç§å¯è¨ç®ã®ç¾ç¶ã¯ã©ã®ãããªæããªã®ã ã©ãã«ç 究ãåãããã¨ãã¦ããã®ã ç§ãèããä¸çªã®ç¤¾ä¼å®è£ ã®é£ããã¯ã©ãã«ããã®ã ã¨ãããã¨ã«ã¤ãã¦ã¾ã¨ãã¦ããããã¨æãã¾ãã åãã« æºååæå·ã¯ãæå·å
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}