Presentation 2012-07-20
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems For Overcoming Contradiction of Protection and Utilization of Personal Data
Shigeo TSUJII, Hiroshi YAMAGUCHI, Hiroshi DOI, Yukiyasu TSUNOO, Ryo FUJITA, Takahiko SYOUJI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) A privacy-preserving data processing system using Paillier and RSA cryptosystem, which was proposed in the SCIS 2012, is improved. We defined the role and the function of each organization participating in the process-the organization keeping the personal data, personal data utilizing center, and data processing center. Their role and access permission of is described more clearly in this paper. Additionally, the concept of verifying the correctness of the process without revealing the raw data and secret information is also shown.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) e-administration / healthcare network / personal information protection / RSA cryptosystem / Paillier cryptosystem / zero-knowledge proof
Paper # ISEC2012-33,SITE2012-29,ICSS2012-35,EMM2012-25
Date of Issue

Conference Information
Committee ICSS
Conference Date 2012/7/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems For Overcoming Contradiction of Protection and Utilization of Personal Data
Sub Title (in English)
Keyword(1) e-administration
Keyword(2) healthcare network
Keyword(3) personal information protection
Keyword(4) RSA cryptosystem
Keyword(5) Paillier cryptosystem
Keyword(6) zero-knowledge proof
1st Author's Name Shigeo TSUJII
1st Author's Affiliation Research and Development Initiative, Chuo University()
2nd Author's Name Hiroshi YAMAGUCHI
2nd Author's Affiliation Research and Development Initiative, Chuo University
3rd Author's Name Hiroshi DOI
3rd Author's Affiliation Institute of Information Security
4th Author's Name Yukiyasu TSUNOO
4th Author's Affiliation Knowledge Discovery Research Laboratories, NEC Corporation
5th Author's Name Ryo FUJITA
5th Author's Affiliation Research and Development Initiative, Chuo University
6th Author's Name Takahiko SYOUJI
6th Author's Affiliation YDK Technologies Company
Date 2012-07-20
Paper # ISEC2012-33,SITE2012-29,ICSS2012-35,EMM2012-25
Volume (vol) vol.112
Number (no) 128
Page pp.pp.-
#Pages 5
Date of Issue