Patents by Inventor Kazue Sako
Kazue Sako has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11763383Abstract: A cryptocurrency system that enables to verify the origin of a cryptocurrency is provided. A cryptocurrency system includes: at least one terminal; and a plurality of management servers configured to manage a blockchain storing a trading history in a cryptocurrency. The at least one terminal includes a trading control section, and a transmission section. The trading control section is configured to generate a transaction including a first signature for a trading content and a second signature enabling to verify a validity of a remittance source address described in the trading content. The transmission section is configured to transmit the generated transaction to the plurality of management servers.Type: GrantFiled: May 30, 2019Date of Patent: September 19, 2023Assignee: NEC CORPORATIONInventor: Kazue Sako
-
Publication number: 20220253933Abstract: A cryptocurrency system that enables to verify the origin of a cryptocurrency is provided. A cryptocurrency system includes: at least one terminal; and a plurality of management servers configured to manage a blockchain storing a trading history in a cryptocurrency. The at least one terminal includes a trading control section, and a transmission section. The trading control section is configured to generate a transaction including a first signature for a trading content and a second signature enabling to verify a validity of a remittance source address described in the trading content. The transmission section is configured to transmit the generated transaction to the plurality of management servers.Type: ApplicationFiled: May 30, 2019Publication date: August 11, 2022Applicant: NEC CorporationInventor: Kazue SAKO
-
Patent number: 11212112Abstract: A system includes a plurality of nodes, an individual one of which transmits data to which a group signature is attached, and a plurality of management servers that are directly connected to each other. An individual one of the plurality of management servers includes a ledger for managing data received from the nodes. Addition of data to the ledger of at least one of the plurality of management servers is reflected on the ledgers of the other management servers.Type: GrantFiled: July 28, 2017Date of Patent: December 28, 2021Assignee: NEC CORPORATIONInventors: Kazue Sako, Isamu Teranishi
-
Publication number: 20200402171Abstract: An electronic transaction system includes a plurality of administration servers, a terminal, a transaction server. The plurality of administration servers provides an electronic bulletin board. The terminal writes bid data including an encrypted price to the electronic bulletin board. The transaction server gets the written bid data, decrypts the encrypted price, executes transaction using the decrypted price by Zaraba scheme.Type: ApplicationFiled: March 29, 2018Publication date: December 24, 2020Applicant: NEC CorporationInventors: Toshiyuki ISSHIKI, Kazue SAKO
-
Patent number: 10797867Abstract: In an electronic bidding system and method, it is unnecessary to disclose to bidders a list of public keys matched to bid prices, and in which price secrecy may be proved. In a function of encryption of a bidding device 300, a public key is generated using a bid price and an IBE public key, based on an ID-Based Encryption (IBE) system having a bid value as an ID. IBE public key is obtained on combining a plurality of partial public keys matched to partial secret keys generated by a plural number of partial bid opening devices based on a combination condition enabling group decryption. A preset message for bidding is then encrypted. In a function of decryption of a bid opening device 400, a number of partial bid opening devices, which is in keeping with a satisfying number of the group decryption, perform calculations for decryption for winning bid value candidates, beginning from such candidate, the allowable bid value closest to the bid closing condition.Type: GrantFiled: November 29, 2006Date of Patent: October 6, 2020Assignee: NEC CORPORATIONInventors: Toshiyuki Isshiki, Kazue Sako
-
Publication number: 20190165948Abstract: A system includes a plurality of nodes, an individual one of which transmits data to which a group signature is attached, and a plurality of management servers that are directly connected to each other. An individual one of the plurality of management servers includes a ledger for managing data received from the nodes. Addition of data to the ledger of at least one of the plurality of management servers is reflected on the ledgers of the other management servers.Type: ApplicationFiled: July 28, 2017Publication date: May 30, 2019Applicant: NEC CorporationInventors: Kazue SAKO, Isamu TERANISHI
-
Patent number: 8583925Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: GrantFiled: June 8, 2012Date of Patent: November 12, 2013Assignee: NEC CorporationInventors: Jun Furukawa, Kazue Sako
-
Patent number: 8553889Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: GrantFiled: June 8, 2012Date of Patent: October 8, 2013Assignee: NEC CorporationInventors: Jun Furukawa, Kazue Sako
-
Publication number: 20120250855Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: ApplicationFiled: June 8, 2012Publication date: October 4, 2012Applicant: NEC CORPORATIONInventors: Jun Furukawa, Kazue Sako
-
Publication number: 20120250868Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: ApplicationFiled: June 8, 2012Publication date: October 4, 2012Inventors: Jun Furukawa, Kazue Sako
-
Patent number: 8223973Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: GrantFiled: January 8, 2010Date of Patent: July 17, 2012Assignee: NEC CorporationInventors: Jun Furukawa, Kazue Sako
-
Publication number: 20100115285Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: ApplicationFiled: January 8, 2010Publication date: May 6, 2010Applicant: NEC CORPORATIONInventors: JUN FURUKAWA, KAZUE SAKO
-
Patent number: 7694880Abstract: A voting server transmits a list of plaintext and encrypted voting data obtained by encrypting the plaintext to a voter terminal, and the voter terminal a selected encrypted candidate name corresponding to the plaintext elected by the voter to an encryption server. The encryption server returns encrypted voting data obtained by re-encrypting the encrypted candidate name to the voter terminal, and the voter terminal transmits the encrypted voting data received from the encryption server for voting. Decryption of the encrypted voting data is performed by an anonymous decryption system. The voter terminal certifies the voter to an authentication server, and affixes a digital signature to the encrypted voting data based on a common-key authentication base, transmitting the same to the voting server.Type: GrantFiled: January 18, 2005Date of Patent: April 13, 2010Assignee: NEC CorporationInventors: Kengo Mori, Kazue Sako
-
Patent number: 7672460Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: GrantFiled: January 24, 2005Date of Patent: March 2, 2010Assignee: NEC CorporationInventors: Jun Furukawa, Kazue Sako
-
Publication number: 20090089575Abstract: When an entrustor entrusts an outsourcer with the supply of a service for members, member information managed by the entrustor is kept secret from the outsourcer, and users can receive the service without communicating with the entrustor. For using the service, user apparatus 3 sends group signature data to outsourcer apparatus 2. Outsourcer apparatus 2 authenticates the group signature data using public information of entrustor apparatus 1. When the group signature data passes the authentication, confirming that user apparatus 3 is a member of entrustor apparatus 1, outsourcer apparatus 2 provides the service to user apparatus 3.Type: ApplicationFiled: May 31, 2006Publication date: April 2, 2009Inventors: Shoko Yonezawa, Kazue Sako
-
Publication number: 20090083190Abstract: In an electronic bidding system and method, it is unnecessary to disclose to bidders a list of public keys matched to bid prices, and in which price secrecy may be proved. In a function of encryption of a bidding device 300, a public key is generated using a bid price and an IBE public key, based on an ID-Based Encryption (IBE) system having a bid value as an ID. IBE public key is obtained on combining a plurality of partial public keys matched to partial secret keys generated by a plural number of partial bid opening devices based on a combination condition enabling group decryption. A preset message for bidding is then encrypted. In a function of decryption of a bid opening device 400, a number of partial bid opening devices, which is in keeping with a satisfying number of the group decryption, perform calculations for decryption for winning bid value candidates, beginning from such candidate, the allowable bid value closest to the bid closing condition.Type: ApplicationFiled: November 29, 2006Publication date: March 26, 2009Inventors: Toshiyuki Isshiki, Kazue Sako
-
Publication number: 20090044017Abstract: An RSA signature method is provided in which the length of a signature does not depend on the number of signature devices when multiple signature devices are related to the creation of the signature. A signature device i_{m} includes first conversion means SS1B105 that performs no operation if a received signed text u_{i_{m?1}} exceeds a modulus n_{i_{m}} and, if not, adds an RSA-method-based signature; bijective conversion means S1B106 that multiplies the result by a function that maps the result to a value larger by the modulus n_{i_{m}}; second conversion means S1B107 that performs no operation if the operation result exceeds the modulus n_{i_{m}} and, if not, adds an RSA-method-based signature; and output means S1B109 that outputs the operation result as the signed text u_{i_{m}}.Type: ApplicationFiled: November 11, 2005Publication date: February 12, 2009Applicant: NEC CORPORATIONInventors: Isamu Teranishi, Kazue Sako, Daigo Taguchi, Jun Noda
-
Patent number: 7376833Abstract: A anonymous decryption system, the management of which is facilitated and initialization of which is readily and reliably carried out. A shuffling management center (10) transmits a security parameter and common public information generated on the basis of the security parameter to decryption shuffle centers (20-1 to 20-m). The decryption shuffle centers (20-1 to 20-m) generate public keys and decryption keys and returns the public keys to the shuffling management center (10). The shuffling management center combines the returned public key to generate an encryption public key and make the encryption key public. The shuffling management center (10) repeats transfer of encrypted data list to the decryption shuffle center (20-j) having the j-th processing priority when it decrypts the encrypted data list, transfer of a received data list of which a order-switching process and a partial decryption process are carried out to the next decryption shuffle center (20-(j+1)).Type: GrantFiled: February 12, 2002Date of Patent: May 20, 2008Assignee: NEC CorporationInventors: Kazue Sako, Kengo Mori
-
Publication number: 20080091941Abstract: For group signature data capable of keeping anonymity, it is possible to efficiently determine whether the user having created the group signature data is a valid member of the group. When a message and group signature data are received, the verification unit 3 authenticates the data and inquires, of the member status response unit 4, whether the user of the signature unit 2 having created the group signature data is a valid member of the group. In response to the inquiry, the response unit 4 determines the member status of the user having created the group signature data, according to a member revocation list notified from the group management unit 1. The response unit 4 then transmits a judge result of the member status to the verification unit 3.Type: ApplicationFiled: August 11, 2005Publication date: April 17, 2008Applicant: NEC CORPORATIONInventors: Shoko Yonezawa, Kazue Sako
-
Publication number: 20070185761Abstract: A voting server transmits a list of plaintext and encrypted voting data obtained by encrypting the plaintext to a voter terminal, and the voter terminal a selected encrypted candidate name corresponding to the plaintext elected by the voter to an encryption server. The encryption server returns encrypted voting data obtained by re-encrypting the encrypted candidate name to the voter terminal, and the voter terminal transmits the encrypted voting data received from the encryption server for voting. Decryption of the encrypted voting data is performed by an anonymous decryption system. The voter terminal certifies the voter to an authentication server, and affixes a digital signature to the encrypted voting data based on a common-key authentication base, transmitting the same to the voting server.Type: ApplicationFiled: January 18, 2005Publication date: August 9, 2007Inventors: Kengo Mori, Kazue Sako