Secure computation data utilization system, method, apparatus and non-transitory medium
Abstract:
An intermediate apparatus that upon reception of a request from an application apparatus, instructs a plurality of secure computation apparatuses to perform a secret computation processing, in accordance with the request, performs a part of operation of the request from the application apparatus, on at least one of a part of data included in the request or data reconstructed from shares received from a plurality of secure computation apparatuses.
Information query
Patent Agency Ranking
0/0