Enables safe processing regardless of the environment.
Although the data remains secure while encrypted during storage, it must be decrypted to its original state for analysis. This decryption stage introduces the potential risks of data leakage and tampering.
We can solve your problems
QueryAhead®
Check with video
Table of Contents
What is Secure Computation?
But is this enough to be safe?
Of course, the contents of the data cannot be read in its encrypted state. Therefore, when the data is used for analysis or processing, the encrypted data must be decrypted to the original data. Decrypting data means that the important data itself is placed there in a state that can be read by anyone (called plaintext). This state has been subject to the risk of information leakage and tampering.
Secure computation technology enables encrypted data to be computed without decryption. This makes it possible to realize a consistently secure environment from data communication to storage and even utilization.
Secure computation technology has been studied for many years in the field of cryptology around the world, and its security is widely recognized in academic fields. Our secure computation technology has been developed based on the theoretical design by the National Institute of Advanced Industrial Science and Technology (AIST), a leading research institute in Japan.
Yusuke Ishida, Kazuma Ohara, Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, “Design and Implementation of RNG Server for Secure MPC”, SCIS2021.
Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Satsuya Ohata, Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, “A Secure Querying System for Developers without Background on Secure Computation”, SCIS2020.
Yusuke Ishida, Junichi Oketani, Atsushi Kunii, Satsuya Ohata, Goichiro Hanaoka, “A Scalable Server Configuration and Round-Efficient Implementation in Secure Two-Party Computation”, CSS2019.
Current situation
If secret computing is employed…
簡単にわかる秘密計算
Where to be used?
Wants to leverage data from multiple organizations
This is where secure computation technology can be used.
Secure computation technology makes it possible to process and analyze data while keeping the contents of the confidential data from individual companies hidden. This allows each company to provide data and thus output that benefits the entire industry.
Wants to leverage data from multiple organizations
Secure computation technology can be used to solve this problem.
With secure computation technology, data can be processed and analyzed without any decryption, even if the data is placed on an external cloud. As a result, by eliminating external data reconstruction points, it is possible to securely take data out and utilize it, thereby increasing the efficiency of the analysis process.
What is QueryAhead®?
1
Can be queried in Python and SQL
2
Can be built in the cloud or on-premise
3
No expertise in cryptography is required
Function list
- Basic arithmetic operations
- +、-、×、÷
- Filtering
- Extraction by conditions
- Sort
- Sorting Table Data
- Table join
- Join multiple tables according to conditions
- Aggregating
- Grouping and aggregating the same categories
- Basic statistical operations
- Minimum, maximum, average, number of pieces, etc.
- Linear regression
- Learning and inference with linear regression
- Access control
- Fine control of decryption, query, and other permissions for each user and table
- Other
- String operations, inner product operations, etc.
Flow
The flow when using QueryAhead® is based on three steps: storing data, querying, and retrieving results.
Let’s look at each step using the example of a situation in which the data owner outsources data analysis to another company.
Storing data
Data can be submitted via CSV files or Python’s Pandas or Numpy.
Query
The queries can be written like regular data processing programs using Python or SQL. The issued query is converted into a secure computation program on QueryAhead®, which performs the secure computation using the submitted encrypted data.
The query results are also encrypted and stored on QueryAhead®.
Access rights are flexible, so the range of data (table names, column names, etc.) that can be decrypted or referenced by external analysts and operations allowed to be performed can be set in detail.
Obtaining results
In this example, the data owner obtains the encrypted query results from the QueryAhead® server, decrypts them, and uses them.