Abstract: ji1i1A cipher system (10) uses a base B and a base B* to perform a cipher processing. An encryption apparatus (200) generates a cipher text including a transmission side vector that has been generated by use of one of a first vector consisting of the coefficient y of a polynomial having x as a root and a second vector consisting of an exponentiation v of v and that is a vector in the base B. A decryption apparatus (300) decrypts the cipher text which has been generated by the encryption apparatus (200) by use of a decryption key including a reception side vector that has been generated by use of the other of the first and second vectors and that is a vector in the base B*.
| # | Name | Date |
|---|---|---|
| 1 | PROOF OF RIGHT [10-08-2016(online)].pdf | 2016-08-10 |
| 2 | Power of Attorney [10-08-2016(online)].pdf | 2016-08-10 |
| 3 | Form 5 [10-08-2016(online)].pdf | 2016-08-10 |
| 4 | Form 3 [10-08-2016(online)].pdf | 2016-08-10 |
| 5 | Form 18 [10-08-2016(online)].pdf_41.pdf | 2016-08-10 |
| 6 | Form 18 [10-08-2016(online)].pdf | 2016-08-10 |
| 7 | Form 1 [10-08-2016(online)].pdf | 2016-08-10 |
| 8 | Drawing [10-08-2016(online)].pdf | 2016-08-10 |
| 9 | Description(Complete) [10-08-2016(online)].pdf | 2016-08-10 |
| 10 | Other Document [17-08-2016(online)].pdf | 2016-08-17 |
| 11 | Marked Copy [17-08-2016(online)].pdf | 2016-08-17 |
| 12 | Form 13 [17-08-2016(online)].pdf | 2016-08-17 |
| 13 | Description(Complete) [17-08-2016(online)].pdf | 2016-08-17 |
| 14 | 201647027313-Form 1-180816.pdf | 2016-09-09 |
| 15 | 201647027313-Correspondence-F1-180816.pdf | 2016-09-09 |
| 16 | 201647027313.pdf | 2016-09-17 |
| 17 | Form 3 [08-02-2017(online)].pdf | 2017-02-08 |
| 18 | 201647027313-FORM 3 [05-09-2019(online)].pdf | 2019-09-05 |
| 19 | 201647027313-FER.pdf | 2020-01-30 |
| 1 | SearchStrategyMatrix_24-01-2020.pdf |