Figure 2 | Scientific Reports

Figure 2

From: Secure secondary utilization system of genomic data using quantum secure cloud

Figure 2

The network configuration of secret sharing and secure computation on the Tokyo QKD Network. The share holders (Share A, B and C) and the data owner are established in trusted nodes of Tokyo QKD Network. The data owner has a function of the share holder. The trusted server is set in the same place of the data owner. The share holders, the data owner, and the users communicate by using OTP encryption from keys generated in Tokyo QKD Network.

Back to article page