Table 1 Conditions of the trusted server in our experiment. Similar requirements of hardware security module (HSM) defined in FIPS140-2 would be required as the conditions to be “a trusted server.” Refer to the HSM requirements, conditions listed in Table 1 were implemented in this demonstration.

From: Secure secondary utilization system of genomic data using quantum secure cloud

1

Access rights to the server are strictly managed

2

In the case of external connection, hardware authentication must be carried out in an information theoretically secure manner

3

A protected area of a certain capacity (e.g. 1 GB) can be assumed in the server

4

Do not store unencrypted data in the protected area of the server for long periods (e.g. 24 h or more)

5

Must be installed in a server room with strict access control

6

Unnecessary external interface is disabled

7

If you want to store data outside for a long time, carry out secret sharing

8

OTP encryption when transmitting data to the outside

9

Make sure to erase the random numbers used for encryption and secret sharing

10

Use a random number source that does not have periodicity, such as a physical / quantum random number generator

11

Other security on general information systems such as intrusion detection system (IDS) and intrusion prevention system (IPS) should be applied