Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dot product protocol-based protocol security quantizing method and system

A technology of protocol security and quantification method, which is applied in the field of protocol security quantification method and system based on the dot product protocol, can solve the problems that the absolute security of zero leakage cannot be realized, and the calculation method cannot be applied, so as to improve the use efficiency Effect

Inactive Publication Date: 2010-11-24
ANHUI NORMAL UNIV
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the research on the security of secure multi-party computing protocols is only based on theoretical analysis, and there is no calculation method that can be applied to practice to express the security of secure multi-party computing protocols intuitively.
Moreover, this theoretical analysis emphasizes that the input information of the participants is zero leakage, but in practical applications, this absolute security of zero leakage is often impossible to achieve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dot product protocol-based protocol security quantizing method and system
  • Dot product protocol-based protocol security quantizing method and system
  • Dot product protocol-based protocol security quantizing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] The flow of the protocol security quantification method based on the dot product protocol disclosed in Embodiment 1 of the present invention is as follows: figure 1 shown, including:

[0055] Step S11, obtaining the value ranges of variables before and after each participant executes the agreement respectively;

[0056] Step S12, respectively calculating the difference between the maximum value and the minimum value of the variable value range before and after each participant executes the agreement;

[0057] Step S13. Multiply the difference between each participant before executing the agreement to obtain the security parameter before executing the agreement;

[0058] Step S14. Multiply the difference between each participant after executing the agreement to obtain the security parameter after executing the agreement;

[0059] Step S15 , referring to the security parameters before and after the execution of the protocol, to acquire the security value of the protocol...

Embodiment 2

[0062] This embodiment discloses a protocol security quantification method based on the dot product protocol when the number of participants is two, and the process is as follows figure 2 shown, including:

[0063] Step S21, obtaining the value ranges of variables before and after the execution of the agreement by the first and second participants respectively;

[0064] For an agreement with only two parties, it is necessary to obtain the variable value range X of the first party before the agreement is executed 0 =[a x0 , b x0 ] and the variable value range X of the first party after the agreement is executed 1 =[a x1 , b x1 ], the second party’s variable value range Y before the agreement is executed 0 =[a y0 , b y0 ], and the variable value range Y of the second party after the protocol is executed 1 =[a y1 , b y1 ].

[0065] Step S22, respectively calculating the difference between the maximum value and the minimum value of the variable value range before and ...

Embodiment 3

[0080] For the dot product protocol involving a third party, since the private data of the third party is also concealed, and some information may be leaked before and after the execution of the protocol, when quantifying the security of the protocol, the security of the third party should also be consider. This embodiment discloses a protocol security quantification method based on the dot product protocol when the number of participants is three, and the process is as follows Figure 4 shown, including:

[0081] Step S41, obtaining respectively the value ranges of the variables before and after the execution of the agreement by the first, second and third parties;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dot method product protocol-based protocol security quantizing method and a dot product protocol-based protocol security quantizing system. The method comprises the following steps of: acquiring the variable value ranges before and after protocol execution of all parties respectively; computing the differences between the maximal values and the minimal values of the variable value ranges before and after the protocol execution of all the parties respectively; multiplexing the differences before the protocol execution of all the parties to obtain security parameters before the protocol execution; multiplexing the differences after the protocol execution of all the parties to obtain the security parameters after the protocol execution; and acquiring a protocol security value according the security parameters before and after the protocol execution. The method of the invention realizes the aim of quantizing the protocol security by processing the variable value ranges of all the parties before and after the protocol execution and using the processing results as representative values of the protocol security. The method and the system can quantify the security of different protocols, are favorable for selecting the protocol of which the security meets actual demands according to actual application conditions and improve the service efficiency of secure multi-party computation.

Description

technical field [0001] The invention relates to the field of information security, in particular to a protocol security quantification method and system based on a dot product protocol. Background technique [0002] Secure multi-party computation (SMC) is mainly used to study cooperative computing problems between a group of mutually distrusting parties under the premise of protecting private information, and its basic requirement is to ensure the independence of input , the correctness of the calculation, while not disclosing the input information of each participant participating in the agreement to other members participating in the calculation. In simple terms, Secure Multi-Party Computation is a protocol in which parties employ a special method to compute any parameter of many variables. The types of secure multi-party computing protocols include: OT-based secure multi-party computing protocols, dot product protocols, and the like. [0003] The existing performance an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 罗永龙陈蔡霞
Owner ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products