Non-center dot product computing method achieving privacy protection

A privacy-protecting, central-point technology, applied in computing, digital data protection, computer security devices, etc., can solve problems such as ignoring user input verification, and achieve the effect of ensuring legality and low computational complexity

Inactive Publication Date: 2014-11-19
TSINGHUA UNIV
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, these applications generally use trusted central servers, and a small number of calculations that use a non-ce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-center dot product computing method achieving privacy protection
  • Non-center dot product computing method achieving privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0038] Such as figure 1 As shown, the present invention provides a privacy-preserving non-centered dot product calculation method, comprising the following steps:

[0039] S1. The first and second participants are respectively connected with a trusted third party to obtain the certificate corresponding to the privacy vector, the certificate contains the ciphertext of the privacy vector; each participant only needs to connect once before the calculation can start To trust a third party, it is enough to obtain the required privacy vector certificate, and it is no longer necessary to connect the trusted third party in subsequent calculations; and each privacy vector correspo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a non-center dot product computing method achieving privacy protection. The non-center dot product computing method achieving privacy protection includes the following steps that 1, a first participant and a second participant are connected with a trusted third party, so that corresponding privacy vector certificates of the first participant and the second participant are obtained, wherein the certificates comprise privacy vector ciphertext; 2, the first participant sends the certificate of the first participant to the second participant; 3, the second participant carries out ciphertext homomorphic dot product computation on the basis of the privacy vector ciphertext in the certificate of the first participant, and sends the dot product ciphertext and the certificate of the second participant to the first participant; 4, the first participant decodes the dot product ciphertext to obtain the privacy vector dot product of the first participant and the privacy vector dot product of the second participant. Safety multi-party dot product computation is achieved without participation of a center server, input and output verifiability is ensured for users, and the requirements of the users for personal data privacy protection and the reliability of dot product computing results in a not credible environment are met.

Description

technical field [0001] The invention relates to the field of secure multi-party calculations, in particular to a privacy-protecting centerless dot product calculation method. Background technique [0002] Secure multi-party computation that protects privacy is widely used in various fields in real life. Secure multi-party computing is to use multi-party data to perform calculations without exposing the data privacy of the computing participants, and only expose the computing results to the computing participants. For example, user similarity calculation in social networks, privacy-protected voting and auctions, secure data collection and sorting and data outsourcing calculations in sensor networks, etc. The easiest way to solve this problem is to use a trusted central server. Computing participants will hand over their private data to the trusted center, which will perform calculations and then return the calculation results to the participants. However, in many cases, not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L9/32
CPCG06F21/6245H04L9/321H04L9/3236H04L9/3247H04L9/3263
Inventor 孙家广张兰刘云浩
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products