Secure multiparty computing method, device and system

A technology of secure multi-party computing and computing devices, applied in the field of secure multi-party computing methods, devices and systems, can solve the problems of resource occupation, reduce computing efficiency, and secure multi-party computing technical performance, so as to improve computing efficiency and reduce local resource occupation Effect

Active Publication Date: 2018-11-13
JUZIX TECH SHENZHEN CO LTD
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption operation and decryption operation in the prior art are performed locally, occupying local resources, reducing the computing efficiency and the performance of secure multi-party computing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multiparty computing method, device and system
  • Secure multiparty computing method, device and system
  • Secure multiparty computing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0092] In view of the fact that the current encryption and decryption operations are performed locally, occupying local resources, reducing computing efficiency and the performance of secure multi-party computing technology, the embodiment of the present invention provides a secure multi-party computing method to reduce the occupation of local resources and improve Computational efficiency and performance of secure multi-party computing techniques. The present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure multiparty computing method, device and system. The secure multiparty computing method comprises the steps of converting a computing function into an initial logic circuit; selecting multiple pairs of random number so as to form an input label and an auxiliary label; processing a first function, the initial logic circuit, the input label and the auxiliary label correspondingly, so as to obtain a first processing result; sending the first processing result to a first outsourced computing device; receiving an initial first sub-circuit generated by the first outsourced computing device according to the first processing result; processing the initial first sub-circuit so as to acquire an encrypted circuit; obtaining a first sub-input label according to input data corresponding to the initial logic circuit and the input label; sending the encrypted circuit and the first sub-input label to a second secure multiparty computing device; and receiving a computingresult from the second secure multiparty computing device. Fewer local resources are used, computing efficiency is improved, and the performance of the secure multiparty computing technology is improved.

Description

technical field [0001] The present invention relates to the technical field of cryptography, in particular to a secure multi-party computing method, device and system. Background technique [0002] Secure multi-party computation has always been an active research direction in the field of cryptography. Secure multi-party computation means that without a trusted third party, multiple participants jointly calculate a function, so that all participants can calculate the calculation results, but the input information of each party will not be disclosed. In secure multi-party computation, the most common and effective way is to use encrypted circuit (garbled circuit) and oblivious transmission. [0003] The main idea of ​​the encryption circuit is to express the function that needs to be calculated as a logic circuit, and perform encryption operations for each logic gate one by one. The encryption operation and the decryption operation in the prior art are performed locally, oc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/00H04L2209/122H04L2209/46
Inventor 谢翔李升林孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products