Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure multi-party computing method, device and system

A technology for secure multi-party computing and a computing device, applied in the field of secure multi-party computing methods, devices and systems, can solve the problems of occupying resources, reducing computing efficiency, and performance of secure multi-party computing technology, so as to improve computing efficiency and reduce local resource occupation. Effect

Active Publication Date: 2020-09-25
JUZIX TECH SHENZHEN CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption operation and decryption operation in the prior art are performed locally, occupying local resources, reducing the computing efficiency and the performance of secure multi-party computing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party computing method, device and system
  • Secure multi-party computing method, device and system
  • Secure multi-party computing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0092] In view of the fact that the current encryption and decryption operations are performed locally, occupying local resources, reducing computing efficiency and the performance of secure multi-party computing technology, the embodiment of the present invention provides a secure multi-party computing method to reduce the occupation of local resources and improve Computational efficiency and performance of secure multi-party computing techniques. The present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secure multiparty computation method, device, and system. The secure multiparty computation method comprises: converting a computation function into an initial logic circuit (S101); selecting multiple pairs of random number so as to form an input label and an auxiliary label (S102); processing a first function, the initial logic circuit, the input label, and the auxiliary label correspondingly, so as to obtain a first processing result (S103); sending the first processing result to a first outsourced computation device (S104); receiving an initial first sub-circuit generated by the first outsourced computation device according to the first processing result (S105); processing the initial first sub-circuit so as to obtain an encrypted circuit (S106); obtaining a first sub-input label according to input data corresponding to the initial logic circuit and the input label (S107); sending the encrypted circuit and the first sub-input label to a second secure multiparty computation device (S108); and receiving a computation result from the second secure multiparty computation device (S109). According to the method, fewer local resources are occupied, and the computation efficiency and the performance of the secure multiparty computation technology are improved.

Description

technical field [0001] The present invention relates to the technical field of cryptography, in particular to a secure multi-party computing method, device and system. Background technique [0002] Secure multi-party computation has always been an active research direction in the field of cryptography. Secure multi-party computation means that without a trusted third party, multiple participants jointly calculate a function, so that all participants can calculate the calculation results, but the input information of each party will not be disclosed. In secure multi-party computation, the most common and effective way is to use encrypted circuit (garbled circuit) and oblivious transmission. [0003] The main idea of ​​the encryption circuit is to express the function that needs to be calculated as a logic circuit, and perform encryption operations for each logic gate one by one. The encryption operation and the decryption operation in the prior art are performed locally, oc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/00H04L2209/122H04L2209/46
Inventor 谢翔李升林孙立林
Owner JUZIX TECH SHENZHEN CO LTD