Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method to solve the problem of data privacy disclosure in multi-party computing

A technology of data privacy and multi-party computing, applied in the field of information security, can solve problems such as data privacy leakage, achieve the effect of solving data privacy leakage and ensuring scalability

Active Publication Date: 2018-12-28
XI AN JIAOTONG UNIV
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the shortcomings of the above-mentioned prior art and solve the problem of data privacy leakage in multi-party computing, the purpose of the present invention is to provide a method for solving the problem of data privacy leakage in multi-party computing, which reduces the data in the process of data analysis and calculation involving multiple parties. The risk of privacy leakage; this method utilizes the trusted execution environment at the cloud hardware level, and in the absence of a trusted third party, the participants holding the data remotely execute the key management program executed in the cloud trusted execution environment. Authentication, after confirming that the program has not been tampered with, use the public key obtained from the program to encrypt its own data, transmit the data to the cloud, and use partial homomorphic encryption technology and hardware-level trusted execution environment for mixing in the cloud Complete the analysis and calculation tasks of multi-party data in the form of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to solve the problem of data privacy disclosure in multi-party computing
  • A method to solve the problem of data privacy disclosure in multi-party computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The implementation of the present invention will be described in detail below in conjunction with the drawings and examples.

[0018] The present invention solves the problem of data privacy leakage in multi-party computing based on a hybrid computing method realized by combining a hardware-level trusted execution environment and partial homomorphic encryption technology. The entire technical solution can be divided into three parts (taking IntelSGX's hardware-level trusted environment as an example):

[0019] 1) Data analysis and calculation based on mixed forms. This part completes the data analysis and calculation of multiple participants. This part mainly consists of two parts, one part runs in the enclave of Intel SGX (enclave refers to an isolated runtime environment in SGX), and it mainly consists of a key management module and a basic operator module. The key management module It is mainly responsible for creating a public-private key pair in the enclave, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for solving the problem of data privacy disclosure in multi-party computation Using a trusted execution environment at the cloud hardware level. In the absence of a trusted third party, Participants who hold the data are able to authenticate remotely the key management program that executes in a trusted execution environment in the cloud, after confirming that theprogram has not been tampered with, the program encrypts its own data with the public key obtained from the program, transmits the data to the cloud, and performs the analysis and calculation of multi-party data in the form of mixed operation based on partial homomorphic encryption technology and hardware-level trusted execution environment at the cloud. The method does not require a centralized authority to complete the computation, so that the data analyst can analyze the data without requiring a third-party trustworthy mechanism, Completing the analysis and calculation of multi-party data can effectively reduce the risk of data privacy leakage in multi-party computation. Compared with the method based on garbled circuit, the method does not need complex key agreement mechanism and has high efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for solving the problem of data privacy leakage in multi-party computing. Background technique [0002] Multi-party computing refers to the fact that in a data analysis and calculation process, the data is jointly provided by different sources, and the parties who hold the data cooperate to complete an analysis and calculation process based on the overall data. Taking the analysis of medical data as an example, the rapid development of human genome sequencing has brought us into a genome era. Human genome data play a vital role in medical clinical research, and researchers usually perform on different genome databases. Scientific experiments for new scientific discoveries. Typically, the accuracy of the assessment relies on the quantity and quality of the data used in the analysis, with larger genomic datasets yielding more accurate results. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/57
CPCG06F21/57G06F21/602H04L9/008H04L2209/46
Inventor 齐勇赵文嘉齐赛宇姜琴
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products