Multi-party safety calculation method and device, and electronic equipment

A secure, multi-party technology, applied in the field of distributed computing, which can solve the problems of leaking private data, incorrect, malicious algorithm implementation, etc.

Active Publication Date: 2019-01-18
ADVANCED NEW TECH CO LTD
View PDF5 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the multi-party secure computing algorithm can protect private ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party safety calculation method and device, and electronic equipment
  • Multi-party safety calculation method and device, and electronic equipment
  • Multi-party safety calculation method and device, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] For computing nodes equipped with multi-party secure computing algorithms such as homomorphic encryption and obfuscated circuits, one or more random numbers are usually generated based on the carried random algorithm as a random key, and the generated random key is used to hold the The private data is encrypted and calculated to obtain ciphertext data, and then the calculated ciphertext data is used as calculation parameters and transmitted to other computing nodes participating in multi-party security calculations.

[0076] In practical applications, malicious multi-party security algorithms may use known keys held by other computing nodes participating in multi-party security calculations to encrypt private data held; further, in this way, the ciphertext When the data is sent to other computing nodes participating in multi-party secure computing, other computing nodes can decrypt the ciphertext data based on the known keys they hold, and obtain the private data held by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multi-party secure computing method is applied to any computing node deployed in a distributed network. A plurality of computing nodes are deployed in the distributed network, and the plurality of computing nodes participate in the multi-party secure computing together based on the privacy data held by the plurality of computing nodes respectively; Wherein the computing node is corresponding toa trusted key source; The method includes obtaining a trusted key from the trusted key source; Encrypting the held privacy data based on the obtained trusted key to obtain ciphertext data; sending atleast the ciphertext data as computational parameters to other computational nodes participating in the multi-party security computation to perform the multi-party security computation by the other computational nodes based on the collected computational parameters sent by each computational node participating in the multi-party security computation.

Description

technical field [0001] One or more embodiments of this specification relate to the field of distributed computing, and in particular to a multi-party secure computing method and device, and electronic equipment. Background technique [0002] Multi-party secure computing is a cryptographic technology. Multiple parties participating in the calculation can perform a multi-party secure computing algorithm based on their own input data to jointly perform secure calculations and obtain a calculation result without disclosing the holding data to other parties. Some input data. [0003] Although multi-party secure computing algorithms can protect private data, incorrect or even malicious algorithm implementations may still leak private data. Ideally, all parties can develop their own multi-party secure computing software, and use their own multi-party secure computing software to participate in multi-party secure computing. However, in practical applications, all parties usually u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/18H04L9/08
CPCH04L9/0894H04L2209/46H04L9/088G06F21/602G06F2221/2101G06F2221/033H04L9/008H04L9/065H04L9/0869
Inventor 李漓春殷山王华忠林文珍
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products