Multi-party secure computing method and device, electronic equipment

A computing method and security technology, applied in the field of distributed computing, which can solve the problems of malicious algorithm implementation, leakage of private data, incorrectness, etc.

Active Publication Date: 2020-08-14
ADVANCED NEW TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the multi-party secure computing algorithm can protect private data, incorrect or even malicious algorithm implementation may still leak private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party secure computing method and device, electronic equipment
  • Multi-party secure computing method and device, electronic equipment
  • Multi-party secure computing method and device, electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] For computing nodes equipped with multi-party secure computing algorithms such as secret sharing and obfuscated circuits, one or more random numbers are usually generated based on the carried random algorithm, and the generated random numbers are used to calculate the private data held to obtain the budget As a result, the generated random number and the above-mentioned calculation results are then used as calculation parameters and transmitted to other calculation nodes participating in the multi-party secure calculation.

[0062] In practical applications, malicious multi-party security algorithms may use private data held by computing nodes participating in multi-party security calculations to construct pseudo-random numbers, and then use the pseudo-random numbers and The calculation results obtained by calculating the private data of the private data are transmitted to other computing nodes participating in the multi-party security calculation; furthermore, in this w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multi-party secure computing method, applied to any computing node deployed in a distributed network; the distributed network deploys multiple computing nodes, and the multiple computing nodes jointly participate in multi-party secure computing based on private data held by them ; Wherein, the computing node is connected to a trusted random source; the method includes: obtaining a trusted random number from the trusted random source; performing an operation on the held private data based on the obtained trusted random number to obtain an operation Result; at least the trusted random number is sent as a calculation parameter to other computing nodes participating in the multi-party secure computing, so that the other computing nodes can execute the calculation based on the collected computing parameters sent by the computing nodes participating in the multi-party secure computing Multi-party secure computing.

Description

technical field [0001] One or more embodiments of this specification relate to the field of distributed computing, and in particular to a multi-party secure computing method and device, and electronic equipment. Background technique [0002] Multi-party secure computing is a cryptographic technology. Multiple parties participating in the calculation can perform a multi-party secure computing algorithm based on their own input data to jointly perform secure calculations and obtain a calculation result without disclosing the holding data to other parties. Some input data. [0003] Although multi-party secure computing algorithms can protect private data, incorrect or even malicious algorithm implementations may still leak private data. Ideally, all parties can develop their own multi-party secure computing software, and use their own multi-party secure computing software to participate in multi-party secure computing. However, in practical applications, all parties usually u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245G06F21/71H04L2209/46H04L9/0869H04L9/085G06F7/582H04L9/50
Inventor 李漓春殷山王华忠林文珍
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products