Multi-party safety calculation method and device, and electronic equipment

A computing method and security technology, applied in the field of distributed computing, can solve problems such as incorrectness, leakage of private data, implementation of malicious algorithms, etc., and achieve the effect of facilitating auditing

Active Publication Date: 2019-02-19
ADVANCED NEW TECH CO LTD
View PDF6 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the multi-party secure computing algorithm can protect private ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party safety calculation method and device, and electronic equipment
  • Multi-party safety calculation method and device, and electronic equipment
  • Multi-party safety calculation method and device, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In practical applications, for the purpose of privacy protection, multi-party secure computing algorithms are usually black-box algorithms, and the data transmission behavior between computing nodes equipped with multi-party secure computing algorithms is very opaque;

[0063] For example, between computing nodes equipped with multi-party secure computing algorithms such as secret sharing, homomorphic encryption, and obfuscated circuits, interactive messages carrying a large amount of ciphertext and / or random numbers are usually transmitted, even for users of multi-party secure computing algorithms It is also difficult to understand the specific meaning of the ciphertext and / or random numbers carried in the above interaction messages.

[0064] Therefore, for the provider of the multi-party secure computing algorithm, in order to prove that the multi-party secure computing algorithm it provides is transparent and credible, it has to share the source code of the multi-part...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multi-party secure computing method is applied to any computing node deployed in a distributed network. Wherein a plurality of computing nodes are deployed in the distributed network, and the plurality of computing nodes jointly participate in multi-party secure computing based on the privacy data held by the plurality of computing nodes, wherein the method comprises the following steps of: generating computing parameters related to the held privacy data based on a multi-party secure computing algorithm; Sending the computing parameters to other computing nodes participating in the multi-party security computing to perform the multi-party security computing by the other computing nodes based on the collected computing parameters sent by each computing node participating in the multi-party security computing; And creating an audit log corresponding to the calculation parameter; Wherein the audit log records description information related to the calculation parameter.

Description

technical field [0001] One or more embodiments of this specification relate to the field of distributed computing, and in particular to a multi-party secure computing method and device, and electronic equipment. Background technique [0002] Multi-party secure computing is a cryptographic technology. Multiple parties participating in the calculation can perform a multi-party secure computing algorithm based on their own input data to jointly perform secure calculations and obtain a calculation result without disclosing the holding data to other parties. Some input data. [0003] Although multi-party secure computing algorithms can protect private data, incorrect or even malicious algorithm implementations may still leak private data. Ideally, all parties can develop their own multi-party secure computing software, and use their own multi-party secure computing software to participate in multi-party secure computing. However, in practical applications, all parties usually u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245G06F21/71H04L2209/46H04L9/085H04L9/0869H04L9/0819H04L9/50
Inventor 李漓春殷山王华忠林文珍
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products