Method and device for performing multi-party security calculation through certificate issuing

A certificate and root certificate technology, which is applied in the field of distributed computing and secure computing, can solve problems such as high cost, complicated and cumbersome multi-party computing communication process, etc.

Active Publication Date: 2019-12-03
ADVANCED NEW TECH CO LTD
View PDF10 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the secret key negotiation is carried out separately and a separate trusted channel is established separately, then when the number of trusted computing units increases and the number is large, the communication process of multi-party computing will become complicated and costly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for performing multi-party security calculation through certificate issuing
  • Method and device for performing multi-party security calculation through certificate issuing
  • Method and device for performing multi-party security calculation through certificate issuing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0136] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0137] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. As shown in the figure, the required computing tasks can be executed by the trusted computing units in the trusted execution environment TEE. A trusted computing unit can be a computing module or computing device that has a certain isolation capability to ensure computing security, such as a trusted computing enclave Enclave, such as implemented by using technologies such as SGX or Trust Zone. For example, according to SGX technology, by providing a series of CPU instruction codes, allowing user code to create a private memory area with high access rights to form a computing enclave Enclave. Other applications, including the operating system OS, BIOS system, virtual machine system, etc., cannot access the data in the Enclave, and ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for performing multi-party secure computing by distributing certificates. According to the scheme, task groups are formed through pre-configuration, and group identifiers are allocated. A trusted certificate generator generates a set of certificate chain and a private key for a group identifier, the certificate chain comprises a root certificate and a corresponding public key certificate, and the public key certificate is matched with the private key to form a certificate pair. And then, the trusted certificate generator distributesthe root certificate and the certificate pair to each trusted computing unit which is authenticated and runs each computing task corresponding to the group of identifiers. And on the other hand, the root certificate is distributed to the user terminal requesting the computing service of the task group. Thus, the user terminal with the root certificate and the trusted computing unit with the root certificate and the certificate pair can perform multi-party secure communication in a TLS protocol mode.

Description

technical field [0001] One or more embodiments of this specification relate to the fields of distributed computing and secure computing, and in particular, to methods and devices for multi-party secure computing. Background technique [0002] For the security of computing and data transmission, trusted computing units in Trusted Execution Environment (TEE) are often used for trusted computing and data processing, in which trusted computing units can ensure that the code execution is safe, and the outside world includes Neither the operating system nor the driver can obtain secrets such as internal runtime memory. For example, the trusted computing unit can be used to run program codes and perform computing tasks, so as to ensure the safety of program code execution and isolation from the outside world. [0003] For the security needs of the trusted execution environment, before the trusted computing unit communicates with other parties, such as communicating with the user t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0643H04L9/0825H04L9/083H04L9/3265
Inventor 余超凡王磊周爱辉张宁田洪亮肖俊贤
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products