Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure multi-party computing method, device, equipment, and computer readable medium

A secure multi-party computing and multi-party computing technology, applied in the field of encrypted computing

Active Publication Date: 2020-03-24
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a secure multi-party computing method, device, device, and computer-readable medium to solve or alleviate one or more technical problems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party computing method, device, equipment, and computer readable medium
  • Secure multi-party computing method, device, equipment, and computer readable medium
  • Secure multi-party computing method, device, equipment, and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In the following, only some exemplary embodiments are briefly described. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature and not restrictive. Embodiments of the present invention mainly provide a method and device for secure multi-party computing, and the technical solutions are described below through the following embodiments.

[0055] The present invention provides a secure multi-party computing method and device. The specific processing flow and principles of the secure multi-party computing method and device in the embodiments of the present invention will be introduced in detail below.

[0056] Such as figure 1 As shown in , it is a flow chart of a secure multi-party computing method according to an embodiment of the present invention. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe multi-party computing method, which comprises the following steps of dynamically converting a multi-party computing program segment into a first messy code circuit by using a multi-party computing operator of a first main body, and sequentially executing messy code gates of the first messy code circuit through an execution engine of the first main body so as to encrypt data of the first main body; sending the data encrypted by the first main body and the messy code gate identifier to a second main body; and performing second encryption calculation on the encrypteddata in sequence by the second main body according to the received messy code gate identifier, and returning a result to the first main body. According to the embodiment of the invention, the messy code circuit is dynamically generated according to the multi-party calculation operator, and the messy code circuit is executed by the execution engine in an assembly line mode. Therefore, the compiling and executing processes can be performed simultaneously, and the compiling and executing efficiency is improved.

Description

technical field [0001] The present invention relates to the technical field of encryption computing, in particular to a secure multi-party computing method, device, device and computer-readable medium. Background technique [0002] Secure multi-party computation (SMC, secure multi-party computation) is to solve the collaborative computing problem of privacy protection among a group of distrusting parties. SMC must ensure the independence of input and the correctness of calculation without disclosing each input value. to other members involved in the calculation. [0003] At present, traditional multi-party computing (MPC, Multi-Party Computation) libraries include: Fairplay, Oblivm, Obliv-C, FastGC, Spdz, ShareMind, etc. Among them, the first generation of multi-party computing libraries such as: Fairplay, CBMC-GC, FastGC, etc. are all implemented based on compiling C-like high-level languages ​​into binary garbled circuits. The second generation of multi-party computing l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F8/20G06F8/41
CPCG06F21/57G06F8/24G06F8/41G06F21/602H04L2209/46G09C1/00H04L2209/12H04L9/00H04L9/008
Inventor 冯智张宇于晓宁呙昊甦
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD