Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure multi-party computing method, device, device and computer-readable medium

A secure multi-party computing and multi-party computing technology, applied in the field of encrypted computing to achieve the effect of improving efficiency

Active Publication Date: 2022-02-01
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a secure multi-party computing method, device, device, and computer-readable medium to solve or alleviate one or more technical problems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party computing method, device, device and computer-readable medium
  • Secure multi-party computing method, device, device and computer-readable medium
  • Secure multi-party computing method, device, device and computer-readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In the following, only some exemplary embodiments are briefly described. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature and not restrictive. Embodiments of the present invention mainly provide a method and device for secure multi-party computing, and the technical solutions are described below through the following embodiments.

[0055] The present invention provides a secure multi-party computing method and device. The specific processing flow and principles of the secure multi-party computing method and device in the embodiments of the present invention will be introduced in detail below.

[0056] Such as figure 1 As shown in , it is a flow chart of a secure multi-party computing method according to an embodiment of the present invention. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a secure multi-party computing method, including: using the multi-party computing operator of the first subject to dynamically convert the multi-party computing program segment into a first garbled circuit, and sequentially executing the first garbled code through the execution engine of the first subject The garbled gate of the circuit is used to encrypt the data of the first subject; the encrypted data and the garbled gate identifier of the first subject are sent to the second subject; the encrypted data is sequentially processed by the second subject according to the received garbled gate identifier The second encrypted calculation, and returns the result to the first subject. According to the embodiment of the present invention, the garbled circuit is dynamically generated according to the multi-party calculation operator, and the garbled circuit is executed by the execution engine in a pipelined manner. In this way, the process of compiling and executing can be carried out at the same time, improving the efficiency of compiling and executing.

Description

technical field [0001] The present invention relates to the technical field of encryption computing, in particular to a secure multi-party computing method, device, device and computer-readable medium. Background technique [0002] Secure multi-party computation (SMC, secure multi-party computation) is to solve the collaborative computing problem of privacy protection among a group of distrusting parties. SMC must ensure the independence of input and the correctness of calculation without disclosing each input value. to other members involved in the calculation. [0003] At present, traditional multi-party computing (MPC, Multi-Party Computation) libraries include: Fairplay, Oblivm, Obliv-C, FastGC, Spdz, ShareMind, etc. Among them, the first generation of multi-party computing libraries such as: Fairplay, CBMC-GC, FastGC, etc. are all implemented based on compiling C-like high-level languages ​​into binary garbled circuits. The second generation of multi-party computing l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F8/20G06F8/41
CPCG06F21/57G06F8/24G06F8/41G06F21/602H04L2209/46G09C1/00H04L2209/12H04L9/00H04L9/008
Inventor 冯智张宇于晓宁呙昊甦
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD