Secure multi-party computing method, device, device and computer-readable medium
A secure multi-party computing and multi-party computing technology, applied in the field of encrypted computing to achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In the following, only some exemplary embodiments are briefly described. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature and not restrictive. Embodiments of the present invention mainly provide a method and device for secure multi-party computing, and the technical solutions are described below through the following embodiments.
[0055] The present invention provides a secure multi-party computing method and device. The specific processing flow and principles of the secure multi-party computing method and device in the embodiments of the present invention will be introduced in detail below.
[0056] Such as figure 1 As shown in , it is a flow chart of a secure multi-party computing method according to an embodiment of the present invention. The ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


