Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for business processing based on consistency detection of private data

A technology for business processing and privacy data, applied in the computer field, can solve problems such as increased communication traffic of multiple data parties, achieve the effect of reducing communication times and improving effectiveness

Active Publication Date: 2021-11-26
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, when the data that needs to be judged to be consistent is large, the amount of communication between multiple data parties is also greatly increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for business processing based on consistency detection of private data
  • Method and device for business processing based on consistency detection of private data
  • Method and device for business processing based on consistency detection of private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0030] First, combine figure 1 A specific implementation scenario is shown for description. Such as figure 1 As shown, in this implementation scenario, multiple data parties each have their own data. These data parties can communicate with each other, such as jointly performing secure data operations. That is, in the case where each data party does not acquire data from other parties, data calculation is performed. The operations here are, for example, addition, multiplication, logical operations (and, or, not) and the like. It can be understood that subtraction and addition can be transformed into each other, and multiplication and division can be transformed into each other.

[0031] The computing platform may be set on a platform of a trusted third-party device, or it may be set on a data cube among multiple data cubes or a platform distributed a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification provides a method and device for business processing based on the consistency detection of private data. During the business processing process of multi-party secure computing, when the private data of two or more data parties is involved, the N-bit data comparisons, converted to oblivious transfers and shared comparison results with log 2 Detection of the equality condition satisfied by (N+Q) bits and values, where Q is a number greater than zero. In this way, the number of communications between data parties can be greatly reduced, and the effectiveness of secure computing can be improved.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular to a method and device for performing business processing based on the consistency detection of private data in multi-party secure computing. Background technique [0002] Secure multi-party computing is also called multi-party secure computing, that is, multiple parties jointly calculate the result of a function without disclosing the input data of all parties to the function, and the calculation result is disclosed to one or more of them. For example, a typical application of secure multi-party computation is joint statistical analysis and machine learning of privacy-preserving multi-party data. Secure multi-party computing can calculate statistical results and / or machine learning results based on the joint data of all parties without exposing their original data. The function of the multi-party secure calculation is an operation function (suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/71G06F21/62
CPCG06F21/6245G06F21/71
Inventor 张祺智李漓春殷山
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD