Secure multi-party calculation method and system based on trusted execution environment

A secure multi-party computing and execution environment technology, applied in the field of secure multi-party computing methods and systems based on trusted execution environments, can solve the problems of unable to prevent malicious modification of protocols, low security level, and slow computing speed

Active Publication Date: 2020-04-21
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the above two different security challenge models, secure multi-party computing algorithms can be divided into: 1) Suitable for semi-honest attack model, this type of algorithm will not take screening or defense measures against the malicious attack behavior of the participants, and the spe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party calculation method and system based on trusted execution environment
  • Secure multi-party calculation method and system based on trusted execution environment
  • Secure multi-party calculation method and system based on trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the following briefly introduces the drawings that need to be used in the description of the embodiments. Apparently, the accompanying drawings in the following description are only some examples or embodiments of this specification, and those skilled in the art can also apply this specification to other similar scenarios. Unless otherwise apparent from context or otherwise indicated, like reference numerals in the figures represent like structures or operations.

[0027] It should be understood that "system", "device", "unit" and / or "module" as used herein is a method for distinguishing different components, elements, components, parts or assemblies of different levels. However, the words may be replaced by other expressions if other words can achieve the same purpose.

[0028] As indicated in the specification and claims, the terms "a", "an", "an" and / or "the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a secure multi-party calculation method and system based on a trusted execution environment. The method comprises the following steps: loading a calculation program related to secure multi-party calculation into a trusted execution environment; based on the trusted execution environment and other participants, verifying the integrity of respective calculation programs related to secure multi-party calculation; If the integrity verification of the calculation program succeeds, executing the calculation program in a trusted execution environment and performing calculation result interaction with other participants to complete the secure multi-party calculation. According to the specification, a calculation program related to secure multi-party calculation is loaded to a trusted execution environment for running; malicious tampering of a calculation program is avoided, safe multi-party calculation suitable for a semi-honest attack model is improved into safe multi-party calculation suitable for a malicious attack model, and the purposes that private data is protected against leakage, and meanwhile the calculation speed is not reduced are achieved.

Description

technical field [0001] This specification relates to the field of secure multi-party computing, in particular to a method and system for secure multi-party computing based on a trusted execution environment. Background technique [0002] The research on secure multi-party computation is mainly aimed at the problem of how to safely compute an agreed function without a trusted third party. In the process of secure multi-party computing, it is necessary to ensure that the participants can perform computing tasks in good faith according to the agreed functions or codes, so as to ensure data security and correct calculation results. [0003] The current security challenge models for secure multi-party computing can be divided into: 1) Semi-honest attack model: This type of model assumes that all participants abide by the agreement; 2) Malicious attack model: Some participants do not follow the agreement in order to obtain the privacy of other parties, such as forging and tamperi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0428H04L63/0869H04L63/123
Inventor 谭晋王磊王力
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products