Cross-domain secure multi-party computing method and device based on trusted execution environment

A secure multi-party computing and execution environment technology, applied to secure communication devices and key distribution, can solve problems such as poor versatility, loss of performance, and performance loss

Active Publication Date: 2020-04-28
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, secure multi-party computing is facing the problem of balancing privacy and performance. Most of the existing solutions are to exchange privacy by losing performance, or pursue performance without much consideration for privacy.
Common encryption technologies to solve privacy problems, such as Homomorphic encryption and zero-knowledge proof, are highly complex, not only poor in versatility, but also may cause serious performance loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain secure multi-party computing method and device based on trusted execution environment
  • Cross-domain secure multi-party computing method and device based on trusted execution environment
  • Cross-domain secure multi-party computing method and device based on trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. Implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of one or more embodiments of the present specification as recited in the appended claims.

[0031] It should be noted that in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described in this specification. In some other embodiments, the method may include more or less steps than those described in this specification. In addition, a single step described in this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

One or more embodiments of the invention provide a cross-domain secure multi-party computing method and device based on a trusted execution environment. The method comprises the following steps: a secure computing server creates a trusted execution environment for secure multi-party computing; encrypting and storing a computing side private key generated in the trusted execution environment by using a security key maintained by the security computing server; as the security computing server at least migrates the core hardware related to the security key to the isolation domain, therefore, thesecurity key can be normally generated inside or outside the isolation domain, the data ciphertext and the key ciphertext provided by each computing participant inside and outside the isolation domainare smoothly decrypted, and secure multi-party computing processing is carried out in a trusted execution environment. The technical scheme of the invention can be applied to service processing processes in various scenes, such as an artificial intelligence scene, a block chain scene and the like.

Description

technical field [0001] One or more embodiments of this specification relate to the field of security technology, and in particular to a method and device for cross-domain secure multi-party computing based on a trusted execution environment. Background technique [0002] Secure Multi-Party Computation (Secure Multi-Party Computation) can calculate the original data provided by multiple computing participants, and ensure that the original data held by these computing participants will not be leaked throughout the process, taking into account data processing requirements and Privacy protection needs. [0003] At present, secure multi-party computing faces the problem of balancing privacy and performance. Most of the existing solutions exchange privacy by losing performance, or pursue performance without much consideration for privacy. Common encryption technologies to solve privacy problems, such as Homomorphic encryption and zero-knowledge proof, are highly complex, not only...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L9/0825H04L9/0877H04L63/02
Inventor 赵原殷山
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products