Method and device for jointly processing data by two parties

A data processing and two-party technology, applied in the field of data security, can solve problems such as leakage of user privacy, exposure of user sample feature values, exposure of data processing model model parameters, etc., to achieve a small amount of communication and calculation, and ensure safe private data Calculation, the effect of safe multiplication

Active Publication Date: 2020-05-15
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When using the data processing model to process the sample feature data, if party A directly sends the sample data to party B, the feature value of the user sample will be exposed, leaking user privacy; if party B provides the data processing model to Party A's use will cause the model parameters of the data processing model to be exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for jointly processing data by two parties
  • Method and device for jointly processing data by two parties
  • Method and device for jointly processing data by two parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0105] According to an implementation manner, the apparatus 400 further includes a transceiver unit (not shown), configured to: send the first sharing matrix to the second party, and / or; receive the shared matrix from the second party Describe the second sharing matrix.

[0106] According to another embodiment, the transceiving unit is configured to: send the first sharing matrix to a third party different from the first party and the second party.

[0107] According to yet another embodiment, there is provided an apparatus for jointly performing data processing by two parties, wherein the two parties include a first party and a second party, the first party has first private data recorded as a first original matrix, and the second party has The two parties have the second privacy data recorded as the second original matrix, and the dimension of the second original matrix is ​​smaller than the first original matrix; the above-mentioned device is deployed in the second pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for jointly processing data by two parties for protecting data privacy. The two parties respectively maintain an original matrix formed byprivate data. According to the method, homomorphic encryption is carried out on the matrix of one party with the smaller matrix dimension in the two parties, and the encrypted matrix is sent to the other party. And on the other hand, homomorphic addition operation is carried out on the encryption matrix by using the original matrix of the encryption matrix to obtain an encrypted comprehensive matrix. The encrypted comprehensive matrix is equivalent to a matrix obtained after a multiplication matrix is encrypted. And then, the two parties perform secret sharing under homomorphic encryption forthe encryption comprehensive matrix, and finally, a matrix fragment is obtained respectively, so that the sum of the fragments is the multiplication matrix, and the security matrix operation of the two parties is realized.

Description

technical field [0001] One or more embodiments of this specification relate to the field of data security, and in particular, to a method and an apparatus for joint data processing by both parties. Background technique [0002] In the context of big data, it is often necessary to comprehensively process business data from different data sources. For example, in the merchant classification analysis scenario based on machine learning, the electronic payment platform has the merchant's transaction flow data, the e-commerce platform stores the merchant's sales data, the banking institution has the merchant's loan data, and the model party has the modeling parameter data . In the process of joint processing of multi-party data, the protection and security of data privacy become issues worthy of attention. For example, in a multi-party computing scenario, party A holds the user sample characteristic data to be processed, and party B holds the data processing model. When using t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/008H04L9/085
Inventor 陈超超王力周俊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products