Cooperative secret sharing method, device and system based on vacant transmission algorithm, and medium

A secret sharing and secret technology, applied in the field of distributed computing, can solve problems such as low execution efficiency, inability to obtain information, and large amount of computation in OT protocols

Active Publication Date: 2020-05-15
上海市数字证书认证中心有限公司
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another form of the OT protocol is that the sender S sends two messages m1 and m2, and the receiver R can get one of the messages m1 or m2, but cannot get the other unselected mess...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative secret sharing method, device and system based on vacant transmission algorithm, and medium
  • Cooperative secret sharing method, device and system based on vacant transmission algorithm, and medium
  • Cooperative secret sharing method, device and system based on vacant transmission algorithm, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the invention, not to limit the invention.

[0107] Elliptic curve cryptography (ECC, Elliptic curve cryptography) is a public key system based on an elliptic curve algorithm defined on a finite field. The SM2 algorithm is a specific algorithm of the ECC cryptosystem. An elliptic curve public key cryptography algorithm is specified in the national standard "GB / T 32918 Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm". The encryption algorithm and decryption algorithm based on SM2 conform to the provisions of this standard.

[0108] The technical solution of the present invention is based on Elliptic Curve Cryptography (EC...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of distributed computing, in particular to a cooperative secret sharing method, device and system based on a vacant transmission algorithm, and a medium. The method comprises the following steps that: S1: a first communication party and a second communication party respectively obtain a first secret component and a second secret component which are subjected to multiplication decomposition, and select common parameters; S2, the second communication party performs calculation based on an SM2 algorithm to obtain a confusion factor set, and sends the confusion factor set to the first communication party; S3, the first communication party calculates random parameters and an encryption result set and sends the random parameters and the encryption result set to the second communication party, and the first communication party calculates to obtain a first decomposition component of additive decomposition; and S4, the second communication party calculates a sharing parameter set according to the random parameters and the encryption result set, and calculates to obtain a second decomposition component of additive decomposition. According to the method, the vacant transmission algorithm is adopted, safe two-party calculation is efficiently achieved under the condition that a safe channel is not needed, and conversion and calculation of the shared secret data are achieved.

Description

technical field [0001] The present invention relates to the technical field of distributed computing, and more specifically, relates to a collaborative secret sharing method, device, system, and medium based on the dazed transmission algorithm. Background technique [0002] Secure Multi-Party Computation (Secure Multi-Party Computation, SMC) is to solve the collaborative computing problem of privacy protection among a group of distrusting parties. SMC must ensure the independence of input, the correctness of calculation, decentralization and other characteristics. At the same time, each input value is not disclosed to other members involved in the calculation. [0003] It is mainly aimed at the problem of how to safely calculate an agreed function in the absence of a trusted third party, and at the same time requires that each participant cannot obtain any input information from other entities except for the calculation results. Secure multi-party computing plays an importa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/3066H04L9/0838H04L9/0869
Inventor 崔久强徐祺余力张永雪许学文
Owner 上海市数字证书认证中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products