Safe multi-party calculation control method for realizing approximate maximum value calculation based on computer software and corresponding system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology for secure multi-party computing and software implementation, which is applied in the field of secure multi-party computing control methods and corresponding systems, and can solve problems such as protocols without polynomial communication complexity.
Active Publication Date: 2020-07-24
SHANGHAI GUANYUAN INFORMATION TECH +1
View PDF4 Cites 8 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] The current secure multi-party computing technology does not have an effective polynomial communication complexity protocol when the public function is the maximum calculation, that is, f(x1,x2,…,xn)=max(x1,x2,…,xn)
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0042] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.
[0043] The secure multi-party computing control method based on computer software of the present invention to realize approximate maximum calculation includes the following steps:
[0044] (1) The public information negotiation module negotiates to determine the effective value range and divides the interval;
[0045] (1.1) The public information negotiation module negotiates to determine the effective value range;
[0046] (1.2) The public information negotiation module takes different integers, and divides the effective value range into value intervals;
[0047] (2) The secret data preprocessing module determines the serial number of the value interval where the secret information is located, and calculates it;
[0048] (2.1) The secret data preprocessing module determines the serial number of the value...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention relates to a safe multi-party calculation control method for realizing approximate maximum value calculation based on computer software. The method comprises the following steps: a public information negotiation module negotiates to determine an effective value range and divides intervals; the secret data preprocessing module determines the serial number of the value interval where the secret information is located and carries out calculation; the secure multi-party addition calculation and communication module performs secure multi-party summation calculation with other entities; the maximum value interval calculation module calculates an interval serial number where the maximum value is located. The invention further relates to a safe multi-party calculation control systemfor achieving approximate maximum value calculation based on computer software. By adopting the safe multi-party calculation control method for realizing approximate maximum value calculation based oncomputer software and the corresponding system, the interval where the maximum value of all secret information is located can be safely calculated under the condition that the communication complexity does not exceed O (n2), i.e., the secret information of the user is not leaked to other participating entities.
Description
technical field [0001] The present invention relates to the field of computers, in particular to the field of computer security, and specifically refers to a secure multi-party computing control method and a corresponding system based on computer software to realize approximate maximum calculation. Background technique [0002] Secure multi-party computing is a computing method in the field of computer security. For n participating entities p1, p2, ..., pn, each entity has a secret integer data, which are x1, x2, ..., xn respectively. The participating entities hope to pass the secure Interact and jointly calculate a public function f(x1,x2,…,xn), while keeping its secret data private, that is, not letting its own data be known by other entities. [0003] When the current secure multi-party computing protocol is a first-degree polynomial function, that is, f(x1,x2,…,xn)=c1x1+c2x2+…+cnxn (c1,c2,…,cn are public integer constants), it can communicate in complex Under the degre...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.