Method and device for determining same service data based on privacy protection

A technology of business data and the same business, applied in the computer field, can solve the problems of multiple interactions and low comparison efficiency, and achieve the effects of improving comparison efficiency, improving efficiency, and reducing the amount of calculation

Active Publication Date: 2020-07-28
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF13 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the conventional technology, in the process of privacy seeking, multip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining same service data based on privacy protection
  • Method and device for determining same service data based on privacy protection
  • Method and device for determining same service data based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following describes the solutions provided in this specification with reference to the drawings.

[0034] First, combine figure 1 A specific implementation scenario is shown for description. Such as figure 1 As shown, in this implementation scenario, multiple data parties have their own business data, and multiple data parties may also be referred to as multiple business parties. These data parties can communicate with each other, such as joint security data operations. That is, in the case where each data party does not obtain the data of the other party from each other, data calculation is performed. The data operations here are, for example, addition, multiplication, logical operations (and, or, not) and so on. It is understandable that subtraction and addition can be transformed into each other, and multiplication and division can be transformed into each other. As a means of data operation, the specific scenarios can be determined according to actual business n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method for determining the same service data of multiple service parties based on privacy protection. Four hash tables are respectively set in each service party according to the same rule; the cuckoo hash and the hash value storage position coincidence principle of the same service data are adopted, so that the data comparison frequency between every twoservice parties is greatly reduced, for example, the data comparison frequency is reduced to the product of 8 (the number of sub-tables) and the number of service data owned by a service party with more service data; and on the other hand, an equality comparison mode based on secret sharing is adopted to carry out two-party data comparison at a corresponding position, and a method of randomly extracting a part of bits for comparison is adopted in the data comparison process, so that the calculation amount in the security comparison process is reduced, and the comparison efficiency is improved. In a word, the technical concept of the specification can improve the efficiency of determining the same service data of a plurality of service parties on the basis of privacy protection.

Description

Technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular to methods and devices for determining the same business data in multiple business parties through a computer based on privacy protection. Background technique [0002] Secure multi-party calculation is also called multi-party secure calculation, that is, multiple parties jointly calculate the result of a function without revealing the input data of each party of the function, and the calculation result is disclosed to one or more parties. For example, a typical application of secure multi-party computing is privacy engagement. Private set intersection (PSI), or known as collision library, can be understood as determining the intersection between multiple parties on the premise of privacy protection. Privacy solicitation is often the core of multi-party collaborative training of machine learning algorithms and long-term lending. The core idea of ​​p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F16/22
CPCG06F21/6245G06F16/2255G06F16/2282
Inventor 陈超超王力周俊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products