Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for secure multi-party computing

A secure multi-party computing and multi-party computing technology, which is applied in the field of secure multi-party computing, can solve the problems of high computational cost in preprocessing, increasing the cost of secure multi-party computing, reducing the efficiency and performance of secure multi-party computing, etc.

Pending Publication Date: 2020-08-07
徐茂桐
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present disclosure provide a method and system for secure multi-party computing, to at least solve the problems in the prior art that implementing secure multi-party computing through encryption circuits increases the cost of secure multi-party computing and reduces the efficiency and performance of secure multi-party computing problems, as well as the technical problems of high overhead in the preprocessing process and non-computing parties verifying the correctness of calculations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure multi-party computing
  • Method and system for secure multi-party computing
  • Method and system for secure multi-party computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present disclosure.

[0021] It should be noted that the terms "first" and "second" in the specification and claims of the present disclosure and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for secure multi-party computing. The method for realizing secure multi-party computation based on secret sharing comprises the following steps of: receiving digital values mastered by respective corresponding users from the respective corresponding users through terminal equipment corresponding to the respective users; respectively deploying shared secrets corresponding to the received digital values on the terminal equipment; calculating an operation result corresponding to each terminal equipment through each terminal equipment according to theset shared secret and a calculation rule of multi-party calculation, wherein the calculation rule is used for acquiring an operation result of secure multi-party calculation according to the digital values mastered by the users; and performing calculation to obtain an operation result of multi-party calculation according to the operation result corresponding to each terminal equipment.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a secure multi-party computing method and system. Background technique [0002] Secure multi-party computing means that in the absence of a trusted third party, multiple participants use their own data to jointly calculate according to common calculation rules so that all participants can jointly calculate the calculation results, but each party will not be disclosed input information. At present, in secure multi-party computation, the most common way is to use encryption circuit to realize. [0003] However, to implement secure multi-party computing by means of encrypted circuits, it is necessary to express the calculated functions as logic circuits, and to perform encryption operations on each logic gate of the logic circuit one by one. Therefore, this implementation of secure multi-party computation will reduce the efficiency and performance of secure multi-party...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/72
CPCG06F21/72
Inventor 徐茂桐苏冠通
Owner 徐茂桐
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More