Method and device for carrying out security operation on multi-party private data
A privacy data, security technology, applied in the computer field, can solve problems such as poor security comparison performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.
[0058] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. This implementation scenario involves performing secure calculations on private data from multiple parties. The multiple parties include a first party and a second party, the first party has first private data, the second party has second private data, and both the first private data and the second private data are n Bit binary number, the embodiment of this specification, is specifically used to obtain the first size comparison result of whether the first privacy data is smaller than the second privacy data, and / or obtain the second size comparison result of whether the first privacy data is larger than the second privacy data result.
[0059] refer to figure 1 , to compare the first privacy data x and the second privacy data y, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


