Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for carrying out security operation on multi-party private data

A privacy data, security technology, applied in the computer field, can solve problems such as poor security comparison performance

Active Publication Date: 2020-08-11
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing technology has too many interactions and poor security comparison performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for carrying out security operation on multi-party private data
  • Method and device for carrying out security operation on multi-party private data
  • Method and device for carrying out security operation on multi-party private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0058] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. This implementation scenario involves performing secure calculations on private data from multiple parties. The multiple parties include a first party and a second party, the first party has first private data, the second party has second private data, and both the first private data and the second private data are n Bit binary number, the embodiment of this specification, is specifically used to obtain the first size comparison result of whether the first privacy data is smaller than the second privacy data, and / or obtain the second size comparison result of whether the first privacy data is larger than the second privacy data result.

[0059] refer to figure 1 , to compare the first privacy data x and the second privacy data y, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for carrying out security operation on private data of multiple parties, and the method comprises the steps that a first party obtains a first fragment of identification data corresponding to each bit through employing local first private data and second private data of a second party; wherein the identification data identifies whether the bit of the first private data is not equal to the bit of the second private data; first non-zero identification data in the identification data is searched to obtain a first fragment of the unequalhighest bit in the bits of the first private data and the second private data corresponding to the identification data; the first fragment of the highest bit of the party, the second private data ofthe second party and the second fragment of the highest bit are utilized to obtain a first fragment, corresponding to the numerical value of the highest bit, in the second private data; and a comparison result is determined based on the numerical value of the highest bit. Performance can be improved when security operation is carried out on multi-party private data.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computers, and in particular to methods and devices for performing secure calculations on private data of multiple parties. Background technique [0002] Secure multi-party computing is also called multi-party secure computing, that is, multiple parties jointly calculate the result of a function without disclosing the input data of all parties to the function, and the calculation result is disclosed to one or more of them. Among them, the input data of each party is often private data. [0003] In the secure multi-party computing of the prior art, it is often necessary to perform a secure comparison of two numbers x and y stored in A and B respectively, such as calculating a logical expression (x>y), or calculating a logical expression (x< y), the result is stored in A and B in the form of sharing. Existing techniques have too many interactions and poor security comparison per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 张祺智李漓春殷山
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD