Unlock instant, AI-driven research and patent intelligence for your innovation.

Security selection method and system

A safe, one-way technology, applied in the field of information security, can solve problems such as high system transmission pressure

Active Publication Date: 2020-08-14
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Security selection can be regarded as a multi-party secure computing implementation of a specific function (that is, the selection problem). In the case of a large number of calculations, if there are too many interactions in the security selection step, the system transmission pressure will be too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security selection method and system
  • Security selection method and system
  • Security selection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the following briefly introduces the drawings that need to be used in the description of the embodiments. Apparently, the accompanying drawings in the following description are only some examples or embodiments of this specification, and those skilled in the art can also apply this specification to other similar scenarios. Unless otherwise apparent from context or otherwise indicated, like reference numerals in the figures represent like structures or operations.

[0014] It should be understood that "system", "device", "unit" and / or "module" as used herein is a method for distinguishing different components, elements, parts, parts or assemblies of different levels. However, the words may be replaced by other expressions if other words can achieve the same purpose.

[0015] As indicated in the specification and claims, the terms "a", "an", "an" and / or "the" are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, and particularly relates to a security selection method and system based on privacy protection of two parties. The method has the advantagesthat on one hand, the safety selection calculation process is performed; based on the security selection problem processing method, participants can obtain the result of the problem only through one-time interaction; compared with an existing scheme, the interaction frequency is reduced, the system transmission pressure is reduced, and on the other hand, in the processing process of the two participants, private data of all the participants cannot be leaked, and the data security of all the participants is protected.

Description

technical field [0001] This specification relates to the field of information security, and in particular to a security selection method and system based on privacy protection of both parties. Background technique [0002] Secure multi-party computing is also known as multi-party secure computing, that is, multiple parties jointly calculate the result of a function without disclosing the input data of all parties to the function, and the calculation results are stored in multiple parties or disclosed to one or more parties in the form of sharing. Therefore, through secure multi-party computation, the participating parties can calculate the result of the function without exposing their original data. [0003] Security selection can be regarded as a multi-party secure computing implementation of a specific function (that is, the selection problem). In the case of a large number of calculations, if there are too many interactions in the security selection step, the system trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78
CPCG06F21/78
Inventor 张祺智李漓春殷山
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD