Computer-implemented method of applying a first function to each data element in a data set, and worker node for implementing the same
A technology of data elements and data concentration, applied in digital data protection, computer security devices, electronic digital data processing, etc., can solve problems such as inability to learn data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] figure 1 is a block diagram of a system 1 in which the techniques and principles described herein may be implemented. System 1 includes multiple worker nodes 2, where, in figure 1 Three worker nodes 2 are shown in . Each worker node 2 is capable of participating in a multi-party computation (MPC) with one or more other worker nodes 2 . Multi-party computation techniques allow joint functions to be computed on sensitive (private) inputs from mutually distrusted parties without requiring these parties to disclose these inputs to trusted third parties or each other (thus preserving the privacy of these inputs). The cryptographic protocol ensures that no party (or coalition of parties) learns anything from the computation other than the expected portion of the computation result. exist figure 1 In the system shown in , there can be one or more worker nodes 2 and / or one or more input nodes (in figure 1 not shown in ) provide the input for the calculation. Computed outp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


