Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer-implemented method of applying a first function to each data element in a data set, and worker node for implementing the same

A technology of data elements and data concentration, applied in digital data protection, computer security devices, electronic digital data processing, etc., can solve problems such as inability to learn data

Pending Publication Date: 2020-10-13
KONINKLJIJKE PHILIPS NV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, when using MPC, sensitive data is "secretly shared" among multiple parties, so that no one party can learn said data without the help of the other party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer-implemented method of applying a first function to each data element in a data set, and worker node for implementing the same
  • Computer-implemented method of applying a first function to each data element in a data set, and worker node for implementing the same
  • Computer-implemented method of applying a first function to each data element in a data set, and worker node for implementing the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] figure 1 is a block diagram of a system 1 in which the techniques and principles described herein may be implemented. System 1 includes multiple worker nodes 2, where, in figure 1 Three worker nodes 2 are shown in . Each worker node 2 is capable of participating in a multi-party computation (MPC) with one or more other worker nodes 2 . Multi-party computation techniques allow joint functions to be computed on sensitive (private) inputs from mutually distrusted parties without requiring these parties to disclose these inputs to trusted third parties or each other (thus preserving the privacy of these inputs). The cryptographic protocol ensures that no party (or coalition of parties) learns anything from the computation other than the expected portion of the computation result. exist figure 1 In the system shown in , there can be one or more worker nodes 2 and / or one or more input nodes (in figure 1 not shown in ) provide the input for the calculation. Computed outp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

There is provided a computer-implemented method of applying a first function to each data element in a first data set, the method comprising (i) determining whether each data element in the first dataset satisfies a criterion, wherein the criterion is satisfied only if the result of applying the first function to the data element is equal to the result of applying a second function to the data element; (ii) forming a compressed data set comprising the data elements in the first data set that do not satisfy the criterion; (iii) applying the first function to 10 each data element in the compressed data set; and (iv) forming an output based on the results of step (iii), wherein steps (i)-(iv) are performed using multiparty computation, MPC, techniques. A corresponding system and worker nodeare also provided.

Description

technical field [0001] The present disclosure relates to applying a first function to each data element in a data set, and in particular to a computer-implemented method and worker node for applying a first function to each data element in a data set. Background technique [0002] In settings where sensitive information from multiple mutually distrusting parties needs to be processed, cryptography-based privacy-preserving techniques such as multi-party computation (MPC) can be used. Specifically, when using MPC, sensitive data is "secretly shared" among multiple parties, so that no one party can learn the data without the help of the other party. Using cryptographic protocols between these parties, computations can be performed on such "secret shared" data. Although a wide range of primitives operate on secret shared data, not all conventional programming language constructs are available. For example, it is not possible to have an "if" statement with a condition involving...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L9/00
CPCG06F21/6254H04L9/008G06F21/64H04L2209/46H04L9/085
Inventor M·G·韦宁根
Owner KONINKLJIJKE PHILIPS NV