Support vector machine user data prediction method based on multi-party secure computing protocol
A technology of support vector machines and computing protocols, applied in the field of computing, can solve the problems of complex computing process and insufficient accuracy of prediction data, and achieve the effect of high computing efficiency and good prediction accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] Attached below figure 1 , further describe in detail the steps realized by the present invention.
[0057] Step 1, generate and distribute public parameters and keys.
[0058] The key generation center uses the homomorphic DT-PKC encryption key generation algorithm to generate public parameters N and g and the first decryption key λ 1 and the second decryption key λ 2 .
[0059] The key generation center distributes the public parameters N and g to users, prediction service providers and third-party cloud servers.
[0060] The first decryption key λ 1 and the second decryption key λ 2 Send them to the prediction service provider and the third-party cloud server respectively.
[0061] The homomorphic DT-PKC encryption key generation algorithm is used to generate public parameters N and g and two partial keys are respectively the first decryption key λ 1 and the second decryption key λ 2 The steps are as follows:
[0062] According to N=pq, calculate the modulus ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


