Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and device for oblivious transfer (OT) extension protocol

A technology for extending protocols and data processing, applied in the computer field, which can solve problems such as increasing the amount of calculation and communication

Active Publication Date: 2020-12-25
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the OT protocol is executed for each interaction, the amount of calculation and communication will be greatly increased.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device for oblivious transfer (OT) extension protocol
  • Data processing method and device for oblivious transfer (OT) extension protocol
  • Data processing method and device for oblivious transfer (OT) extension protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0026] The aforementioned OT protocol can be divided into the following two types according to functions: 1-out-of-2 type and 1-out-of-N type. Figure 1a shows 1-out-of-2 type OT protocol, Figure 1b A 1-out-of-N type OT protocol is shown.

[0027] Figure 1a Among them, the input of the Receiver is the selection bit a∈{0,1}, and the input of the Sender is a pair of messages (d 0 , d 1 ), where d 0 、d 1 is the plaintext message to be sent (for example, a 128-bit bit string). Through the OT protocol, Receiver can finally obtain d a .

[0028] Obviously, through the OT protocol, the following two aspects of security can be satisfied: (1) Receiver selects the confidentiality of bit a, that is, through the OT protocol, the Sender cannot know which message the Receiver selects. (2) Sender is not selected message d 1-a confidentiality, that is, through...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data processing method and device for an oblivious transfer (OT) extension protocol, and the method comprises the steps: executing, by an executor of the OTextension protocol, an OT protocol through another executor for a plurality of times, so as to obtain a first number of initial OT tuples; and then, extending the first number of initial OT tuples byusing a first OT extension algorithm with relatively high network consumption and relatively low calculation consumption to obtain a second number of OT tuples. and extending the second number of OT tuples again by using a second OT extension algorithm with relatively low network consumption and relatively high calculation consumption to obtain a target number of OT tuples.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular, to a data processing method and device for inadvertently transmitting OT extension protocols. Background technique [0002] The Oblivious Transfer (OT) protocol, also known as the Oblivious Transfer Protocol, is the basic technology of secure multi-party computing and is a two-party protocol. Specifically, it is an interactive protocol between a receiver (Receiver) and a sender (Sender). Because the OT protocol can guarantee the security of the data of both parties, it is widely used in various fields. However, when it is applied in the field of machine learning, since Receiver and Sender usually interact frequently, for example, there may be more than 100,000 interactions. However, if the OT protocol is executed for each interaction, the amount of calculation and communication will be greatly increased. To this end, it is proposed to use pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/00H04L2209/50H04L2209/46
Inventor 韩帅马环宇
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products