Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method, ciphertext computing system and device for data processing

A computing system and data processing technology, applied in the computer field, can solve problems such as complexity, complex processing and addition, and inability to guarantee privacy computing efficiency, so as to achieve the effect of improving performance and efficiency

Pending Publication Date: 2021-03-09
HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional privacy protection system based on secret sharing is based on the data addition and sharding structure, which is relatively complicated in the process of processing the multiplication operation and requires multiple network communications
If all systems based on multiplication and slice construction are also more complicated when processing addition
However, in practical applications, there are almost no operations that are all addition or multiplication, and are often mixed calculations of both, and the existing systems that only support a single sharding method cannot guarantee the efficiency of privacy calculations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, ciphertext computing system and device for data processing
  • Data processing method, ciphertext computing system and device for data processing
  • Data processing method, ciphertext computing system and device for data processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0048] The terms "first", "second" and the like in the description and claims of the present invention are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It should be understood that the terms so used are interchangeable under appropriate circumstances such that embodiments of the invention can be practiced in sequences other than those illustrated or described herein, and references to "first," "secon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data processing method, a ciphertext computing system and a device for data processing. The ciphertext computing system comprises a task control node, at least two computing nodes and at least two auxiliary nodes. The method comprises the steps that a task control node receives a ciphertext calculation task containing a preset instruction; the task control node allocates the ciphertext computing task to the computing node; the computing node executes the ciphertext computing task, and calls an auxiliary node to execute a preset instruction when the preset instruction in the ciphertext computing task is executed, so that the auxiliary node converts specified private data in the ciphertext computing task from a first fragment type to a second fragment type; and the computing node executes a computing operation after the preset instruction based on the specified private data of the second fragment type. According to the embodiment of the invention, the performance of the ciphertext computing system can be improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data processing method, a ciphertext computing system and a device for data processing. Background technique [0002] Secret Sharing (Secret Share) is a method of distributing, saving and restoring secrets, and it is an important means to realize secure multi-party computation. At present, the ciphertext calculation system based on secret sharing can use the secret sharing algorithm based on additive slices, and the secret can be obtained by adding each additive slice. [0003] The traditional privacy protection system based on secret sharing is based on the addition and sharding of data, which is relatively complicated in the process of processing multiplication operations and requires multiple network communications. If all systems based on multiplication and slice construction are also more complicated when processing addition. However, in practical applications, there a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/48G06F9/50G06F21/60
CPCG06F9/4881G06F9/5027G06F21/602
Inventor 西方
Owner HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD