Hierarchical security multi-party calculation method and device based on Chinese remainder theorem

A technology of secure multi-party computation and Chinese remainder theorem, which is applied in the field of information security and can solve problems such as inability to coordinate processing and leaking secrets.

Active Publication Date: 2021-04-23
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a hierarchical secure multi-party computing method and device based on the Chinese remainder theorem,...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical security multi-party calculation method and device based on Chinese remainder theorem
  • Hierarchical security multi-party calculation method and device based on Chinese remainder theorem
  • Hierarchical security multi-party calculation method and device based on Chinese remainder theorem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 It is a flow chart of the steps of the hierarchical secure multi-party computing method based on the Chinese remainder theorem described in the embodiment of the present invention, figure 2 It is a framework diagram of the hierarchical secure multi-party computation method based on the Chinese remainder theorem described in the embodiment of the present invention.

[0043] like figure 1 and figure 2 As shown, the embodiment of the present invention provides a hierarchical secure multi-party computing method based on the Chinese remainder theorem, including the following steps:

[0044] S10. Acquire computing tasks, divide the computing tasks into n outsourced subtasks and m autonomous subtasks, and the computing parent node assigns n outsourced subtasks to computing child nodes;

[0045] S20. Assign a read subkey and a write subkey corresponding to the read subkey to each outsourced subtask, and transmit the write subkey of each outsourced subtask to the c...

Embodiment 2

[0098] image 3 It is a frame diagram of a hierarchical secure multi-party computing device based on the Chinese remainder theorem described in the embodiment of the present invention.

[0099] like image 3 As shown, the embodiment of the present invention also provides a hierarchical secure multi-party computing device based on the Chinese remainder theorem, including a task acquisition and distribution module 10, a key module 20, a first computing module 30 and a second computing module 40;

[0100] The task acquisition and distribution module 10 is used to acquire computing tasks, divide the computing tasks into n outsourced subtasks and m autonomous subtasks, and calculate the parent node to assign n outsourced subtasks to the computing child nodes;

[0101] The key module 20 is configured to assign a read subkey and a write subkey corresponding to the read subkey to each outsourced subtask, and transmit the write subkey of each outsourced subtask to the computing Compu...

Embodiment 3

[0106] An embodiment of the present invention provides a computer-readable storage medium. The computer storage medium is used to store computer instructions. When running on a computer, the computer executes the above-mentioned hierarchical secure multi-party computing method based on the Chinese remainder theorem.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hierarchical security multi-party computing method and device based on the Chinese remainder theorem, and the method comprises the steps: enabling a computing task to be divided into an outer package subtask and an autonomous subtask through a computing father node, and distributing a writing subkey and a reading subkey for each outer package subtask; sending each outer packet sub-task and the corresponding write-in sub-key to each computing sub-node in a safe mode; enabling the computing father node and the computing child nodes to obtain data of respective child tasks through computing, and storing outsourcing computing data in a public result ciphertext through writing of child keys and sharing and transmitting the outsourcing computing data in the public result ciphertext; enabling the computing father node to obtain outsourcing computing data calculated by each computing child node from the public result ciphertext by reading the child key, and calculating a final result of the calculation task. According to the method, the computing sub-nodes can assist each other to complete the computing task together, but the computing data of other computing sub-nodes and the final computing data of the computing task cannot be obtained, so that secure multi-party computing is realized.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a hierarchical security multi-party computing method and device based on the Chinese remainder theorem. Background technique [0002] With the rapid development of big data and cloud computing, the computing scale has shown explosive growth, and single-point computing or stand-alone computing has been difficult to meet the needs of most big data and cloud computing services. In existing big data and cloud computing, computing tasks are usually assigned to different computing nodes for collaborative computing. Since multiple different computing nodes are involved, the security of data confidentiality during the computing process cannot be guaranteed. Specifically, in big data and cloud computing, for the delegator of the computing task (computing parent node), it does not want the computing sub-nodes participating in the multi-party computing to obtain the overall com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q50/26G06F21/60
CPCY02D10/00
Inventor 洪超匡晓云陈立明许爱东蒙家晓支志军
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products