Auxiliary server-based secure multi-party computing method, device and system

A technology for secure multi-party computing and auxiliary servers, applied in the computer field

Active Publication Date: 2022-05-17
ZHEJIANG UNIV +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is still a large amount of communication in the online computing stage, and the time overhead for network communication is far greater than the time overhead for computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Auxiliary server-based secure multi-party computing method, device and system
  • Auxiliary server-based secure multi-party computing method, device and system
  • Auxiliary server-based secure multi-party computing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0058] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. This implementation scenario involves secure multi-party computation based on a secondary server. refer to figure 1 , secure multi-party computing involves multiple user nodes including user node 111, user node 112, and user node 113, first server 12, and second server 13. It can be understood that the number of multiple user nodes is not limited to three In the figure, only three user nodes are taken as an example, and the number of multiple user nodes may specifically be four, five, six, etc. The auxiliary server includes a first server 12 and a second server 13 deployed separately.

[0059] Secure multi-party computing is also called multi-party computing (MPC), that is, in the absence of a trusted third party, multiple parties...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification provides an auxiliary server-based secure multi-party computing method, device and system, the method includes: the first server uses n random numbers as the characteristic values ​​of n characteristic variables, and calculates the first values ​​of k product terms , and use the public key of each user node to perform homomorphic encryption on each first value to obtain k ciphertexts; send the k ciphertexts to the second server; the second server obtains n secrets from multiple user nodes respectively value, n secret values ​​are obtained by dividing the characteristic value of the characteristic variable held by multiple user nodes by the random number generated for the characteristic variable; taking n secret values ​​as the characteristic value of the characteristic variable, and calculating k The second value of the product term is used to obtain k evaluation values; the k ciphertexts and k evaluation values ​​are multiplied and summed correspondingly under homomorphic encryption to obtain the ciphertext result of the function value. It can reduce the communication rounds and traffic in the online computing stage.

Description

technical field [0001] One or more embodiments of this specification relate to the computer field, and in particular to an auxiliary server-based secure multi-party computing method, device and system. Background technique [0002] In an open Internet network, user nodes generally use distributed computing for information processing, specifically for each user node to complete a specific computing task, and then complete the final calculation result through collaborative operations. This belongs to secure multi-party computing. As a distributed cryptographic protocol that protects data security and privacy, secure multi-party computing can jointly use data from all parties to achieve specific computing purposes while ensuring data privacy of all parties. There is often traffic Too big a problem. [0003] At present, a series of secure multi-party computing methods based on auxiliary servers have emerged in the research field. Under the assumption of semi-honest and trustwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/008H04L9/0869H04L9/085
Inventor 卢天培张秉晟张佳婕李漓春
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products