A secure multi-party computing method for consortium chains

A secure multi-party computing and alliance technology, applied in the field of information security, can solve problems such as low computing efficiency, achieve the effect of improving efficiency, improving efficiency and stability, and reducing the number of encryption and decryption times

Active Publication Date: 2021-07-23
浙江数秦科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: the technical problem that the efficiency of multi-party security calculation in the alliance chain is low at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure multi-party computing method for consortium chains
  • A secure multi-party computing method for consortium chains
  • A secure multi-party computing method for consortium chains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] A secure multi-party computing method for a consortium chain, including an initiator P, several participants R, and an address mapping layer. The address mapping layer pre-establishes the mapping between mapped addresses and physical addresses. Please refer to the attached figure 1 , this method includes the following steps: S1) The initiator P converts the function to be calculated into a Boolean circuit, the initiator P converts the gate of the Boolean circuit into a label table, and sends the label table to the corresponding participant R, and the label table records the input label combination The mapping relationship with the output label. The initiator P of the secure multi-party computation converts the function to be calculated into a Boolean circuit, converts the input and output of each gate of the Boolean circuit into a label table, and realizes the encryption of the Boolean circuit, and then the participant R and the initiator P pass The mapped address laye...

Embodiment 2

[0044] A secure multi-party computing method for consortium chains. This embodiment further improves the mapping address. Please refer to the attached Figure 4 And Table 5, including: S31) In the mapping between the mapping address and the physical address established by the address mapping layer, each mapping address corresponds to several non-adjacent physical addresses, and the storage space pointed to by several physical addresses is a preset value; S32) When using the mapping address to store data, split the data into sub-data, and each sub-data is associated with the identifier of the first physical address; S33) Store each sub-data in a storage space corresponding to a physical address in order, for The physical address for reading data is the first physical address corresponding to the mapped address.

[0045] mapped address real address sidu8ejhu (12,3,42)、(12,3,44)、(12,3,48)、(12,3,52) w89iej31d (12,3,43)、(12,3,45)、(12,3,47)、(12,3,49) … …...

Embodiment 3

[0051] A secure multi-party computing method for a consortium chain. This embodiment provides a method for establishing a distributed address mapping layer. Please refer to the attached Figure 6 , each consortium chain node runs the address mapping protocol through an external consensus protocol. The address mapping protocol includes a mapping address generation protocol, a data writing protocol, and a data reading protocol. Specifically include: W01) The mapping address generation protocol periodically opens up the storage area, divides the storage area into several storage blocks of preset length, and records the physical address of each storage block; W02) generates several mapping addresses, and the mapping address is random Code, associate a preset number of physical addresses for each mapped address, and the associated physical addresses are non-adjacent physical addresses; W03) store the mapped address and its associated physical address as a mapped address entry; W04) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of information security, and specifically relates to a secure multi-party calculation method for an alliance chain, including an initiator, several participants and an address mapping layer. Label table; the participant obtains two mapping addresses and corresponding physical addresses, associates the two mapping addresses with two Boolean values ​​and then encrypts them, stores the encrypted data in the mapping address associated with the inverse value of the input data, and The corresponding physical address is sent to the initiator; the initiator encrypts the label corresponding to the Boolean value and stores it in the mapping address; the participant reads the encrypted label, obtains the label of all input data, and obtains the output label according to the label table. When the Boolean circuit The Boolean circuit will output the result when all the gates of get the output labels. The substantive effects of the present invention are: the number of times of encryption and decryption in the process of label acquisition is reduced, and the efficiency of secure multi-party calculation is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a secure multi-party computing method for alliance chains. Background technique [0002] Secure multi-party computation is aimed at the problem of how to safely compute an agreed function without a trusted third party. In secure multi-party computation, each participant does not need to disclose its original data to the other party or a third party to complete the calculation of the agreed function that requires the original data of multiple participants. The alliance chain is only aimed at members of a specific group and limited third parties. It internally designates multiple pre-selected nodes as bookkeepers, and the generation of each block is jointly decided by all pre-selected nodes. Other access nodes can participate in transactions, but do not intervene in the accounting process. Third parties can perform limited queries through the open API of the blockcha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L2209/46H04L9/50
Inventor 张金琳高航俞学劢
Owner 浙江数秦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products