Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing private data in shared form

A technology of privacy data and processing methods, applied in the computer field, can solve the problems of subsequent processing errors, calculation errors, etc.

Active Publication Date: 2022-05-17
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the truncation calculation, the final truncation result will have a calculation error with a certain probability, which directly leads to errors in the subsequent processing that relies on the truncation result under the security calculation framework

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing private data in shared form
  • Method and device for processing private data in shared form
  • Method and device for processing private data in shared form

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0063] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. This implementation scenario involves the processing of private data in a shared form. refer to figure 1 , the private data is a fixed-point number based on pre-positioning, the first data fragment is distributed to the first party, and the second data fragment is distributed to the second party, and the truncation result of the private data in the pre-positioning is determined by truncation processing . Among them, the above-mentioned first party and second party can also be referred to as party A and party B respectively. The above-mentioned truncation process mainly realizes the precise truncation of 1-bit fixed-point calculation in the arithmetic secret sharing state of the two parties, and the number of truncated bits is s bit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification provides a method and device for processing privacy data in shared form. The method includes: the first party splits the first data slice into the first highest bit and the first remaining bit; according to the first remaining bit, With the second remaining bit provided by the second party, use the security comparison to determine the first fragment of the first flag bit, indicating whether the addition of the first remaining bit and the second remaining bit will produce a carry; according to the first highest bit and the second The first fragment of a flag bit determines the first high-order fragment; shifts the first data fragment to the right and pre-positions to obtain the first result fragment; uses the first high-order fragment and the first highest bit, and the second party The second high-order slice and the second highest bit provided are used for multi-party security calculations to obtain the first slice of the first compensation item; according to the first slice of the first compensation item, the first result slice is adjusted to obtain First adjust the sharding. The correctness of the truncation result of the private data in the pre-positioning can be guaranteed.

Description

technical field [0001] One or more embodiments of this specification relate to the computer field, and in particular to a method and device for processing and sharing private data. Background technique [0002] Secret sharing means that n participants split and share a secret s, and each split share is managed by a different participant. Only when the number of participants is not less than m can the secret be completely recovered. [0003] Two-party arithmetic secret sharing means that two participants split and share a piece of secret information. A single participant cannot recover the secret information, and only the shares held by both parties can fully recover the secret. Usually the recovery operation is addition over a finite ring. The above-mentioned secret information can also be called private data, and the secret information shared by two parties is also called private data in the form of sharing. [0004] In the prior art, it often involves the processing of p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06N20/00
CPCG06F21/6245G06N20/00
Inventor 贾晓玮
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD