Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for jointly generating data tuples for secure computing

A data tuple and security technology, applied in the field of data privacy security, can solve the problem of difficult implementation of machine learning model training, and achieve the effect of efficient multi-party secure computing

Active Publication Date: 2022-05-17
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to issues such as industry competition, data security, and user privacy, data integration faces great resistance. It is difficult to integrate data scattered across various platforms for machine learning model training.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for jointly generating data tuples for secure computing
  • Method and device for jointly generating data tuples for secure computing
  • Method and device for jointly generating data tuples for secure computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0144] According to an implementation manner, the secret sharing unit 53 includes:

[0145] The key acquisition module 531 is configured to, based on the c first polynomials and the c second polynomials held by the second party, cooperate with the second party to execute the key generation of the functional secret sharing protocol process, get c 2 a first key;

[0146] The key expansion module 532 is configured to use the evaluation process of the function secret sharing protocol, based on the c 2 first key, get c 2 a first slice polynomial.

[0147] In one embodiment, the c first polynomials include polynomial i, and the c second polynomials include polynomial j; both polynomial i and polynomial j include t items; the function secret sharing protocol based on t 2 A distributed point function is constructed. In such cases, the key acquisition module 531 is configured as:

[0148] Based on the first coefficient of each item in polynomial i and the second co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of this specification provide a method and an apparatus for jointly generating data tuples for secure computing. According to this method, the first party obtains a common vector formed by c common polynomials in the polynomial ring, and randomly generates c first polynomials to form a random vector. Then, the first party and the second party execute the function secret sharing protocol, and obtain the fragmentation vector formed by c2 first fragmentation polynomials, and the sum of the corresponding fragmentation obtained by the second party and the c2 polynomials of both parties corresponds to c2 product polynomials. Each polynomial in each vector is then converted to a point-valued representation of the N root points of the modulo polynomial F(X) in the polynomial ring. Thus, the point value sequence corresponding to the inner product result of the random vector and the common vector, and the point value sequence corresponding to the inner product result of the multiplication vector and the slice vector obtained by performing tensor multiplication on the common vector itself are determined. Combine the point values ​​of the two point value sequences in turn to obtain N data tuples.

Description

technical field [0001] One or more embodiments of this specification relate to the field of data privacy security, and in particular to a method and an apparatus for generating a data tuple used for secure computing. Background technique [0002] With the development of computer technology, machine learning has been applied to various technical fields to analyze and process various business data. The data needed for machine learning often involves multiple fields. For example, in the scenario of merchant classification analysis based on machine learning, the electronic payment platform has the transaction flow data of the merchants, the e-commerce platform stores the sales data of the merchants, and the banking institution owns the merchants. loan data. Data often exists in silos. Due to issues such as industry competition, data security, and user privacy, data integration faces great resistance, and it is difficult to integrate data scattered across various platforms for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F17/15G06F17/16
CPCG06F21/602G06F21/6245G06F17/15G06F17/16
Inventor 马宝利黄章杰雷浩
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products