Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for generating security calculation secret key and performing security calculation

A safe and bilateral technology, applied in the field of data privacy and security, can solve problems such as the difficulty of machine learning model training

Pending Publication Date: 2021-10-19
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to issues such as industry competition, data security, and user privacy, data integration faces great resistance. It is difficult to integrate data scattered across various platforms for machine learning model training.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating security calculation secret key and performing security calculation
  • Method and device for generating security calculation secret key and performing security calculation
  • Method and device for generating security calculation secret key and performing security calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0189]According to one embodiment, the correction factor determination module 622 is specifically configured to: sum the temporary label values ​​of the left node and the right node of the jth layer respectively to obtain the left sum value and the right side sum value; use the left The side sum value, the right side sum value, and the own fragment of the preset integer α, and the corresponding sum value provided by the other party and the opponent fragment of the preset integer α, perform the first security operation to obtain the The correction factor corresponding to the jth layer.

[0190] In one embodiment, the correction factor includes a first label factor, a left label factor and a right label factor; wherein: the first label factor indicates that on the other side of the piercing node, the first temporary The difference between the sum of the label values ​​and the sum of the temporary label values ​​of the second party; the left label factor is determined based on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a device for generating security calculation keys and performing security calculation by two parties in a combined manner. The security calculation uses a distributed point function that maps an integer alpha to a predetermined value beta in a k-bit integer ring. The method for generating secret keys comprises the following steps: generating binary trees by both parties respectively, and initializing a label value of a root node; performing label assignment on the binary trees layer by layer, wherein for each node of the jth layer, a temporary label value is generated according to a father node of the node; then the two parties determine a correction factor corresponding to the jth layer through MPC based on a fragment of alpha; and the temporary label value is corrected by using the correction factor to obtain label values of the nodes, so that the difference between the label values of puncturing nodes of the two parties is a constant and the label values of of non-puncturing nodes of the two parties are the same; then determining, by each party, an output correction value based on a leaf node label value and a fragment of beta; and generating, by each party, a secret key which comprises the label value of the root node, the correction factor and the output correction value.

Description

technical field [0001] One or more embodiments of this specification relate to the field of data privacy and security, and in particular to methods and devices for generating secure computing keys and performing secure computing. Background technique [0002] With the development of computer technology, machine learning has been applied to various technical fields to analyze and process various business data. The data needed for machine learning often involves multiple fields. For example, in the scenario of merchant classification analysis based on machine learning, the electronic payment platform has the transaction flow data of the merchants, the e-commerce platform stores the sales data of the merchants, and the banking institution owns the merchants. loan data. Data often exists in silos. Due to issues such as industry competition, data security, and user privacy, data integration faces great resistance, and it is difficult to integrate data scattered across various p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0836H04L9/0861H04L2209/46
Inventor 黄章杰马宝利雷浩
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD