Method and device for generating security calculation secret key and performing security calculation
A safe and bilateral technology, applied in the field of data privacy and security, can solve problems such as the difficulty of machine learning model training
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0189]According to one embodiment, the correction factor determination module 622 is specifically configured to: sum the temporary label values of the left node and the right node of the jth layer respectively to obtain the left sum value and the right side sum value; use the left The side sum value, the right side sum value, and the own fragment of the preset integer α, and the corresponding sum value provided by the other party and the opponent fragment of the preset integer α, perform the first security operation to obtain the The correction factor corresponding to the jth layer.
[0190] In one embodiment, the correction factor includes a first label factor, a left label factor and a right label factor; wherein: the first label factor indicates that on the other side of the piercing node, the first temporary The difference between the sum of the label values and the sum of the temporary label values of the second party; the left label factor is determined based on th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


