Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-party secure computing method, device and electronic equipment

A computing method and computing technology, applied in secure communication devices and key distribution, can solve problems such as original data leakage

Active Publication Date: 2022-01-04
HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a multi-party secure computing method, device, and electronic equipment to solve the problem in the prior art that the original data is easily leaked when performing multi-party secure computing based on secret sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-party secure computing method, device and electronic equipment
  • A multi-party secure computing method, device and electronic equipment
  • A multi-party secure computing method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to provide an implementation scheme for avoiding collusion between some computing nodes to obtain original data in the process of multi-party secure computing based on secret sharing, the embodiment of this application provides a multi-party secure computing method, device and electronic equipment, as follows The preferred embodiments of the present application will be described in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present application, and are not intended to limit the present application. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0072] An embodiment of the present application provides a multi-party secure computing method, which is applied to a data provider device among multiple data provider devices participating in multi-party secure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a multi-party secure computing method, device, and electronic equipment, including: selecting an initial computing subtask from tasks to be computed; generating computing rules representing the initial computing subtasks; Calculation sub-rules, n is the number of multiple computing nodes participating in multi-party secure computing; send n computing sub-rules to n computing nodes, and each computing node receives a computing sub-rule; according to the privacy computing scheme, send n computing nodes send the processed data for the held original data, so that the n computing nodes calculate according to the computing sub-rules received respectively, and obtain the computing sub-results, and make the n computing nodes use the obtained n computing sub-results, Continue to perform multi-party secure computing for computing tasks to be processed. With this solution, it is possible to prevent some computing nodes from obtaining the original data through collusion.

Description

technical field [0001] The present application relates to the technical field of multi-party secure computing, in particular to a multi-party secure computing method, device and electronic equipment. Background technique [0002] SS-MPC (Secret Sharing-Multi-Party Secure Computation, Secret Sharing-Multi-Party Secure Computation) is a common multi-party secure computing solution. The reason is that compared with other privacy computing schemes, SS-MPC has some practical advantages, such as: compared with GC (Garbled Circuits, confusing circuit) multi-party secure computing scheme, SS-MPC has the advantage of low communication; HE (Homomorphic Encryption, homomorphic encryption) and SS-MPC have the advantage of low computational complexity; while TEE (Trusted Execution Environment, Trusted Execution Environment) generally has a small space and weak computing power, and cannot cope with large-scale computing tasks. [0003] At present, in the general process of multi-party se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/085H04L2209/46
Inventor 徐葳贾晓丰李浥东王天雨
Owner HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD