A multi-party secure computing method, device and electronic equipment
A computing method and computing technology, applied in secure communication devices and key distribution, can solve problems such as original data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0071] In order to provide an implementation scheme for avoiding collusion between some computing nodes to obtain original data in the process of multi-party secure computing based on secret sharing, the embodiment of this application provides a multi-party secure computing method, device and electronic equipment, as follows The preferred embodiments of the present application will be described in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present application, and are not intended to limit the present application. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0072] An embodiment of the present application provides a multi-party secure computing method, which is applied to a data provider device among multiple data provider devices participating in multi-party secure...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


