Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure two-party comparison method and system

A relatively systematic and safe technology, applied in the field of information security, can solve the problems of low computing efficiency and communication efficiency, and achieve the effect of high computing efficiency and communication efficiency

Active Publication Date: 2022-02-15
南京可信区块链与算法经济研究院有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a secure two-party comparison method and system, which can be used to solve the technical problem of low computational efficiency and communication efficiency of the existing secure two-party comparison method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure two-party comparison method and system
  • A secure two-party comparison method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0082] In order to solve the technical problem of low calculation efficiency and communication efficiency of the existing secure two-party comparison method, the present application discloses a secure two-party comparison method through the following embodiments. The secure two-party comparison method provided in the embodiment of this application is used to compare the size of the data held by two participants, figure 1 It exemplarily shows a schematic diagram of the overall process corresponding to a secure two-party comparison method provided by the embodiment of the present application, as shown in figure 1 As shown, it specifically includes the following steps:

[0083] 101: The first party encrypts the first data according...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a secure two-party comparison method and system. The comparison method includes: the first party and the second party respectively encrypt the held data according to their respective preset encryption rules, and use the random vectors generated by each to process the encrypted held data respectively to obtain the first The target vector and the second target vector, the first party sends the first target vector to the second party, and the second party combines its own random vector to generate the third target vector and sends it to the first party, and the first party combines its own The random vector of generates the fourth target vector and sends it to the second party. The second party combines the second target vector to generate a difference vector. If there is an element with a value of zero in the difference vector, it is determined that the first party holds the data Greater than the second party holds the data. The entire comparison method does not involve power modulus operations, and the two parties only need to communicate a constant number of times to compare without exposing the size of the data they hold, and the calculation efficiency and communication efficiency are high.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method and system for comparing two security parties. Background technique [0002] With the rapid development of e-commerce, calculations involving sensitive data are often performed online, such as transactions can be completed on computers. In order to better protect user privacy and their own interests, in the case of e-commerce involving the need to compare data sizes, such as bidding or auctions, users usually hope that they can not disclose their own data information, and do not rely on a third party to realize the comparison of data sizes Purpose. Similar to the famous millionaire problem, that is, two millionaires want to compare who is richer, but they don't want others to know how much money they have. In this way, it is necessary to keep their information secret and there is no trusted third party. In this case, compare the size of the data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F17/16
CPCG06F21/602G06F17/16
Inventor 石宁姜冲李天莹朱晓罡于中磊
Owner 南京可信区块链与算法经济研究院有限公司