A secure two-party comparison method and system
A relatively systematic and safe technology, applied in the field of information security, can solve the problems of low computing efficiency and communication efficiency, and achieve the effect of high computing efficiency and communication efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0081] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.
[0082] In order to solve the technical problem of low calculation efficiency and communication efficiency of the existing secure two-party comparison method, the present application discloses a secure two-party comparison method through the following embodiments. The secure two-party comparison method provided in the embodiment of this application is used to compare the size of the data held by two participants, figure 1 It exemplarily shows a schematic diagram of the overall process corresponding to a secure two-party comparison method provided by the embodiment of the present application, as shown in figure 1 As shown, it specifically includes the following steps:
[0083] 101: The first party encrypts the first data according...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

