Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-party data security computing method, system, device and storage medium

A technology of data security and calculation method, applied in the field of information security, can solve the problem of not being able to fundamentally protect the user's original data from being stolen, and achieve the effect of avoiding the risk of interception and cracking, avoiding data leakage and improving feasibility.

Active Publication Date: 2022-03-04
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It cannot fundamentally guarantee that the user's original data will not be stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-party data security computing method, system, device and storage medium
  • A multi-party data security computing method, system, device and storage medium
  • A multi-party data security computing method, system, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] The embodiment of the present invention discloses a multi-party data security computing method, see figure 1 As shown, the method includes:

[0059] S11: Receive the required calculation polynomial sent by the demand terminal.

[0060] Specifically, the demand terminal provides the polynomial that it needs to calculate using the original data. The original data required to calculate the polynomial are distributed on different data source terminals. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method, system, device and computer-readable storage medium for multi-party data security calculation, which decomposes the original data and distributes them to different computing servers, and splits them according to the corresponding monomial formula in each different computing server. Divide the data into calculations, add server random numbers to the calculation results, and then resolve the intermediate results by the resolution server to obtain a simplified third intermediate result, which is finally sent to the demand terminal for final resolution to obtain the final calculation result , which realizes that any party participating in the calculation does not need to provide the original data to other parties participating in the calculation, solves the trust problem between the participating parties, and can complete the secure calculation of multi-party data without the original data leaving the local area. Based on the security of the transmission link and the computing environment, the data participating in the calculation is guaranteed to be safe and not leaked, and the original plaintext data during the calculation process is invisible to protect user privacy.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a multi-party data security computing method, system, device and computer-readable storage medium. Background technique [0002] When the data of multiple data sources (assume A and B) are fused together for calculation, one method is that A sends the data to B and completes the calculation on the B side, or B gives the data to A and completes the calculation on the A side. In this mode, whether A sends data to B or B sends data to A, there is a risk of data flowing out of the local security domain. At the same time, A or B can see the original data transmitted by the other party, and can copy and sell the other party's data again, which is not safe and may leak the user's privacy. [0003] Another way is to find a third-party C. A and B transmit the data to C, and the data calculation is completed on the C side. Under this method, C can obtain the original data upl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/57
CPCG06F21/60G06F21/57
Inventor 陶立峰邵俊杨扬范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD