Two-party safety comparison method and system

A technology for safety and comparison of results, applied in the field of safety, can solve the problems affecting the application range of MPC and high network cost, and achieve the effect of reducing communication and calculation amount and ensuring safety

Pending Publication Date: 2022-02-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional GC scheme, the participants of the secure multi-party computation need to perform complex interactions, which leads to the high network cost of the GC scheme, which seriously affects the application range of MPC.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party safety comparison method and system
  • Two-party safety comparison method and system
  • Two-party safety comparison method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0030] Before describing the solution provided by the embodiment of the present specification, the inventive concept of the solution is explained as follows.

[0031] First of all, in order to further strengthen the privacy protection of the first party (also known as the data requester), the inventor of this application proposes that the first party simultaneously sends n identifiers to the second party, and the n identifiers include the target identifier and n-1 A confusing identification, so that the second party (also known as the data holder) cannot know the data requested by the first party for comparison. In addition, after the comparison is completed, the first party can only obtain the comparison result of the data corresponding to the target identifier, but cannot obtain the comparison result of the data corresponding to other identifiers.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a two-party safety comparison method and system. The method comprises the steps that a first party sends a comparison request to a second party, wherein the comparison request comprises n identifiers and L basic values, and the n identifiers comprise a target identifier and n-1 confusion identifiers; the second party obtains n pieces of second data corresponding to the n identifiers; a Boolean circuit is generated for comparing the first data with the n second data; an obfuscation table of the Boolean circuit is generated based on the L base values and provided to the first party; the first party decrypts the confusion table by using L local selection tags generated by associating the L basic values, and determines a target comparison result of the second data corresponding to the target identifier and the first data at least according to a decryption result.

Description

technical field [0001] One or more embodiments of this specification relate to the field of security technologies, and in particular, to a method and system for two-party security comparison. Background technique [0002] Secure Multi-Party Computation (MPC) allows multiple data owners to perform collaborative calculations without trusting each other, output calculation results, and ensure that no one can get any other than the deserved calculation results. any other information. In other words, MPC can obtain data usage value without revealing the original data content. [0003] The MPC can be implemented based on a Garbled Circuit (GC). GC is a two-party secure multi-party computing protocol. It uses a cryptographic function to generate a confusion table for a Boolean circuit that implements a calculation function, and calculates the results for the inputs of two parties, and the input of one party will not be leaked to the other party during the calculation process. In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L61/2539H04L49/118H04L9/40
CPCH04L9/0866H04L63/0421H04L63/0807H04L63/0428
Inventor 赵原李漓春殷山
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products