Multi-party security calculation method based on OverDrive

A computing method and security technology, applied in computing, computer security devices, instruments, etc., can solve problems that affect the practical application of multi-party secure computing

Pending Publication Date: 2022-02-11
续科天下(北京)科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the participants do not abide by the agreement, or even tamper with the input, it will affect the practical application of multi-party secure computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party security calculation method based on OverDrive

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0025] A multi-party secure computing method based on OverDrive, refer to figure 1 ,include:

[0026] S11: Obtain the BeaverTriples generated by each user through offline calculation;

[0027] In this embodiment, offline calculation refers to calculation performed before specific calculation tasks and inputs are known, and all calculation parties can jointly generate Beaver Triples for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-party security calculation method based on OverDrive. Multi-party security calculation is carried out based on an OverDrive protocol; in the OverDrive protocol, the multi-party security calculation is divided into two parts of offline calculation and online calculation, wherein the offline calculation is used for generating BeaverTriples required by subsequent online calculation, and the online calculation carries out calculation based on a pre-compiled arithmetic circuit according to the BeaverTriples. In the calculation process of offline calculation and online calculation, the calculation process is verified through a MAC value and zero-knowledge proof, and a calculation program of a user is stopped when the verification fails, so that only the calculation program of the user can be stopped even if a certain user actively disables, does not comply with a protocol, and even tampers the input, the security of other honest user data is not influenced.

Description

technical field [0001] The present application relates to the technical field of multi-party secure computing, in particular to an OverDrive-based multi-party secure computing method. Background technique [0002] The existing multi-party secure computing protocols are mainly based on early theoretical implementations such as confusing circuits and GMW. Although this design method is simple in thinking, it is difficult to practice and the efficiency is poor. From a security point of view, these protocols can only satisfy the security under the semi-honest model, that is, all participants will abide by the protocol and will not forge input or output. However, if the participating parties do not abide by the agreement, or even tamper with the input, it will affect the practical application of multi-party secure computing. Contents of the invention [0003] In order to overcome at least to a certain extent the problem in related technologies that participants do not abide b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/60G06F21/64G06F7/58
CPCG06F21/45G06F21/602G06F21/64G06F7/588
Inventor 不公告发明人
Owner 续科天下(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products