Supercharge Your Innovation With Domain-Expert AI Agents!

A sorting method and system based on secret sharing

A technology of secret sharing and sorting methods, applied in the fields of instrumentation, computing, electrical digital data processing, etc., can solve problems such as inability to data fusion modeling or statistical analysis

Active Publication Date: 2022-05-10
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, multiple collaborators involved in the business hope to jointly complete tasks such as modeling and statistical analysis, but due to reasons such as data privacy and data isolation, the data cannot be directly fused for modeling or statistical analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A sorting method and system based on secret sharing
  • A sorting method and system based on secret sharing
  • A sorting method and system based on secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the following briefly introduces the drawings that need to be used in the description of the embodiments. Apparently, the accompanying drawings in the following description are only some examples or embodiments of this specification, and those skilled in the art can also apply this specification to other similar scenarios. Unless otherwise apparent from context or otherwise indicated, like reference numerals in the figures represent like structures or operations.

[0016] It should be understood that "system", "device", "unit" and / or "module" as used herein is a method for distinguishing different components, elements, parts, parts or assemblies of different levels. However, the words may be replaced by other expressions if other words can achieve the same purpose.

[0017] As indicated in the specification and claims, the terms "a", "an", "an" and / or "the" are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This description relates to the field of data security, and in particular to a sorting method and system based on secret sharing, wherein the data columns to be sorted and shared fragments are stored in the first party and the second party, and the first party holds the target sorting vector, The sort vector is used to identify the operation of sorting the sequence of equal length, and its elements indicate the positions of the parametric elements in the sequence of equal length in the result sequence; this method is executed by the first party, and obtains the first score of the target data column Sharding and performed by a second party to obtain a second shard of the target data column.

Description

technical field [0001] This specification relates to the field of data security, in particular to a sorting method and system based on secret sharing. Background technique [0002] Data plays an increasingly important role in today's world. In many application scenarios, data has become a resource that needs to be protected. In actual business scenarios, due to the need to protect data privacy security and data isolation and other reasons, some difficult problems are often encountered. For example, multiple collaborators involved in the business hope to jointly complete tasks such as modeling and statistical analysis, but due to reasons such as data privacy and data isolation, the data cannot be directly fused for modeling or statistical analysis. The tools used in cryptography to solve multiparty secure computations can be used to achieve this type of task. [0003] Therefore, this specification provides a sorting method and system based on secret sharing, which can be us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/176G06F21/62
CPCG06F16/176G06F21/6245
Inventor 方文静王力
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More