Secure multi-party computing data system, method and equipment and data processing terminal

A secure multi-party computing and data technology, applied in the field of information security, can solve problems such as limited blockchain space, high communication complexity, and increased node burden, so as to solve the contradiction of space on the chain, protect privacy data security, and overcome horizontal dilated effect

Pending Publication Date: 2022-03-11
XIAN XIDIAN BLOCKCHAIN TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) In the existing blockchain-based secure multi-party computing platform, the main process of secure multi-party computing is still completed in a centralized process, which cannot satisfy the distributed characteristics of personal privacy data. For individual users, it is impossible to truly own For the right to use their own private data, there are still challenges in truly combining blockchain technology for secure multi-party computing in distributed scenarios
[0008] (2) Using blockchain as a platform and combining cryptography technology to solve the problem of private data use and circulation, the data quality cannot be guaranteed, the data source collected from the outside world lacks credibility, and the value of the data is also lacking. Quantitative standards; the amount of data continues to grow. As time goes by, the amount of data collected will gradually increase. Under the redundant design of the blockchain, it will cause an increase in the burden of nodes; the data types are complex and diverse. For objects, The data obtained from the perspectives of different fields are different, and multimodal data cannot be directly processed
[0009] (3) Using the blockchain as a platform, combined with cryptography technology, there are still many challenges in solving the use and transfer of private data, which leads to the inability to comply with the transfer of personal private data and exert its potential value
In traditional secure multi-party computing, the more computing parties, the higher the complexity of communication, so the requirements in distributed scenarios cannot be guaranteed
Second, there is a contradiction between the growth of data and the space on the blockchain
The collected data will gradually increase, and the space on the blockchain is limited, so the aggregation value of the data cannot be guaranteed
The third is that the multi-modality of the data makes the calculation difficult
Due to the multi-modal nature of the data, it is impossible to directly use and calculate the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party computing data system, method and equipment and data processing terminal
  • Secure multi-party computing data system, method and equipment and data processing terminal
  • Secure multi-party computing data system, method and equipment and data processing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] The present invention belongs to the information security technology, which discloses a security multi-party calculation protocol based on the block chain. The protocol includes a data model for building a collection specification, broadcast verification; a data pool node based on the block chain to verify the specifications of broadcast data, and store ciphertext data; propose a data pool within the data pool Adapt to the hardware adapter of the security multi-party calculation data model; proposes a new type of data quality evaluation, data flow transfer incentive mechanism. The data protocol published by the present invention is intended to protect the availability of the data, and the acquisition data can be used in ciphertext by the protocol of the present invention, and verify the ciphertext data specification by the data pool. Storage data retrieval feature; via "hardware adapter", changing data modality, so that it can make security multi-party calculations on the b...

Embodiment 2

[0094] Such as image 3 As shown, the present embodiment describes the entire process of privacy data in the protocol and the device of the present invention and the entire process of the device.

[0095] Step 1: The data owner collects privacy data through the data acquisition node and converts according to the data model described in steps;

[0096] The second step, the node broadcasts the Verify request, requests to include data verification packets;

[0097] In the third step, after the data pool node receives the Verify request, if the verification is verified, the local storage space is deposited, and the Storage-Proof has been given, which will also send it to the collection node to prove that the data has been storage. The contract on the chain will send Storage-Challenge to the data pool node, and the data pool node will respond to challenges and give the Storage-Challenge-Proof Storage Proof.

[0098] In the fourth step, the data demand side needs to use the privacy data ...

Embodiment 3

[0106] With the introduction of relevant laws such as "Data Security Law" and "Personal Information Protection Law", data privacy protection is increasingly concerned about enterprises. In response to the privacy problem arising from the existing data collection, the present invention provides a secure multi-party computing data model based on the block chain to solve the privacy challenge of the data of privacy acquisition, safety usage.

[0107] In one embodiment, if Figure 4 As shown, it is the application of the model in the automotive and insurance field to protect the safety and privacy of the car data in the process of use.

[0108] The first step is to collect data from the automotive, such as the position of the car, the number of travel trajectories, the number of tech brakes, etc., these data are data that are interested in automobile manufacturers and automobile insurancemen. However, these data belong to the user's personal privacy data, and cannot be used in clear te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and discloses a secure multi-party data computing system, method and device and a data processing terminal.The secure multi-party data computing method comprises the steps that a data model of collection specifications and broadcast verification is constructed; proposing a data pool for verifying and storing a broadcast data model; a hardware adapter for converting data in a data pool into data adapting to secure multi-party computing is provided; a novel evaluation and incentive mechanism established on the block chain is provided. The data protocol provided by the invention can improve the availability of the data on the premise of protecting the security of the privacy data, and the collected data is available and verifiable under the ciphertext through the protocol; verifying ciphertext data specifications through a data pool, and storing data retrieval features; the data modality is changed through a hardware adapter, so that the data can perform secure multi-party calculation on the block chain; a novel evaluation and incentive mechanism is established on the block chain, all parties are promoted to participate in secure multi-party calculation, and sustainable circulation of data is assisted.

Description

Technical field [0001] The present invention belongs to the field of information security, and more particularly to a secure multi-party calculation data system, method, device, and data processing terminal. Background technique [0002] At present, since people's privacy awareness is gradually enhanced, and the protection of individual privacy data has become a consensus of the whole society. In the digital economic era, personal privacy data is not only personal, but also combined with public, intertwined with a variety of commercial interests. There is a natural contradiction between the mining of privacy protection and privacy data, how to dig more value has become an urgent need to solve the problem. The block chain technology provides a solution for this issue, and the block chain technology has the characteristics of traceability, non-detachable and detrimental, with personal privacy protection, and can be used as the core of privacy data. Supporting technology. However, d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/3247H04L9/3239H04L9/3218H04L9/008H04L2209/46
Inventor 裴庆祺初金朝吴志辉
Owner XIAN XIDIAN BLOCKCHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products