Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-domain identity verification method and server in secure multi-party computing

A technology for secure multi-party computing and authentication methods, applied in computing, computer security devices, instruments, etc., can solve problems such as privacy data leakage, and achieve the effect of avoiding privacy data leakage

Pending Publication Date: 2022-03-22
LENOVO (BEIJING) LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In this distributed computing scheme, the same root of trust is used to issue public and private keys in the same domain, and there may be a security problem of using the root of trust to decrypt data, resulting in privacy data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain identity verification method and server in secure multi-party computing
  • Cross-domain identity verification method and server in secure multi-party computing
  • Cross-domain identity verification method and server in secure multi-party computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0066] refer to figure 1 As shown in FIG. 1 , it is an implementation flow chart of a method for cross-domain authentication in secure multi-party computing provided by Embodiment 1 of the present application. The method can be applied to a first server in a first domain, such as a gateway server in the current domain. For example, if figure 2 As shown in , multiple computing entities that implement secure multi-party computing come from multiple domains, and the computing entitie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-domain identity verification method and server in secure multi-party computing, the method is applied to a first server in a first domain, and the method comprises the following steps: receiving a verification request sent by a first computing entity in the first domain, the verification request being used for indicating to perform identity verification on a second computing entity in a second domain; sending a public key query request to a second server in a second domain according to the verification request; receiving a first public key which is sent by the second server and carries a signature, wherein the first public key is a secret key which is generated by the first computing entity for the entity in the second domain in advance; verifying the signature carried by the first public key by using a second public key; the second public key is a secret key generated by the second server for an entity in the first domain in advance; and sending the first public key to the first computing entity under the condition that the signature carried by the first public key represents that the verification of the second computing entity is passed.

Description

technical field [0001] The present application relates to the technical field of secure multi-party computing, in particular to a cross-domain authentication method and server in secure multi-party computing. Background technique [0002] In current distributed computing, a distributed computing solution based on PKI (Public Key Infrastructure) is usually used. In this scheme, the computing entities organized by the coordinator are all entities in the same domain, and the transmission of private data is realized through the public key and private key generated by the same root of trust. [0003] In this distributed computing scheme, the same root of trust is used to issue public and private keys in the same domain, and there may be a security problem of using the root of trust to decrypt data, resulting in leakage of private data. Contents of the invention [0004] In view of this, this application provides a cross-domain authentication method and server in secure multi-p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/60G06F21/62G06F21/64
CPCG06F21/45G06F21/602G06F21/6245G06F21/64
Inventor 王云浩郭青霄
Owner LENOVO (BEIJING) LTD