Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-party privacy computing method and device based on semi-trusted hardware

A multi-party privacy and computing method technology, applied in the field of multi-party privacy computing methods and devices, can solve the problems of multiple communication rounds and large communication volume of multi-party computing technology, and achieve the effect of ensuring security

Active Publication Date: 2022-04-05
ZHEJIANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present application is to provide a method and device for multi-party privacy computing based on semi-trusted hardware to solve the technical problems of semi-trusted hardware and multi-party computing technology with large communication volume or many communication rounds in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party privacy computing method and device based on semi-trusted hardware
  • Multi-party privacy computing method and device based on semi-trusted hardware
  • Multi-party privacy computing method and device based on semi-trusted hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0070] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-party privacy calculation method and device based on semi-trusted hardware. The method applied to the semi-trusted hardware comprises the steps that random number masks and random seeds of all user sides are obtained; generating a confusion circuit seed according to the random seed; generating a confusion circuit according to a predetermined circuit description and the confusion circuit seed, the confusion circuit comprising a confusion table, a line tag and decoding information; sending line tags corresponding to the input of all user sides to the user sides corresponding to the semi-trusted hardware by using an oblivious transmission protocol; and sending the confusion table and the decoding information to a user side corresponding to the semi-trusted hardware, so that the user side calculates an output value according to the confusion table, the decoding information and line tags corresponding to the input of all the user sides. The technical problems of hardware semi-credibility and large communication traffic or multiple communication rounds of a multi-party computing technology in the prior art are solved.

Description

technical field [0001] The present application relates to the field of privacy protection data processing, and in particular to a semi-trusted hardware-based multi-party privacy computing method and device. Background technique [0002] With the development of computer network technology, there are more and more scenarios that require participants to exchange private data and cooperate to complete computing tasks, such as electronic elections, electronic auctions, and private information retrieval. In order to ensure the privacy and security of data while sharing data for calculation, privacy computing technology can be applied, and secure multi-party computing (Secure Multi-party Computation, MPC) technology is the core component of privacy computing technology, which allows multiple Participants who do not trust each other collaboratively calculate a pre-agreed function without the existence of a trusted third party, while not disclosing any information other than the func...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/08G06F16/29Y02D30/50H04L2209/16H04L2209/46H04L9/008H04L9/0869
Inventor 张秉晟卢益彪刘巍然任奎
Owner ZHEJIANG UNIV