A multi-party secure computing method, system and device for multi-party secure computing
A computing system and computing method technology, applied in the computer field, can solve problems such as consumption, complex implementation, high calculation volume and communication volume, and achieve the effect of reducing time consumption and communication volume
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0047] Method embodiment
[0048] The multi-party secure computing method provided by the embodiment of the present invention can be applied to a multi-party secure computing system, which is a computing system that protects data privacy and security. Multiple participants can use multi-party secure computing technology to perform collaborative computing without revealing their own data, and obtain computing results. The data, intermediate r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


