Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-party secure computing method, system and device for multi-party secure computing

A computing system and computing method technology, applied in the computer field, can solve problems such as consumption, complex implementation, high calculation volume and communication volume, and achieve the effect of reducing time consumption and communication volume

Active Publication Date: 2022-06-07
HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the addition and comparison calculations of multi-party secure computing, the multiplication of multi-party secure computing is usually more complicated to implement and requires more calculation and communication
For example, when performing secret multiplication calculations based on the 2-4 secret sharing protocol, each computing node needs to communicate 8 times during each round of calculation, and the communication volume is relatively large.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-party secure computing method, system and device for multi-party secure computing
  • A multi-party secure computing method, system and device for multi-party secure computing
  • A multi-party secure computing method, system and device for multi-party secure computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0047] Method embodiment

[0048] The multi-party secure computing method provided by the embodiment of the present invention can be applied to a multi-party secure computing system, which is a computing system that protects data privacy and security. Multiple participants can use multi-party secure computing technology to perform collaborative computing without revealing their own data, and obtain computing results. The data, intermediate r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a multi-party secure computing method, system and device for multi-party secure computing. In the multi-party secure calculation method provided by the embodiment of the present invention, when calculating the product of the first secret X and the second secret Y based on the 2-4 secret sharing protocol, each calculation node only needs to communicate six times, respectively: the first In the round of communication, computing node S1 interacts with computing node Sb, and computing node S2 interacts with computing node Sa, a total of 4 communications; in the second round of communication, computing node S1 sends the third result fragment to computing node Sa, The calculation node S2 sends the third result fragment to the calculation node Sb, and there are 2 communications in total. Compared with the processing process of calculating the product of the first secret X and the second secret Y based on the 2-4 secret sharing protocol in the prior art, the embodiment of the present invention reduces the communication traffic between each calculation node, and can reduce the multi-party security calculation. time-consuming.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a multi-party secure computing method, system and device for multi-party secure computing. Background technique [0002] Multi-party secure computing refers to the calculation and fusion of data between multiple non-mutually trusted databases under the premise of mutual confidentiality of data in the absence of a trusted third party. [0003] Multi-party secure computing usually provides basic addition, multiplication, comparison and other calculations to be suitable for various scenarios, such as model training, prediction using models, etc. Compared with the addition, comparison and other computations of multi-party secure computation, the multiplication of multi-party secure computation is usually more complicated to implement and needs to consume more computation and communication. For example, when the secret multiplication calculation is performed based on the 2-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0869
Inventor 王西利何昊青李少杰陈琨王国赛
Owner HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD