Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for executing multi-party secure multiplication

An execution method and an execution device technology, which are applied in the field of secure computing, can solve problems such as increased computation and communication traffic, and achieve the effects of improving computing efficiency and reducing data communication traffic

Pending Publication Date: 2022-05-13
ANT BLOCKCHAIN TECH SHANGHAI CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in order to protect the data privacy of each data party in the process of multi-party secure computing, various encryption methods are usually involved, resulting in a significant increase in the amount of calculation and communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for executing multi-party secure multiplication
  • Method and device for executing multi-party secure multiplication
  • Method and device for executing multi-party secure multiplication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0041] First, some concepts that may be involved in this specification are described.

[0042] And sharing: In the two-party security calculation, an integer x from 0 to M-1 is set as x=x L +x R Distributed and stored in two parties in a shared form of modulo M, so that one party does not know x R , the other party does not know x L , neither of the two parties can get the complete form of x; further, the two parties can be expanded into multiple parties.

[0043] Secure computing in the form of sharing and sharing: computing in the form of maintaining and sharing. During the calculation process, one party can never deduce the part of each data saved by other parties, and the calculation results are still stored in the form of sharing and sharing.

[0044] It can be understood that for the multiplication calculation performed by the two par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a multi-party secure multiplication execution method and device which are used for determining a product z of first data x and second data y stored in n data parties in a sharing mode, and a first party in the n data parties holds a first component of x and a first component of y. A first party can obtain a first component of a first disturbance term u, a first component of a second disturbance term v and a first component of a third elimination term w, determine a first component of a first disturbance result dx for x by using the first component of x and the first component of u, determine a first component of a second disturbance result dy for y by using the first component of y and the first component of v, and determine a second disturbance result dx for y by using the first component of y and the first component of v. The first component of dx and the first component of dy are then provided to the summator for the summator to feed back dx and dy, thereby determining a first component of product z based on a first product of dx and the first component of y, a second product of dy and the first component of x, and the first component of w.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of secure computing, and in particular, to a method and device for executing multi-party secure multiplication. Background technique [0002] Multi-party secure computing is also called secure multi-party computing, or MPC for short, that is, multiple parties jointly calculate the result of a function without disclosing the input data of all parties to the function, and the calculation result is disclosed to one or more parties. For example, multi-party secure computing can be applied to privacy seeking, joint training of machine learning models, data query, and so on. A typical application of this is joint statistical analysis and machine learning of privacy-preserving multiparty data. Multi-party secure computing allows participating parties to calculate statistical results and machine learning results based on the joint data of all parties without exposing their original da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F7/523G06F7/58
CPCG06F7/523G06F7/582
Inventor 张祺智李漓春殷山
Owner ANT BLOCKCHAIN TECH SHANGHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products