Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-party secure computing privacy intersection method and device, equipment and storage medium

A privacy and security technology, applied in the field of private computing, it can solve the problems of inability to realize data, invisible data availability, and inability to truly guarantee data privacy and security, and achieve the effect of improving computing efficiency.

Pending Publication Date: 2022-05-27
杭州博盾习言科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing technology mainly relies on the internal management system and the external data security system for data privacy security protection. These two methods only prevent data leakage from the surface, but cannot truly guarantee data privacy security, nor can it realize data security. Value" sharing, can not really achieve "data available but not visible"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party secure computing privacy intersection method and device, equipment and storage medium
  • Multi-party secure computing privacy intersection method and device, equipment and storage medium
  • Multi-party secure computing privacy intersection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] In order to make the purposes, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be described clearly and completely below with reference to the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments These are only some of the embodiments of the present disclosure, but not all of the embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure.

[0101] The terms "first", "second", "third", "fourth", etc. (if present) in the description and claims of the present disclosure and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to Describe a particular order or sequence. It is to be understood that the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-party security computing privacy intersection method, device and equipment and a storage medium, the method is applied to a plurality of participants and a third party, and the method comprises the steps that the participants construct a corresponding relation between privacy data and random numbers; according to the corresponding relation, initial encryption information is constructed through an encryption algorithm; the plurality of participants share the initial encrypted information to a third party in a secret sharing mode; the third party determines query encryption information according to the initial encryption information and feature information corresponding to the initial encryption information; and the plurality of participants determine privacy intersection information according to the query encryption information, the privacy data and the random number. The method disclosed by the invention can adapt to privacy data sets of different scales, and the operation performance is greatly improved on the premise of ensuring the safety by combining the random number.

Description

technical field [0001] The present disclosure relates to the technical field of privacy computing, and in particular, to a method, device, device and storage medium for privacy intersection of multi-party secure computing. Background technique [0002] In the "Internet of Everything Era", the collection and storage of personal user information by enterprises will also usher in explosive growth. Various risks encountered in the use and circulation of data may endanger the personal safety of individual users and the commercial interests of enterprise users. [0003] The circulation and sharing of data elements and value mining are the core contents of the data element market cultivation, and the premise of information sharing and value mining is to ensure the privacy and security of data. [0004] The privacy and security protection of data in the existing technology mainly relies on the internal management system and the external data security guarantee system. These two met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/0428H04L9/085H04L9/0869H04L63/0478H04L2209/46
Inventor 殷奔鑫孟丹傅致晖李晓林
Owner 杭州博盾习言科技有限公司