Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure multi-party computing method, device, electronic device and storage medium

A technology for secure multi-party computing and related parties, applied in the fields of secure multi-party computing methods, devices, electronic equipment and storage media, can solve the problem of high total resource consumption, reduce total resource consumption, improve resource utilization, and improve total resource consumption. effect of high problem

Active Publication Date: 2022-08-02
富算科技(上海)有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a secure multi-party computing method, device, electronic equipment, and storage medium for improving the problem of high total resource consumption of the entire secure multi-party computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure multi-party computing method, device, electronic device and storage medium
  • A secure multi-party computing method, device, electronic device and storage medium
  • A secure multi-party computing method, device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the implementations. example. The components of the embodiments of the present application generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed descriptions of the embodiments of the present application provided in the accompanying drawings are not intended to limit the scope of the claimed embodiments of the present application, but merely represent selected ones of the embodiments of the present application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without creative work...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a secure multi-party computing method, device, electronic device and storage medium, which are used to improve the problem of high total resource consumption of the entire secure multi-party computing. The method includes: acquiring a sequence of logical statements, parsing out operation instructions and operands from each logical statement in the sequence of logical statements; analyzing the operands corresponding to each logical statement, and obtaining an associated party identifier corresponding to each logical statement List; shard the operand corresponding to each logical statement, obtain the sharded data fragments, and find the associated execution node corresponding to the associated party identification list; send operation instructions and Fragmented data fragments, so that the associated execution node corresponding to the associated party identification list can perform secure multi-party computation on the fragmented data fragments according to the operation instruction.

Description

technical field [0001] The present application relates to the technical field of privacy computing and secure multi-party computing, and in particular, to a secure multi-party computing method, apparatus, electronic device, and storage medium. Background technique [0002] The research of Secure Multi-Party Computation (SMC) is mainly aimed at the problem of how to safely calculate a contract function in the absence of a trusted third party. A secure multi-party computation protocol, if it is secure for attackers with unlimited computing power, is called information-theoretic security or unconditional security; if it is secure against attackers with polynomial computing power, it is called cryptography Learning safe or conditionally safe. [0003] At present, in the process of secure multi-party computation based on secret sharing, the operands involved in the computation need to be sent to each participant by secret sharing, and then all participants will participate in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F21/6245
Inventor 孙小超陈立峰卞阳尤志强
Owner 富算科技(上海)有限公司