Privacy protection data processing method and device and storage medium
A data processing and privacy protection technology, applied in the field of data security, can solve problems such as difficulties in division of labor and cooperation, inability to integrate and interoperate data processing technologies, and difficulty in breaking professional barriers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0045] Example 1: Matrix Vector Multiplication
[0046]
[0047] in, is a calculation expression, representing matrix-vector multiplication; Available but invisible data representing the parties, in vector form, represents the transpose of a vector; Represents available but invisible data for a party, in matrix form. In matrix-vector multiplication, there is no general method of back-calculating the available but invisible data from the result, as a basic premise of privacy protection.
example 2
[0048] Example 2: Matrix Multiply
[0049]
[0050] in, is a calculation expression, representing matrix multiplication; Represents the available but invisible data of the participant, in matrix form; Y represents the available but invisible data of the participant, in matrix form; in matrix multiplication, in order to satisfy the irreversibility of matrix operations, here is the constraint, the shape of the two matrices It cannot be the same, which avoids the operation by constructing an invertible matrix.
[0051] In some embodiments, the service-oriented interface of the security module is defined to support the use of data defined in formal parameters.
[0052] Specifically, the security module will inevitably come into contact with large-scale data in the calculation process. Therefore, in the definition of the service interface, it is necessary to support the use of data defined by formal parameters to avoid direct transmission between the plaintext module and th...
specific Embodiment approach
[0068] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Referring to the foregoing embodiments, details are not repeated here.
[0069] By separating the security module and the plaintext module, the application scenarios of multi-party secure computing and federated learning are constructed. On the other hand, the integration process of technologies can be accelerated.
[0070] Technology integration includes vertical technology integration and horizontal technology integration. Vertical integration of technology means that in traditional data applications, such as multi-party joint statistical analysis, multi-party joint modeling to establish AI models, it provides the convenience of technical integration for the integration of traditional statistical analysis technology, AI technology, and cryptography technology. The horizontal integration of technology is able to open up between different technology manufacturers and realize the interconnection and interoperability of da...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


