Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-party secure multiplication

A multi-party and secure technology, applied in the field of information security, can solve problems such as exposing private data

Pending Publication Date: 2022-07-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the machine learning model can provide users with convenient prediction services, the training and / or prediction of the machine learning model in plain text has the risk of exposing private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party secure multiplication
  • Multi-party secure multiplication
  • Multi-party secure multiplication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to illustrate the technical solutions of the embodiments of the present specification more clearly, the following briefly introduces the accompanying drawings that are used in the description of the embodiments. Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present specification. For those of ordinary skill in the art, the present specification can also be applied to the present specification according to these drawings without any creative effort. other similar situations. Unless obvious from the locale or otherwise specified, the same reference numbers in the figures represent the same structure or operation.

[0059] It should be understood that "system", "device", "unit" and / or "module" as used herein is a method used to distinguish different components, elements, parts, parts or assemblies at different levels. However, other words may be replaced by other expressions if they serve the same p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a multi-party safe multiplication, and relates to n parties, and n is a positive integer not less than 3. Each party holds fragments of two multipliers. Any calculation participant can transmit the local fragments of the two multipliers to the other party or the other multiple parties and obtain other fragments of the two multipliers from the other party or the other multiple parties, and the number of the other multiple parties is not larger than n-2. Furthermore, any calculation participant can multiply the local fragments of the two multipliers to obtain a local product term, multiply the local fragment of one multiplier with other fragments of the other multiplier to obtain one or more cross terms, and obtain the local fragment of the product of the two multipliers based on the local product term and the one or more cross terms.

Description

technical field [0001] This specification relates to the technical field of information security, in particular to a multi-party security multiplication. Background technique [0002] In the era of big data, the application of machine learning is becoming more and more extensive. Although a machine learning model can provide users with convenient prediction services, the training and / or prediction of a machine learning model in plaintext has the risk of exposing private data. [0003] Implementing a machine learning framework in the ciphertext state, that is, implementing a secure machine learning framework, requires a complete basic protocol. SUMMARY OF THE INVENTION [0004] One of the embodiments of this specification provides a multi-party secure multiplication, involving n parties, where n is a positive integer not less than 3, each party holds a slice of the first multiplier and a slice of the second multiplier, and the multiplication consists of The execution by o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71G06F7/523
CPCG06F21/71G06F7/523
Inventor 廖鑫颖陈岑王力
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products