Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cryptography distributed calculation and step-by-step verification method with fault-tolerant function

A distributed computing and fault-tolerant technology, applied in the direction of error prevention, digital transmission system, electrical components, etc., can solve the problems of active attack, unable to support computing, and not considering the continuity of computing, etc.

Inactive Publication Date: 2008-12-17
PEKING UNIV
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] At present, the proposed schemes are usually based on the theoretical research results of Boolean algebra. At present, there are no practical schemes and systems at home and abroad. The research is still mainly aimed at the operation security under passive adversary (eavesdropping) or equipment failure. The main problems include: no consideration of the continuity of calculation, no systematic method under active attack, failure to support calculation under general data sharing, high computational complexity, high communication cost, etc.
In particular, existing computing methods are based on Byzantine consensus agreements, and the communication volume between members is large. Moreover, these schemes are vulnerable to active attacks, such as data tampering, increased delay, non-faithful execution, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptography distributed calculation and step-by-step verification method with fault-tolerant function
  • Cryptography distributed calculation and step-by-step verification method with fault-tolerant function
  • Cryptography distributed calculation and step-by-step verification method with fault-tolerant function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The operation process in the present invention will be further described below in conjunction with specific embodiments and schematic diagrams. This process is applicable to other distributed algebraic operations, such as addition, subtraction, multiplication, multiplication, division, and exponentiation.

[0067] In this embodiment, it is assumed that there are n members participating in the calculation, there is a link between any two members, and assuming that the network delay is negligible, each member has a unique identity ID i , and the identity can be expressed as a positive number x i used for calculations. At the same time, it is assumed that there may be at most t members in the above system that can be controlled by the adversary or have equipment or network failures, and satisfy n≥3t+1.

[0068] In order to realize multi-party computing, it is first necessary to distribute the confidential computing input to each member. Here, a sharing scheme based on t-d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fault tolerant cryptography distributed computing and multiple step testing method which belongs to the distributed computing field. The method comprises: 1) each member carries out the shared operation separately; 2) every member generates stochastic polynomial according to the required access structure and exchanges the datum induced from the stochastic polynomial; 3) every member generates combined stochastic polynomial by the received stochastic polynomial data together; 4) the result of step1) is re-shared by the combined stochastic polynomial and the re-shared result is distributed to every member; 5) each member further combines and reconstructs the receives re-shared data to gains the final result and a new re-share; 6) every member reconstructs the true result by exchanging the new re-share. The invention is a fault-tolerant and high efficient method with protocol safety, solves the problems of mass traffic and low efficiency in traditional algorithm and assures the continuity in secure computation.

Description

Technical field: [0001] The invention relates to a cryptographic distributed computing and step-by-step verification method with fault-tolerant functions, which provides an efficient support for the safe processing of data in a distributed system, especially multi-party safe data processing, and the method It has good fault tolerance; this method can be applied to fields such as fault-tolerant computing, distributed computing, and grid computing. Background technique: [0002] Distributed computing is a new computing method proposed in recent years. The so-called distributed computing means that it is not a single computer that participates in the calculation, but a network composed of multiple computers. These computers share information with each other and cooperate to complete computing tasks. Compared with other algorithms, distributed computing has the following advantages: the dynamic acquisition and sharing of data resources of different types and different regions; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L1/00
Inventor 朱岩王怀习冯荣权邹维
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products