Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Construction method of division protocol based on cryptology in distributed computation

A distributed computing and construction method technology, applied in key distribution, can solve the problems of network attack defense and countermeasures, and achieve the correctness and legitimacy of the algorithm, and overcome the huge communication volume and low computational complexity Effect

Inactive Publication Date: 2013-05-29
PEKING UNIV
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The use of traditional passive defense technologies such as "plugging loopholes, building high walls, and preventing external attacks" is not very effective in defending and countering network attacks. Therefore, a new security method needs to be adopted to adapt to this new type of distributed network. Calculation mode needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction method of division protocol based on cryptology in distributed computation
  • Construction method of division protocol based on cryptology in distributed computation
  • Construction method of division protocol based on cryptology in distributed computation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The division protocol construction method in the present invention will be further described below in conjunction with specific embodiments and schematic diagrams.

[0045] Under the condition of secure multi-party computing, the traditional computing method is based on the Byzantine consensus agreement, and the communication volume between members is relatively large. Our computing is based on linear secret sharing.

[0046] Linear Sharing and Refactoring: In Domain G q , given a secret value s, the sender randomly selects t-1 (t≤n) random numbers (r 1 , r 2 ,...,r t-1 ), forming the equation f s (x)=s+r 1 x+…+r t-1 x t-1 . For any member P in secure multi-party computation i (where i∈[1,n], n is the total number of members), with identity ID i , then the shared value of the secret s obtained by the member is c i = f s (ID i ). If there are m(m≥t) members who want to share {s 1 ,s 2 ,...,s m} to restore the original secret value s, then we can solve ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a construction method of a division protocol based on cryptology in distributed computation, belonging to the field of information safety. The formation method is characterized in that (1) each member who participates in the computation dependently selects a random number and sends the shared value of the random number to all parties for local hybrid operation so as to obtain a public random shared value; (2) each member randomizes the sharing of an input secret value b by using the public random shared value and reconstructs the randomizing value of the secret value btogether; (3) each member inspects whether a randomizing result of the secret value b is inverse or not, if so, the member solves an inverse element of the randomizing value of the secret value b andthen de-randomizes the inverse element to obtain the inverse sharing of the secret value b by utilizing the public random shared value; (4) each member utilizes the obtained inverse sharing of the secret value b and a sharing executive multiplication protocol of a secret value a to obtain the sharing of the a / b; and (5) each member reconstructs a real computing result by mutually exchanging the obtained sharing of the a / b. The invention has the characteristics of high efficiency, fault tolerance and safety.

Description

Technical field: [0001] The invention relates to a division calculation protocol in secure multi-party computing, which provides efficient support for the safe processing of data in a distributed system, especially secure multi-party data processing, and the method has good security; This method can be applied to fields such as fault-tolerant computing, distributed computing, and network computing. Background technique: [0002] With the rapid development of computer technology and Internet technology, a large number of transactions have gradually changed from the traditional operation mode to the network operation mode, and induced the emergence of some new computing forms. Distributed computing is to combine computer systems with different functions in different regions through the network, and cooperate to complete some complex affairs, so as to avoid cumbersome traffic by using the convenience of the network. This form of computing has been applied in e-commerce, e-gove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 朱岩王怀习赵红佳冯荣权邹维
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products