Non-center dot product computing method achieving privacy protection
A privacy-protecting, central-point technology, applied in computing, digital data protection, computer security devices, etc., can solve problems such as ignoring user input verification, and achieve the effect of ensuring legality and low computational complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.
[0038] Such as figure 1 As shown, the present invention provides a privacy-preserving non-centered dot product calculation method, comprising the following steps:
[0039] S1. The first and second participants are respectively connected with a trusted third party to obtain the certificate corresponding to the privacy vector, the certificate contains the ciphertext of the privacy vector; each participant only needs to connect once before the calculation can start To trust a third party, it is enough to obtain the required privacy vector certificate, and it is no longer necessary to connect the trusted third party in subsequent calculations; and each privacy vector correspo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com