Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-party secure computing method and device, electronic equipment

A secure, multi-party technology, applied in the field of distributed computing, which can solve problems such as malicious algorithm implementation, leakage of private data, and inaccuracy

Active Publication Date: 2020-07-07
ADVANCED NEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the multi-party secure computing algorithm can protect private data, incorrect or even malicious algorithm implementation may still leak private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party secure computing method and device, electronic equipment
  • Multi-party secure computing method and device, electronic equipment
  • Multi-party secure computing method and device, electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] For computing nodes equipped with multi-party secure computing algorithms such as homomorphic encryption and obfuscated circuits, one or more random numbers are usually generated based on the carried random algorithm as a random key, and the generated random key is used to hold the The private data is encrypted and calculated to obtain ciphertext data, and then the calculated ciphertext data is used as calculation parameters and transmitted to other computing nodes participating in multi-party security calculations.

[0076] In practical applications, malicious multi-party security algorithms may use known keys held by other computing nodes participating in multi-party security calculations to encrypt private data held; further, in this way, the ciphertext When the data is sent to other computing nodes participating in multi-party secure computing, other computing nodes can decrypt the ciphertext data based on the known keys they hold, and obtain the private data held by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A multi-party secure computing method, applied to any computing node deployed in a distributed network; the distributed network deploys multiple computing nodes, and the multiple computing nodes jointly participate in multi-party secure computing based on private data held by them ; Wherein, the computing node is connected to a trusted key source; the method includes: obtaining a trusted key from the trusted key source; based on the acquired private data held by the trusted key pair Encrypt to obtain ciphertext data; at least send the ciphertext data as calculation parameters to other computing nodes participating in the multi-party secure computing, so that the other computing nodes can use the data collected by the computing nodes participating in the multi-party secure computing. Computational parameters perform multi-party secure computations.

Description

technical field [0001] One or more embodiments of this specification relate to the field of distributed computing, and in particular to a multi-party secure computing method and device, and electronic equipment. Background technique [0002] Multi-party secure computing is a cryptographic technology. Multiple parties participating in the calculation can perform a multi-party secure computing algorithm based on their own input data to jointly perform secure calculations and obtain a calculation result without disclosing the holding data to other parties. Some input data. [0003] Although multi-party secure computing algorithms can protect private data, incorrect or even malicious algorithm implementations may still leak private data. Ideally, all parties can develop their own multi-party secure computing software, and use their own multi-party secure computing software to participate in multi-party secure computing. However, in practical applications, all parties usually u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/18H04L9/08
CPCH04L9/0894H04L2209/46H04L9/088G06F21/602G06F2221/2101G06F2221/033H04L9/008H04L9/065H04L9/0869
Inventor 李漓春殷山王华忠林文珍
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products