Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-party safety calculation method and device, and electronic equipment

A computing method and security technology, applied in the field of distributed computing, can solve problems such as leakage of private data, incorrect, malicious algorithm implementation, etc.

Active Publication Date: 2019-01-22
ADVANCED NEW TECH CO LTD
View PDF7 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the multi-party secure computing algorithm can protect private data, incorrect or even malicious algorithm implementation may still leak private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party safety calculation method and device, and electronic equipment
  • Multi-party safety calculation method and device, and electronic equipment
  • Multi-party safety calculation method and device, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] For computing nodes equipped with multi-party secure computing algorithms such as secret sharing and obfuscated circuits, one or more random numbers are usually generated based on the carried random algorithm, and the generated random numbers are used to calculate the private data held to obtain the budget As a result, the generated random number and the above-mentioned calculation results are then used as calculation parameters and transmitted to other calculation nodes participating in the multi-party secure calculation.

[0062] In practical applications, malicious multi-party security algorithms may use private data held by computing nodes participating in multi-party security calculations to construct pseudo-random numbers, and then use the pseudo-random numbers and The calculation results obtained by calculating the private data of the private data are transmitted to other computing nodes participating in the multi-party security calculation; furthermore, in this w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A multi-party secure computing method is applied to any computing node deployed in a distributed network. A plurality of computing nodes are deployed in the distributed network, and the plurality of computing nodes participate in the multi-party secure computing together based on the privacy data held by the plurality of computing nodes respectively; Wherein the computing node is docked with a trusted random source. The method comprises: obtaining a trusted random number from the trusted random source; Calculating the held privacy data based on the obtained trusted random number to obtain an operation result; sending at least the trusted random number as a computational parameter to other computational nodes participating in the multi-party security computation to perform the multi-party security computation by the other computational nodes based on the collected computational parameters sent by each computational node participating in the multi-party security computation.

Description

technical field [0001] One or more embodiments of this specification relate to the field of distributed computing, and in particular to a multi-party secure computing method and device, and electronic equipment. Background technique [0002] Multi-party secure computing is a cryptographic technology. Multiple parties participating in the calculation can perform a multi-party secure computing algorithm based on their own input data to jointly perform secure calculations and obtain a calculation result without disclosing the holding data to other parties. Some input data. [0003] Although multi-party secure computing algorithms can protect private data, incorrect or even malicious algorithm implementations may still leak private data. Ideally, all parties can develop their own multi-party secure computing software, and use their own multi-party secure computing software to participate in multi-party secure computing. However, in practical applications, all parties usually u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245G06F21/71H04L2209/46H04L9/0869H04L9/085G06F7/582H04L9/50
Inventor 李漓春殷山王华忠林文珍
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products