Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure multi-party computing method and device

A technology for secure multi-party computing and computing tasks, which is applied in the field of secure multi-party computing methods and devices, and can solve the problems of high communication complexity, multiple communication rounds, and consumption of large communication resources, so as to save communication resources, reduce the number of interactions, The effect of reducing communication complexity

Active Publication Date: 2019-03-08
BEIJING UNIV OF POSTS & TELECOMM
View PDF17 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of implementing the present invention, the inventors found that the secure multi-party computing system in the prior art has at least the following problems: each time a participant in the secure multi-party computing system performs a multiplication calculation between secret values ​​or a power calculation of a secret value It is necessary to communicate with other participants in the system all the time, resulting in the realization of secure multi-party computing process requiring more communication rounds and high communication complexity
High communication complexity leads to secure multi-party computation process that consumes a lot of communication resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure multi-party computing method and device
  • A secure multi-party computing method and device
  • A secure multi-party computing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] Embodiments of the present invention provide a secure multi-party computing method and device. The concepts involved in the embodiments of the present invention will be described below first.

[0034] Participant: A member who participates in a computing task. A participant can be a device with computing and interaction functions such as a personal computer, server, router, mobile phone, tablet computer, laptop, POS machine, smart appliance or smart car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a secure multi-party computing method and device, and relates to the technical field of information security, and the method is applied to any participant in asecure multi-party computing system, and comprises the following steps of determining an input value required to be submitted for completing a target computing task; randomly generating a secret value, encrypting the input value by using the secret value, and broadcasting the encrypted input value in the system; generating an encryption set corresponding to other participants, and sending the encryption set to the other participants; receiving an encryption input value and an encryption set broadcasted by other participants; based on the encryption input value and the encryption set, calculating to obtain a feedback value; encrypting the feedback value by using public keys of other participants, and sending the encrypted feedback value to the participants; and receiving the encrypted feedback value sent by other participants, and completing the target calculation task based on the encrypted feedback value and the ID of each participant in the system. By applying the scheme provided bythe embodiment of the invention, the communication complexity of secure multi-party calculation can be reduced, and the communication resources are saved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a secure multi-party computing method and device. Background technique [0002] In recent years, with the rapid development of computer networks and communication technologies, information security has become more and more important, and cases of network intrusion, information leakage, and cyber crimes have become more and more destructive. When a computing task requires the participation of multiple participants, in order to protect the information security of each participant, a secure multi-party computing system can be used to complete the computing task. A secure multi-party computing system includes multiple distrusting parties that can jointly complete computing tasks without revealing their respective inputs. Moreover, there is no third party trusted by multiple distrusting parties in the secure multi-party computing system, which completely eliminat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 周李京王励成胡晓雅柏雪
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products