Multi-party security computing all-in-one machine

An all-in-one, secure technology, applied in computing, protection of internal/peripheral computer components, computer security devices, etc., can solve the problems of low computing efficiency, high complexity of multi-party secure computing and communication, and achieve the effect of reducing communication complexity

Pending Publication Date: 2020-11-13
HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Multi-party secure computing is performed on private data through multiple computing devices that do not trust each other, which not only protects private data but also performs data processing on private data. However, the communication complexity of multi-party secure computing in the prior art is very high, resulting in far lower computing efficiency. Due to the needs of users, and the current multi-party secure computing products in the market are based on software implementation, it is impossible to provide users with an integrated multi-party secure computing platform solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party security computing all-in-one machine
  • Multi-party security computing all-in-one machine
  • Multi-party security computing all-in-one machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The implementation of the present application will be described by specific specific examples below, and those skilled in the art can easily understand other advantages and effects of the present application from the content disclosed in this specification.

[0048] In the following description, reference is made to the accompanying drawings, which illustrate several embodiments of the application. It is to be understood that other embodiments may be utilized and compositional and operational changes may be made without departing from the spirit and scope of the present disclosure. The following detailed description should not be considered limiting, and the scope of the embodiments of the present application is defined only by the patent claims of the present application. The terminology used herein is for describing particular embodiments only and is not intended to limit the application.

[0049] Furthermore, as used herein, the singular forms "a", "an" and "the" ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-party secure computing all-in-one machine. The all-in-one machine comprises a plurality of computing devices, wherein each computing device is configured in an untrustedcomputing system architecture, a multi-party security computing protocol is preset in each computing device, and when a multi-party security computing instruction is received, the multi-party security computing protocol and at least another computing device execute multi-party security computing based on the multi-party security computing protocol and the obtained scattered ciphertext. Accordingto the all-in-one machine, an integrated multi-party security computing platform is provided for users, and a problem of high computing communication complexity of multi-party security computing in the prior art is solved.

Description

technical field [0001] The present application relates to the technical field of data security processing, in particular to a multi-party secure computing all-in-one computer. Background technique [0002] As big data is shared between enterprises, between enterprises and individuals, and between individuals, some private data, such as bank credit ratings, personal identity information, financial transaction information, etc., will be leaked along with the data business. As user behavior and habits are collected digitally, users / companies pay more and more attention to privacy data. Therefore, data sharing business and private data confidentiality have become an increasingly prominent contradiction. [0003] In the prior art, when a computing task requires the joint participation of multiple computing devices, in order to protect the information security of each computing device, each computing device can complete the computing task through multi-party secure computing. Mu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/71G06F21/62
CPCG06F21/71G06F21/6245
Inventor 王蜀洪西方
Owner HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products