Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure multi-party computing method based on trusted hardware and block chain

A secure multi-party computing and blockchain technology, applied in the field of secure multi-party computing based on trusted hardware and blockchain, can solve the problems of not supporting complex or flexible computing tasks and low efficiency, and achieve high protocol execution efficiency , Computationally efficient and efficient effect

Pending Publication Date: 2021-02-19
TIANYI ELECTRONICS COMMERCE
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first is to only support specific relatively simple calculation functions, and does not support complex or flexible calculation tasks
The second is to support general-purpose computing tasks, but only supports the calculation of a small amount of data due to low efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party computing method based on trusted hardware and block chain
  • Secure multi-party computing method based on trusted hardware and block chain
  • Secure multi-party computing method based on trusted hardware and block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] like Figure 1-4 As shown, the present invention provides a secure multi-party computing method based on trusted hardware and blockchain. The user encrypts the input parameters and inputs them into the trusted execution environment, and the trusted execution environment exchanges data with other participants through the blockchain. After all the inputs are collected, the calculation function is executed in the trusted execution environment and the results are output. The scheme includes four main links: 1. Data input; 2. Data uplink; 3. Data exchange; 4. Calculation output; Taking the ground calculation process as an example, the main process steps are as follows:

[0029] S1. Data input

[0030] like figure 1 As shown in step ①, all participants use the public key of the local trusted execution environment for their input plaintext (for example, the plaintext data required by node P1 is DataPlain) (for example, the public key of the local trusted execution environmen...

comparative approach 1

[0047] A multi-party data sharing method and device ----- CN202010410004.2

[0048] The comparative invention solution provides a multi-party data sharing method and device for sharing data between a rights management platform, a trusted computing unit under a trusted execution environment, a data user, a data provider and a data center.

[0049] In the present invention, block chain is used as trusted data intermediary storage medium, and smart contracts are used to realize trusted data processing. This comparison scheme stores encrypted data in the data center, which is a centralized scheme and cannot handle data securely. The other party's solution adopts a unified authority management platform, which has centralization problems such as single point of failure. The present invention is adapted to the requirements of multi-party secure computing scenarios, and the comparison scheme is not aimed at secure multi-party computing scenarios.

comparative approach 2

[0051] A multi-party privacy computing system based on trusted execution environment ----- CN202010012463.5

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure multi-party computing method based on trusted hardware and a block chain, which comprises the following steps that: a user encrypts input parameters and inputs the encrypted input parameters into a trusted execution environment, the trusted execution environment exchanges data with other participants through the block chain, executes a computing function in the trusted execution environment after collecting all the inputs, and outputs a result; based on the scheme, a plurality of participants can complete data sharing of security privacy under the condition ofprotecting respective data privacy, and finally, a distributed arbitrary multi-party joint computing task is realized. A fair data exchange process of multi-party participants is realized by utilizinga block chain, meanwhile, privacy protection is carried out on data exchange by utilizing an encryption algorithm, and the obtained encrypted data is decrypted and calculated in a trusted computing environment, so that an efficient and safe multi-party computing process is realized.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a secure multi-party computing method based on trusted hardware and block chains. Background technique [0002] The English full name of Secure Multi-Party Computation is Secure Multi-Party Computation, generally abbreviated as MPC, which refers to the realization of multi-party data fusion calculation under the premise of protecting data security and privacy. In the network environment, the participants of a certain task each have their own data, and multiple participants calculate a certain function in a distributed manner through a communication protocol to complete the calculation task. Each participant provides its own input to the calculation function, and the participants get the correct output of the function. At the same time, this process realizes the protection of user privacy data, that is, participants cannot obtain any input information from other users except...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/57
CPCG06F21/57G06F21/602G06F21/606G06F21/6245G06F2221/2107
Inventor 贺伟章庆徐潜单宸范磊严永峰
Owner TIANYI ELECTRONICS COMMERCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products