Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-party joint privacy data processing method and device

A technology of privacy data and data parties, which is applied in electronic digital data processing, digital data protection, secure communication devices, etc., can solve problems such as leakage of user privacy data and damage to user interests, so as to protect data privacy and efficiently combine data computing and processing. , the effect of reducing the amount of communication

Active Publication Date: 2021-06-18
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF12 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the original data is directly sent to the model owner for joint processing, it will lead to the leakage of user's private data and damage the user's interests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party joint privacy data processing method and device
  • Multi-party joint privacy data processing method and device
  • Multi-party joint privacy data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0080] In order to protect the data privacy of each data party in the process of joint data processing by multiple parties, this manual provides a multi-key fully homomorphic encryption scheme. According to this scheme, in a distributed scenario involving multiple participants, each participant executes an asymmetric key generation algorithm to generate its own public key and private key. The system aggregates the public keys of each participant to generate a system public key and distributes it to each participant. Data parties holding private data use such a system public key to encrypt their own private data, and broadcast the encrypted ciphertext data. One or several of the parties perform homomorphic operations on the ciphertext data of each data party to obtain the ciphertext operation results. Each participant uses its own private key to partial...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a system for processing private data through combination of multiple parties, the multiple parties comprise a management party and n data parties, and the method comprises the following steps. Each data party encrypts the original privacy data held by the data party by using the system public key and adopting an agreed homomorphic encryption algorithm to obtain corresponding ciphertext data, wherein the system public key is obtained by aggregating n + 1 basic public keys respectively corresponding to multiple parties. And then at least one of the multiple parties performs homomorphic operation on the n parts of ciphertext data according to a preset rule to obtain a ciphertext operation result. And each participant performs partial decryption on the ciphertext operation result by using the private key of the participant to obtain a partial plaintext result. And the management party performs aggregation operation on the plaintext result of each part to obtain a plaintext operation result.

Description

technical field [0001] One or more embodiments of this specification relate to encrypted data processing, and in particular to a method and device for multi-party joint processing of private data. Background technique [0002] In the context of big data, it is often necessary to comprehensively process business data from different data sources. For example, in the merchant classification analysis scenario based on machine learning, the electronic payment platform has the merchant's transaction flow data, the e-commerce platform stores the merchant's sales data, the banking institution has the merchant's loan data, and the model party has the modeling parameter data . For another example, in the scenario where multiple parties conduct user credit analysis, party A holds the deposit data of the user to be analyzed, party B holds the user's transaction data, party C holds the user's social interaction data, and party D holds the data processing model . [0003] In the proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/00H04L29/06
CPCG06F21/6245G06F21/602H04L9/008H04L63/0442
Inventor 张凡王尧何家兴
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products