Efficient and safe two-party computing system and computing method based on cooperation

A secure two-party computing and high-efficiency technology, applied in the fields of data security and privacy protection, to resist malicious opponents, improve implementation efficiency, and reduce communication delays

Pending Publication Date: 2021-11-02
BEIHANG UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The communication complexity and computational complexity both reach the level of circuit size. Therefore, the two problems of high communication complexity and high computational complexity are still the bottleneck of the efficiency improvement of the secure two-party computing protocol based on the verifiable obfuscated circuit sharing scheme.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient and safe two-party computing system and computing method based on cooperation
  • Efficient and safe two-party computing system and computing method based on cooperation
  • Efficient and safe two-party computing system and computing method based on cooperation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0037] The cooperation-based efficient and secure two-party computing system and computing method proposed according to the embodiments of the present invention are described below with reference to the accompanying drawings.

[0038] The parameter meanings involved in the present invention are as shown in table 1:

[0039] Table 1

[0040]

[0041]

[0042] Firstly, an efficient and secure two-party computing system based on cooperation proposed according to an embodiment of the present invention will be described with re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient and safe two-party computing system and method based on cooperation, and the system comprises: a function-independent preprocessing module which is used for pre-generating verifiable random bit sharing shares and a label pair set of an input line, which are needed by safe computing, for two communication parties; a function correlation preprocessing module, wherein participants serve as confusion parties respectively, and verifiable confusion circuit sharing shares are generated for the first half circuit and the second half circuit respectively; an input preprocessing module, wherein a calculation side obtains a label set corresponding to a true value masking value form of each input line of the circuit; a circuit analysis module, wherein participants serve as calculation parties in sequence, confusion circuits of a front half circuit and a rear half circuit are recovered and analyzed respectively, and the correctness of circuit calculation is verified; and an output module, wherein the two communication parties obtain the corresponding masking values from the output line labels and recover the output true values. According to the system, circuit calculation correctness and input privacy can be ensured, communication complexity is low, both parties share calculation pressure, safety calculation efficiency is high, and malicious opponents can be resisted.

Description

technical field [0001] The invention relates to the technical field of data security and privacy protection, in particular to an efficient and secure two-party computing system and computing method based on cooperation. Background technique [0002] The Secure Multi-Party Computation protocol (SecureMulti-Party Computation, SMPC) allows each participant to complete joint computing tasks without exposing private data, and solves privacy protection issues by separating data ownership and data usage rights. After years of development, the secure multi-party computing protocol has developed from a theoretical stage to a privacy protection core technology that can be applied to practical scenarios, and is one of the research hotspots in the field of data security. [0003] The secure two-party computing protocol (Two-Party Security Computation, 2PC) realizes the completion of secure computing tasks between two participants. On the one hand, the secure two-party computing protoco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L9/00
CPCG06F21/62H04L9/002H04L2209/12H04L2209/46
Inventor 张宗洋刘翔宇史可心刘建伟
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products