Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and system

A data processing and data technology, applied in the direction of electrical digital data processing, digital data processing parts, digital data protection, etc., can solve problems such as inability to establish connection with data sequence, data sequence leakage, etc.

Pending Publication Date: 2022-05-10
ALIBABA GRP HLDG LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] A technical problem to be solved in this disclosure is to provide a random rearrangement method for secure two-party computing, which can randomly rearrange the data of both parties, and at the same time, neither party can change the order of the rearranged data from the one established before the rearrangement. contact, effectively solving the data sequence leakage problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and system
  • Data processing method and system
  • Data processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0024] In today's data explosion, people's demand for privacy protection is increasing day by day. Secure computing enables people to complete computing tasks while protecting data privacy. Secure computing, the full name of Secure Multi-party Computation (Secure Multi-party Computation, SMC) refers to the realization of multi-party computing under the premise of protecting data security. Multi-party computing, as the name suggests, refers...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and system. The method comprises the following steps: acquiring an encryption result of encrypting a part of data x and a part of data y by a partner; respectively combining the obtained encryption result with the other part of the obtained data x and the other part of the obtained data y; generating operation results obtained by performing operation on the combination results of which the sequences are disrupted and the random numbers, and taking the operation results as disturbance results; and sending the disturbance result to the partner for the partner to decrypt the disturbance result. Then, roles of the two parties are exchanged, and secondary random sorting is carried out; encryption of the own side and the partner is homomorphic encryption, segmentation and operation for the data accord with secret sharing segmentation and operation rules, and therefore after secondary disturbance, processed data which are not aware of the data sequence but still have a secret sharing form are obtained.

Description

technical field [0001] The present disclosure relates to the field of data processing, and in particular to a data processing method and system. Background technique [0002] Secure multi-party computing is a computing protocol in which multiple participants provide input and jointly calculate output. The characteristic of this protocol is that each participant only understands its own input and calculated output, but cannot understand the input of any other participant. For example, the "Millionaire Problem": Two participants each input their own wealth, and finally calculate who has more wealth, and do not know any information about the wealth of the other party. [0003] In the case of cooperation between the two parties, Party A and Party B cannot understand the data content of the other party except for the calculation results. However, in the prior art, the sequence relationship of data will inevitably be leaked. For example, A can know that the first piece of data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F7/58
CPCG06F21/602G06F7/588
Inventor 洪澄
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products