CN115834064B - Secure multi-party computing method, device, system, equipment and storage medium - Google Patents

Secure multi-party computing method, device, system, equipment and storage medium Download PDF

Info

Publication number
CN115834064B
CN115834064B CN202310157442.6A CN202310157442A CN115834064B CN 115834064 B CN115834064 B CN 115834064B CN 202310157442 A CN202310157442 A CN 202310157442A CN 115834064 B CN115834064 B CN 115834064B
Authority
CN
China
Prior art keywords
data
blind
aggregator
public key
user side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310157442.6A
Other languages
Chinese (zh)
Other versions
CN115834064A (en
Inventor
沈亮
宣东海
余晗
郝庆利
于卓
门进宝
何东
张澄心
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Big Data Center Of State Grid Corp Of China
State Grid Information and Telecommunication Co Ltd
Beijing China Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Big Data Center Of State Grid Corp Of China
State Grid Information and Telecommunication Co Ltd
Beijing China Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Big Data Center Of State Grid Corp Of China, State Grid Information and Telecommunication Co Ltd, Beijing China Power Information Technology Co Ltd, Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd filed Critical Big Data Center Of State Grid Corp Of China
Priority to CN202310157442.6A priority Critical patent/CN115834064B/en
Publication of CN115834064A publication Critical patent/CN115834064A/en
Application granted granted Critical
Publication of CN115834064B publication Critical patent/CN115834064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a safe multiparty computing method, a device, a system, equipment and a storage medium, wherein the method comprises the following steps: the target aggregator performs blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data and sends each initial blind data to the computing server, the public key of each user side is calculated and acquired by the user side based on a public parameter set generated by the computing server, the computing server performs ciphertext conversion on each initial blind data based on a main key and an aggregation public key to acquire a plurality of encrypted blind data, the target aggregator performs blind value removing processing on each encrypted blind data to acquire a plurality of encrypted data, the computing server performs safe multi-party calculation on each encrypted data based on a random number and the public key of each user side to acquire a plurality of calculation results, and the target aggregator issues the calculation results. The invention improves the data privacy protection safety and improves the data sharing efficiency.

Description

Secure multi-party computing method, device, system, equipment and storage medium
Technical Field
The present invention relates to the technical field of data privacy protection, and in particular, to a secure multiparty computing method, apparatus, system, device, and storage medium.
Background
A Secure Multi-Party computing (SMPC) architecture is proposed for solving the privacy protection problem in the data sharing process. Because the traditional SMPC architecture is prone to generate a risk of data leakage due to a single point fault, the prior art mainly integrates a blockchain technology and an SMPC structure, so that the single point fault is avoided by using the characteristics of blockchain consistency, immobility and traceability.
However, under the existing SMPC architecture based on the block chain, the key and the ciphertext are stored and managed by each user side or component, which results in that the key and the ciphertext required for secure multi-party computation need to be frequently interacted between the user sides and between the user side and the component when performing the secure multi-party computation, so that the complexity of the interaction scheme of the SMPC architecture is increased, and further the data sharing efficiency is reduced. Therefore, how to improve the data sharing efficiency while ensuring the security of data privacy protection becomes an urgent problem to be solved.
Disclosure of Invention
Embodiments of the present invention provide a secure multiparty computing method, apparatus, system, device, and storage medium, so as to achieve the purpose of improving data privacy protection security and improving data sharing efficiency. The specific technical scheme is as follows:
a secure multi-party computing method applied to a target aggregator in a group of aggregators included in a secure multi-party computing system, the secure multi-party computing system further including a computing server and a plurality of clients, the method comprising:
the target aggregator performs blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data, and sends each initial blind data to a computing server so that the computing server performs ciphertext conversion on each initial blind data based on a master key and an aggregation public key, wherein the public key of each user side and the ciphertext data have a corresponding relationship, the public key of each user side is acquired by the computing server through computation based on a public parameter set generated by the computing server, the target aggregator is any aggregator in the aggregator group, the master key is acquired by the computing server through computation based on the public parameter set, and the aggregation public key is a key acquired by the computing server after the public key of each user side is aggregated;
the target aggregator obtains a plurality of encrypted blind data generated by the computation server through the ciphertext conversion, and performs blindness removing value processing on each encrypted blind data to obtain a plurality of encrypted data;
and the target aggregator sends each encrypted data to the computing server so that the computing server performs secure multi-party computation on each encrypted data based on the random number and the public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relation with the encrypted data.
Optionally, the target aggregator performs blind processing on each obtained ciphertext data respectively based on the random blind value and the public key of each user side to obtain a plurality of initial blind data, including:
by the formula Blind (m) i )=F(m i ,En pki (v) Obtaining the initial Blind data Blind (m) corresponding to the ciphertext data generated by the ith user side i ) Wherein, said m i The ciphertext data generated for the ith user side, v is the random blind value, en pki (v) And F is a logic gate in the homomorphic cryptosystem, and is a numerical value obtained by encrypting the random blind value v by using the public key of the ith user side.
Optionally, the process of obtaining the ciphertext data includes:
and the target aggregator downloads a plurality of ciphertext data corresponding to the data type identifier from a target block chain node according to the data type identifier in the data acquisition request, wherein the ciphertext data is generated by the user side and uploaded to the data in the block chain node through any aggregator in the aggregator group.
A secure multi-party computing device for use in a target aggregator in a group of aggregators included in a secure multi-party computing system, the secure multi-party computing system further including a computing server and a plurality of user terminals, the device comprising:
the blind processing module is used for performing blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data, and sending each initial blind data to a computing server so that the computing server performs ciphertext conversion on each initial blind data based on a master key and a aggregation public key, wherein the public key of each user side and the ciphertext data have a corresponding relation, the public key of each user side is acquired by the computing server through calculation based on a public parameter set generated by the computing server, the target aggregator is any aggregator in the aggregator group, the master key is acquired by the computing server through calculation based on the public parameter set, and the aggregation public key is a key acquired by the computing server through aggregation of the public keys of the user sides;
the conversion module is used for obtaining a plurality of encrypted blind data generated by the calculation server through the ciphertext conversion, and performing blind value removal processing on each encrypted blind data to obtain a plurality of encrypted data;
and the sending module is used for sending each encrypted data to the computing server so that the computing server performs secure multi-party computation on each encrypted data based on the random number and the public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relation with the encrypted data.
Optionally, the blind processing module performs blind processing on each obtained ciphertext data based on the random blind value and the public key of each user side, and is set to perform blind processing when obtaining a plurality of initial blind data:
by the formula Blind (m) i )=F(m i ,En pki (v) Obtaining the initial Blind data Blind (m) corresponding to the ciphertext data generated by the ith user side i ) Wherein, said m i The ciphertext data generated for the ith user side, v is the random blind value, en pki (v) And F is a logic gate in the homomorphic cryptosystem, and is a numerical value obtained by encrypting the random blind value v by using the public key of the ith user side.
Optionally, the blind processing module is configured to, when obtaining the ciphertext data:
and the blind processing module downloads a plurality of ciphertext data corresponding to the data type identifier from a target block chain node according to the data type identifier in the data acquisition request, wherein the ciphertext data is generated by the user side and is uploaded to the data in the block chain node through any aggregator in the aggregator group.
A secure multi-party computing method applied to a computing server included in a secure multi-party computing system, the secure multi-party computing system further including an aggregator group and a plurality of user terminals, the method comprising:
the computing server performs ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, wherein the initial blind data is obtained by the target aggregator through performing blind processing on the obtained ciphertext data based on a random blind value and a public key of each user side, the public key of each user side and the ciphertext data have a corresponding relationship, the public key of each user side is obtained by the user side through computation based on a public parameter group generated by the computing server, the target aggregator is any aggregator in the aggregator, the master key is obtained by the computing server through computation based on the public parameter group, and the aggregation public key is obtained by the computing server through aggregation of the public keys of the user sides;
the computing server sends each encrypted blind data to the target aggregator, so that the target aggregator performs blind value removing processing on each encrypted blind data to generate a plurality of encrypted data;
the computing server obtains the plurality of encrypted data sent by the target aggregator, and performs secure multi-party computing on each encrypted data respectively based on a random number and a public key of each user side to obtain a plurality of computing results, wherein the public key of the user side and the encrypted data have a corresponding relationship.
Optionally, the performing, by the computing server, ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator group based on the master key and the aggregation public key to obtain a plurality of encrypted blind data includes:
the computing server decrypts the initial blind data by using the master key respectively to obtain a plurality of decrypted blind data;
and the computing server encrypts each decrypted blind data by using the aggregation public key respectively to obtain a plurality of encrypted blind data.
A secure multi-party computing device for use with a computing server included in a secure multi-party computing system, the secure multi-party computing system further including an aggregator group and a plurality of user terminals, the device comprising:
a conversion module, configured to perform ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator group based on a master key and an aggregation public key to obtain multiple encrypted blind data, where the initial blind data is obtained by the target aggregator performing blind processing on the obtained ciphertext data based on a random blind value and a public key of each user side, the public key of the user side and the ciphertext data have a corresponding relationship, the public key of the user side is obtained by the user side through calculation based on a public parameter group generated by the calculation server, the target aggregator is any one aggregator in the aggregator group, the master key is obtained by the calculation server through calculation based on the public parameter group, and the aggregation public key is obtained by the calculation server through aggregation of the public keys of the user sides;
the transmitting module is used for transmitting each encrypted blind data to the target aggregator so that the target aggregator performs blind value removing processing on each encrypted blind data to generate a plurality of encrypted data;
and the calculation module is used for obtaining the plurality of encrypted data sent by the target aggregator, and performing secure multi-party calculation on each encrypted data based on the random number and the public key of each user side to obtain a plurality of calculation results, wherein the public key of the user side has a corresponding relationship with the encrypted data.
Optionally, the conversion module performs ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator group based on the master key and the aggregation public key, and is configured to, when obtaining multiple encrypted blind data:
the conversion module decrypts each initial blind data by using the master key to obtain a plurality of decrypted blind data;
and the conversion module encrypts each decrypted blind data by using the aggregation public key respectively to obtain a plurality of encrypted blind data.
A secure multi-party computing system, the system comprising: an aggregator group, a computing server and a plurality of user terminals,
the target aggregator performs blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data, and sends each initial blind data to the computing server, wherein the public key of the user side and the ciphertext data have a corresponding relation, the public key of the user side is calculated and acquired by the user side based on a public parameter set generated by the computing server, and the target aggregator is any aggregator in the aggregator group;
the computing server performs ciphertext conversion on each initial blind data based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, wherein the master key is obtained by the computing server through computing based on the public parameter group, and the aggregation public key is obtained by the computing server after aggregation of public keys of the user sides;
the target aggregator performs blind value removing processing on each encrypted blind data to obtain a plurality of encrypted data, and sends each encrypted data to the computing server;
the computing server respectively carries out safe multi-party computation on each encrypted data based on a random number and a public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relation with the encrypted data;
and the target aggregator acquires each calculation result sent by the calculation server and publishes the result of each calculation result.
A secure multi-party computing device, the device comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the secure multi-party computing method as described in any of the above.
A computer readable storage medium having instructions that, when executed by a processor of a secure multi-party computing device, enable the secure multi-party computing device to perform a secure multi-party computing method as described in any above.
The safe multi-party computing method, the device, the system, the equipment and the storage medium provided by the embodiment of the invention can carry out data synchronization of the block chain and assist safe multi-party computing by configuring the target aggregator, so that compared with the prior art, the scheme omits multi-party data interaction, completes safe multi-party computing by interaction between the target aggregator and the computing server, and simplifies the interaction scheme. Meanwhile, the target aggregator is arranged to perform blind processing on the ciphertext data, so that the risk that the data are leaked and cracked due to the fact that the computing server is attacked by a network can be avoided. And the computing server is configured to generate the master key based on the public parameter group, so that the initial blind data is decrypted without acquiring a public key of the user side, the security of data privacy protection is improved, and the interaction scheme is simplified. Finally, the calculation server is arranged to carry out ciphertext conversion on each initial blind data, so that the calculation result of each encrypted data after subsequent safe multi-party calculation can be decrypted by the public key of any user side, and the specific content of the ciphertext data cannot be exposed. Therefore, the invention improves the data sharing efficiency while improving the data privacy protection safety.
Of course, it is not necessary for any product or method of practicing the invention to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a secure multi-party computing method according to an embodiment of the present invention;
FIG. 2 is a flow diagram of another secure multiparty computing method according to an embodiment of the invention;
FIG. 3 is a block diagram of a secure multi-party computing system provided in accordance with an alternate embodiment of the present invention;
FIG. 4 is a block diagram of a secure multi-party computing device provided in accordance with another alternative embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a secure multi-party computing method, as shown in fig. 1, which is applied to a target aggregator in an aggregator group included in a secure multi-party computing system, where the secure multi-party computing system further includes a computing server and a plurality of clients, and the secure multi-party computing method includes:
s101, the target aggregator performs blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data, and sends each initial blind data to the computing server so that the computing server performs ciphertext conversion on each initial blind data based on a main key and an aggregation public key, wherein the public key of each user side and the ciphertext data have a corresponding relation, the public key of each user side is acquired by the user side through computation based on a public parameter set generated by the computing server, the target aggregator is any aggregator in an aggregator group, the main key is acquired by the computing server through computation based on the public parameter set, and the aggregation public key is an acquired by the computing server after the public keys of each user side are aggregated.
It should be noted that, in an actual application scenario, the secure multiparty computing system provided in the present invention is a method applied to a block chain based SMPC architecture. The block chain is composed of an aggregator group comprising a plurality of aggregators and a plurality of user terminals, and the computing server and the aggregator group form an SMPC architecture.
Optionally, in an optional embodiment of the present invention, the target aggregator may be a server for performing data synchronization, maintaining a block chain, and assisting a computing server in performing secure multi-party computing. In the prior art, the key and the ciphertext for secure multiparty computation are managed by the user side, and frequent key and ciphertext interaction is required among different user sides and between the user side and other components during secure multiparty computation, which leads to the increase of complexity of an interaction scheme under the existing SMPC architecture. In the scheme, the target aggregator is configured to perform data synchronization of the block chain and assist safe multi-party calculation, so that compared with the prior art, the scheme omits multi-party data interaction, and completes safe multi-party calculation through interaction between the target aggregator and the calculation server, thereby simplifying an interaction scheme and improving the efficiency of safe multi-party calculation.
Optionally, in another optional embodiment of the present invention, the Blind processing may be an operation of performing secondary encryption on the ciphertext data by using a random Blind value and a public key of each user side by using a Blind Signature (Blind Signature) technology by the target aggregator. Due to blind processing, secondary encryption can be realized under the condition that a signing party cannot identify data content. Therefore, the target aggregator is arranged to perform blind processing on the ciphertext data, so that the risk that the data is leaked and cracked due to the fact that the computing server is attacked by the network can be avoided, and the data privacy protection safety is improved.
It should be noted that, in an actual application scenario, the random blind value may be a parameter automatically generated by a blind signature algorithm deployed in the aggregator.
Those skilled in the art will appreciate that in an actual application scenario, the determination of the target aggregator may be implemented by configuring an election mechanism, such as distributed application coordination service software (zookeeper), kafka cluster, redis cluster, and the like. The present invention does not make much limitation and description on the specific embodiments of the election mechanism.
It should be noted that, in an actual application scenario, since the target aggregator is randomly selected from the aggregator group by an election mechanism, there is uncertainty. Therefore, the risk that a malicious aggregator deduces and breaks the key to cause data leakage is avoided.
It will be understood by those skilled in the art that, in a practical application scenario, the process of generating the public parameter set by the computing server and computing the master key based on the public parameter set may be implemented based on the ElGamal encryption algorithm. The invention does not excessively limit and describe the specific calculation process.
It should be noted that, in an actual application scenario, because the key pairs for data encryption in the existing SMPC architecture are all generated by the user side, the user side needs to send its public key to the corresponding component when the existing SMPC architecture performs secure multiparty computation, which not only increases the risk of data theft, but also increases the complexity of the interaction scheme. Therefore, the invention generates the master key based on the public parameter group by configuring the computing server, so as to decrypt the initial blind data without obtaining the public key of the user end, thereby improving the security of data privacy protection, simplifying the interaction scheme and improving the efficiency of subsequent secure multi-party computation.
It should be noted that, in an actual application scenario, because the ciphertext data uploaded by the user side is encrypted based on respective public keys, the initial blind data can only be decrypted by the master key generated based on the public parameter set and the public key of the user side that uploads the ciphertext data corresponding to the initial blind data. And other clients cannot decrypt the same by using their own public keys. And due to the homomorphic mechanism, the data to be encrypted needs to be encrypted by the uniform key. Therefore, the invention can decrypt the calculation result of each encrypted data after subsequent safe multi-party calculation by the public key of any user end without exposing the concrete content of the encrypted data through the cryptograph conversion. The safety of data privacy protection is improved.
It will be understood by those skilled in the art that the above-mentioned process of obtaining the aggregation public key can be implemented by a signature aggregation (Boneh-Lynn-Shacham, BLS) algorithm. The invention does not limit and describe the specific construction and use process of the signature aggregation algorithm.
It should be noted that, in an actual application scenario, the computing server is a server deployed with a secure multiparty computing algorithm based on a homomorphic encryption mechanism.
S102, the target aggregator obtains a plurality of encrypted blind data generated by the computation server through ciphertext conversion, and performs blindness removing value processing on each encrypted blind data to obtain a plurality of encrypted data.
It should be noted that, in an actual application scenario, because each initial blind data is subjected to blind processing, after the computing server decrypts the initial blind data by using the master key, only the decrypted blind data is obtained, and the specific content of the ciphertext data cannot be clarified.
It should be noted that, in an actual application scenario, the Blind value removing processing may be implemented by removing a random Blind value through a reverse Blind Signature (Blind Signature) technology. The reverse implementation process of the blind value removing processing is not limited and described in detail.
According to the invention, through the blind processing and the blind value removing processing, the risk of data leakage caused by the fact that the computing server receives network attack can be avoided while normal data circulation is realized, and the risk that the computing server per se steals private data is avoided. The data privacy protection safety is improved.
S103, the target aggregator sends the encrypted data to the computing server, so that the computing server performs secure multi-party computation on the encrypted data based on the random numbers and the public keys of the user sides to obtain a plurality of computation results, wherein the public keys of the user sides and the encrypted data have corresponding relations.
It can be understood by those skilled in the art that the process of the computing server performing Secure Multi-Party Computation on each encrypted data based on the random number and the public key of each user end to obtain a plurality of Computation results can be implemented based on the Computation process of the existing Secure Multi-Party Computation (SMPC), and the specific implementation of this step is not limited and described in detail in the present invention.
Optionally, in an optional embodiment of the present invention, after the computation server obtains the computation result, the encryption sharing processing may be performed, and the processed computation result may be uploaded to the block chain through the target aggregator, so that the user side downloads and reads the computation result. The specific process of analyzing and encrypting may be:
the computing server selects a plurality of random numbers d for each user terminal i And encrypting and sharing the calculation result C by using the public key pk1 of each user end, wherein the encryption process can be carried out by a formula C' = En pk1 (d 1 +…+ d n +C)= En pk1 (d 1 )×…×En pk1 (d n )×En pk1 (C) And obtaining the encrypted data C', wherein the content of the calculation result C is encrypted by the aggregate public key, and the encryption process can be directly performed on the ciphertext encrypted by the aggregate public key through the formula according to the homomorphic encryption characteristic.
It should be noted that, in an actual application scenario, after obtaining the plurality of calculation results, the target aggregator may upload the calculation results to the block chain, so that each user end downloads and uses the calculation results.
The invention carries out data synchronization of the block chain and assists safe multiparty computation by configuring the target aggregator, so that compared with the prior art, the scheme omits multiparty data interaction, and completes safe multiparty computation by interaction between the target aggregator and the computation server, thereby simplifying the interaction scheme. Meanwhile, the target aggregator is arranged to perform blind processing on the ciphertext data, so that the risk that the data are leaked and cracked due to the fact that the computing server is attacked by a network can be avoided. And the computing server is configured to generate the master key based on the public parameter group, so that the initial blind data is decrypted without obtaining a public key of the user side, the security of data privacy protection is improved, and the interaction scheme is simplified. Finally, the calculation server is arranged to carry out ciphertext conversion on each initial blind data, so that the calculation result of each encrypted data after subsequent safe multi-party calculation can be decrypted by the public key of any user side, and the specific content of the ciphertext data cannot be exposed. Therefore, the method and the device improve the data sharing efficiency while improving the data privacy protection safety.
Optionally, the target aggregator performs blind processing on each obtained ciphertext data based on the random blind value and the public key of each user side, to obtain a plurality of initial blind data, including:
by the formula Blind (m) i )=F(m i ,En pki (v) Obtain initial Blind data Blind (m) corresponding to the ciphertext data generated by the ith user side i ) Wherein m is i For ciphertext data generated by the ith user side, v is a random blind value, en pki (v) F is a logic gate in the homomorphic cryptosystem, and is a value obtained by encrypting the random blind value v by using the public key of the ith user side.
Optionally, the obtaining process of the ciphertext data includes:
and the target aggregator downloads a plurality of ciphertext data corresponding to the data type identifiers from the target block chain node according to the data type identifiers in the data acquisition request, wherein the ciphertext data are generated by the user side and uploaded to the data in the block chain node through any aggregator in the aggregator group.
Optionally, in an optional embodiment of the present invention, the data obtaining request may be a request sent by a user side.
Optionally, in another optional embodiment of the present invention, the generating process of the ciphertext data may be:
the user end obtains the public parameter group and passes through the formula pk = g a modN 2 Obtaining a public key pk of the user side, wherein g and N are parameters in the public parameter group, and a is a private key of the user side;
the user side encrypts the data by using the public key pk to obtain ciphertext data.
Corresponding to the above method embodiment shown in fig. 1, the present invention further provides a secure multi-party computing device, applied to a target aggregator in an aggregator group included in a secure multi-party computing system, where the secure multi-party computing system further includes a computing server and a plurality of clients, and the device includes:
the blind processing module is used for respectively carrying out blind processing on each obtained ciphertext data based on a random blind value and a public key of each user side to obtain a plurality of initial blind data, and sending each initial blind data to the computing server so as to enable the computing server to carry out ciphertext conversion on each initial blind data based on a main key and an aggregation public key, wherein the public key of each user side and the ciphertext data have a corresponding relation, the public key of each user side is obtained by computing the user side based on a public parameter group generated by the computing server, the target aggregator is any aggregator in the aggregator group, the main key is obtained by computing the computing server based on the public parameter group, and the aggregation public key is obtained by aggregating the public keys of each user side by the computing server;
the conversion module is used for obtaining a plurality of encrypted blind data generated by the calculation server through ciphertext conversion, and performing blind value removal processing on each encrypted blind data to obtain a plurality of encrypted data;
and the sending module is used for sending each encrypted data to the computing server so that the computing server performs safe multi-party computation on each encrypted data based on the random number and the public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relation with the encrypted data.
Optionally, the blind processing module performs blind processing on each obtained ciphertext data based on the random blind value and the public key of each user side, and is set to perform blind processing when obtaining a plurality of initial blind data: by the formula Blind (m) i )=F(m i ,En pki (v) Obtain initial Blind data Blind (m) corresponding to the ciphertext data generated by the ith user side i ) Wherein m is i Generating ciphertext data for the ith user end, v being a random blind value, en pki (v) F is a logic gate in the homomorphic cryptosystem, and is a value obtained by encrypting the random blind value v by using the public key of the ith user side.
Optionally, the blind processing module is configured to, when obtaining the ciphertext data:
and downloading a plurality of ciphertext data corresponding to the data type identifications from the target block chain node according to the data type identifications in the data acquisition request, wherein the ciphertext data are generated by the user side and uploaded to the data in the block chain node through any aggregator in the aggregator group.
An embodiment of the present invention further provides a secure multiparty computing method, as shown in fig. 2, which is applied to a computing server included in a secure multiparty computing system, where the secure multiparty computing system further includes an aggregator group and a plurality of clients, and the secure multiparty computing method includes:
the method includes the steps that S201, a calculation server conducts ciphertext conversion on each initial blind data sent by a target aggregator in an aggregator group based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, wherein the initial blind data are obtained by conducting blind processing on the obtained ciphertext data by the target aggregator based on a random blind value and a public key of each user side, the public key of each user side and the ciphertext data have a corresponding relation, the public key of each user side is obtained by calculating the public parameter group generated by the calculation server by the user side, the target aggregator is any aggregator in the aggregator group, the master key is obtained by calculating the public key by the calculation server based on the public parameter group, and the aggregation public key is obtained by polymerizing the public keys of each user side by the calculation server.
S202, the calculation server sends each encrypted blind data to the target aggregator, so that the target aggregator performs blind value removing processing on each encrypted blind data to generate a plurality of encrypted data.
S203, the computing server obtains a plurality of encrypted data sent by the target aggregator, and performs secure multi-party computing on each encrypted data respectively based on the random number and the public key of each user side to obtain a plurality of computing results, wherein the public key of the user side has a corresponding relationship with the encrypted data.
It should be noted that, in an actual application scenario, the computing server is a server deployed with a secure multiparty computing algorithm based on a homomorphic encryption mechanism.
Optionally, the performing, by the computing server, ciphertext conversion on each initial blind data sent by a target aggregator in an aggregator group based on a master key and an aggregation public key to obtain a plurality of encrypted blind data includes:
the computing server decrypts the initial blind data respectively by using the master key to obtain a plurality of decrypted blind data;
and the computing server encrypts each decrypted blind data by using the aggregation public key to obtain a plurality of encrypted blind data.
It should be noted that, in an actual application scenario, the process of the computation server decrypting each initial blind data by using the master key may be implemented based on the existing decryption process of ElGamal. As will be understood by those skilled in the art, the following formulas in the decryption process are all required by the decryption process of ElGamal. The decryption process may be:
set the ith initial Blind data to Blind (m) i ) Setting a message space Z n . Randomly selecting r ∈ Z n 2 And are used in combination (A) i ,B i ) Initial blind data is defined.
A i Can be represented by formula A i =g r modN 2 And then carrying out the expression; b i Can be represented by formula B i =h r (1+ Blind(m i )N)mod N 2 And g and h are both generators generated by the ElGamal cryptosystem, and are both cyclic combinations of quadratic residue moduli, and N is a security prime number modulus of a bit length k generated by the computing server based on the ElGamal cryptosystem.
The decryption process can be represented by the formula a mod N = (h) p’q’ -1 mod N 2 )/N·k -1 mod N, obtaining a mod N, wherein p 'and q' are prime numbers randomly selected under an ElGamal cryptosystem.
In the same way, by the formula r mod N = (A) i p’q’ -1 mod N 2 )/N·k -1 mod N, r mod N is obtained.
Finally, by the formula deblindind (m) i )={[(B i /g rp’q’ ]-1 mod N 2 The blind data deBlind (m) after decryption is obtained i )。
Corresponding to the above method embodiment shown in fig. 2, the present invention further provides a secure multi-party computing device, which is applied to a computing server included in a secure multi-party computing system, wherein the secure multi-party computing system further includes an aggregator group and a plurality of user terminals, and the secure multi-party computing device includes:
the conversion module is used for carrying out ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator group based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, wherein the initial blind data are obtained by blindly processing the obtained ciphertext data based on a random blind value and a public key of each user side by the target aggregator, the public key of each user side and the ciphertext data have a corresponding relation, the public key of each user side is obtained by calculating the public parameter group generated by the user side based on a calculation server, the target aggregator is any aggregator in the aggregator group, the master key is obtained by calculating the public key by the calculation server based on the public parameter group, and the aggregation public key is obtained by polymerizing the public keys of each user side by the calculation server;
the transmitting module is used for transmitting each encrypted blind data to the target aggregator so that the target aggregator performs blind value removing processing on each encrypted blind data to generate a plurality of encrypted data;
the computing module is used for obtaining a plurality of encrypted data sent by the target aggregator, and respectively performing secure multi-party computing on each encrypted data based on the random number and the public key of each user side to obtain a plurality of computing results, wherein the public key of the user side has a corresponding relationship with the encrypted data.
Optionally, the conversion module performs ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator group based on the master key and the aggregation public key, and is set to perform ciphertext conversion when obtaining a plurality of encrypted blind data:
the conversion module respectively decrypts each initial blind data by using the master key to obtain a plurality of decrypted blind data;
and the conversion module encrypts each decrypted blind data by using the aggregated public key to obtain a plurality of encrypted blind data.
An embodiment of the present invention further provides a secure multi-party computing system, as shown in fig. 3, the secure multi-party computing system includes: an aggregator group 301, a compute server 302 and a plurality of clients 303,
the target aggregator 304 performs blind processing on each obtained ciphertext data respectively based on the random blind value and the public key of each user side to obtain a plurality of initial blind data, and sends each initial blind data to the computation server 302, wherein the public key of the user side and the ciphertext data have a corresponding relationship, the public key of the user side is obtained by the computation of the user side 303 based on the public parameter set generated by the computation server 302, and the target aggregator 304 is any aggregator in the aggregator group 301;
the computation server 302 performs ciphertext conversion on each initial blind data based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, wherein the master key is obtained by the computation server 302 based on the public parameter group, and the aggregation public key is obtained by the computation server 302 after aggregating the public keys of the user sides;
the target aggregator 304 performs blind value removal processing on each encrypted blind data to obtain a plurality of encrypted data, and sends each encrypted data to the calculation server 302;
the computing server 302 performs secure multi-party computation on each encrypted data based on the random number and the public key of each user side to obtain multiple computation results, wherein the public key of the user side has a corresponding relationship with the encrypted data;
the target aggregator 304 obtains each calculation result sent by the calculation server 302, and publishes each calculation result.
An embodiment of the present invention further provides a secure multi-party computing device, as shown in fig. 4, the secure multi-party computing device includes:
a processor 401;
a memory 402 for storing instructions executable by the processor 401;
wherein processor 401 is configured to execute instructions to implement any of the secure multi-party computing methods described above.
Embodiments of the present invention also provide a computer-readable storage medium, which when executed by a processor of a secure multi-party computing device, enables the secure multi-party computing device to perform any of the secure multi-party computing methods described above.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a device includes one or more processors (CPUs), memory, and a bus. The device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), including at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional identical elements in the process, method, article, or apparatus comprising the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on differences from other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above are merely examples of the present invention, and are not intended to limit the present invention. Various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.

Claims (10)

1. A secure multi-party computing method applied to a target aggregator in an aggregator group included in a secure multi-party computing system, the secure multi-party computing system further including a computing server and a plurality of clients, the method comprising:
the target aggregator performs blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data, and sends each initial blind data to the computing server so that the computing server performs ciphertext conversion on each initial blind data based on a master key and an aggregation public key, wherein the public key of each user side and the ciphertext data have a corresponding relation, the public key of each user side is acquired by the computing server through computation based on a public parameter set generated by the computing server, the target aggregator is any aggregator in the aggregator group, the master key is acquired by the computing server through computation based on the public parameter set, and the aggregation public key is a key acquired by the computing server through aggregation of the public keys of the user sides;
the target aggregator obtains a plurality of encrypted blind data generated by the computation server through the ciphertext conversion, and performs blindness removing value processing on each encrypted blind data to obtain a plurality of encrypted data;
and the target aggregator sends each encrypted data to the computing server so that the computing server performs secure multi-party computation on each encrypted data based on the random number and the public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relation with the encrypted data.
2. The method according to claim 1, wherein the target aggregator performs blind processing on each obtained ciphertext data respectively based on the random blind value and a public key of each user side to obtain a plurality of initial blind data, including:
by the formula Blind (m) i )=F(m i ,En pki (v) Obtaining the initial Blind data Blind (m) corresponding to the ciphertext data generated by the ith user side i ) Wherein, said m i The ciphertext data generated for the ith user side, v is the random blind value, en pki (v) And F is a value obtained by encrypting the random blind value v by using the public key of the ith user side, and is a logic gate in the homomorphic cryptosystem.
3. The method of claim 1, wherein the obtaining of the ciphertext data comprises:
and the target aggregator downloads a plurality of ciphertext data corresponding to the data type identifier from a target block chain node according to the data type identifier in the data acquisition request, wherein the ciphertext data is generated by the user side and uploaded to the data in the block chain node through any aggregator in the aggregator group.
4. A secure multi-party computing device for use in a target aggregator in a group of aggregators included in a secure multi-party computing system, the secure multi-party computing system further including a computing server and a plurality of clients, the device comprising:
the blind processing module is used for performing blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data, and sending each initial blind data to a computing server so that the computing server performs ciphertext conversion on each initial blind data based on a master key and a aggregation public key, wherein the public key of each user side and the ciphertext data have a corresponding relation, the public key of each user side is acquired by the computing server through calculation based on a public parameter set generated by the computing server, the target aggregator is any aggregator in the aggregator group, the master key is acquired by the computing server through calculation based on the public parameter set, and the aggregation public key is a key acquired by the computing server through aggregation of the public keys of the user sides;
the conversion module is used for obtaining a plurality of encrypted blind data generated by the calculation server through the ciphertext conversion, and performing blind value removal processing on each encrypted blind data to obtain a plurality of encrypted data;
and the sending module is used for sending each encrypted data to the computing server so that the computing server performs secure multi-party computation on each encrypted data based on the random number and the public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relation with the encrypted data.
5. A secure multi-party computing method applied to a computing server included in a secure multi-party computing system, the secure multi-party computing system further including an aggregator group and a plurality of user terminals, the method comprising:
the computing server performs ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, wherein the initial blind data is obtained by the target aggregator through performing blind processing on the obtained ciphertext data based on a random blind value and a public key of each user side, the public key of each user side and the ciphertext data have a corresponding relationship, the public key of each user side is obtained by the user side through computation based on a public parameter group generated by the computing server, the target aggregator is any aggregator in the aggregator, the master key is obtained by the computing server through computation based on the public parameter group, and the aggregation public key is obtained by the computing server through aggregation of the public keys of the user sides;
the computing server sends each encrypted blind data to the target aggregator, so that the target aggregator performs blind value removing processing on each encrypted blind data to generate a plurality of encrypted data;
the computing server obtains the plurality of encrypted data sent by the target aggregator, and performs secure multi-party computation on each encrypted data based on a random number and a public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relationship with the encrypted data.
6. The method of claim 5, wherein the computing server performs ciphertext transformation on each initial blind data sent by a target aggregator in the aggregator group based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, and the method comprises:
the computing server decrypts each initial blind data by using the master key to obtain a plurality of decrypted blind data;
and the computing server encrypts each decrypted blind data respectively by using the aggregation public key to obtain a plurality of encrypted blind data.
7. A secure multi-party computing device for use with a computing server included in a secure multi-party computing system, the secure multi-party computing system further including an aggregator group and a plurality of clients, the device comprising:
a conversion module, configured to perform ciphertext conversion on each initial blind data sent by a target aggregator in the aggregator group based on a master key and an aggregation public key to obtain multiple encrypted blind data, where the initial blind data is obtained by the target aggregator performing blind processing on the obtained ciphertext data based on a random blind value and a public key of each user side, the public key of the user side and the ciphertext data have a corresponding relationship, the public key of the user side is obtained by the user side through calculation based on a public parameter group generated by the calculation server, the target aggregator is any one aggregator in the aggregator group, the master key is obtained by the calculation server through calculation based on the public parameter group, and the aggregation public key is obtained by the calculation server through aggregation of the public keys of the user sides;
the transmitting module is used for transmitting each encrypted blind data to the target aggregator so that the target aggregator performs blind value removing processing on each encrypted blind data to generate a plurality of encrypted data;
and the calculation module is used for obtaining the plurality of encrypted data sent by the target aggregator, and respectively performing secure multi-party calculation on each encrypted data based on the random number and the public key of each user side to obtain a plurality of calculation results, wherein the public key of the user side and the encrypted data have a corresponding relationship.
8. A secure multi-party computing system, the system comprising: an aggregator group, a computing server and a plurality of user terminals,
the target aggregator performs blind processing on each acquired ciphertext data respectively based on a random blind value and a public key of each user side to acquire a plurality of initial blind data, and sends each initial blind data to the computation server, wherein the public key of the user side and the ciphertext data have a corresponding relation, the public key of the user side is acquired by computation of the user side based on a public parameter set generated by the computation server, and the target aggregator is any aggregator in the aggregator group;
the computing server performs ciphertext conversion on each initial blind data based on a master key and an aggregation public key to obtain a plurality of encrypted blind data, wherein the master key is obtained by the computing server through computing based on the public parameter group, and the aggregation public key is obtained by the computing server after aggregation of public keys of the user sides;
the target aggregator performs blind value removing processing on each encrypted blind data to obtain a plurality of encrypted data, and sends each encrypted data to the computing server;
the computing server respectively carries out safe multi-party computation on each encrypted data based on a random number and a public key of each user side to obtain a plurality of computation results, wherein the public key of the user side has a corresponding relation with the encrypted data;
and the target aggregator acquires each calculation result sent by the calculation server and publishes each calculation result.
9. A secure multi-party computing device, the secure multi-party computing device comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the secure multi-party computing method according to any of claims 1 to 3 or to implement the secure multi-party computing method according to any of claims 5 to 6.
10. A computer-readable storage medium, wherein instructions in the computer-readable storage medium, when executed by a processor of a secure multi-party computing device, enable the secure multi-party computing device to perform the secure multi-party computing method of any of claims 1 to 3, or enable the secure multi-party computing device to perform the secure multi-party computing method of any of claims 5 to 6.
CN202310157442.6A 2023-02-23 2023-02-23 Secure multi-party computing method, device, system, equipment and storage medium Active CN115834064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310157442.6A CN115834064B (en) 2023-02-23 2023-02-23 Secure multi-party computing method, device, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310157442.6A CN115834064B (en) 2023-02-23 2023-02-23 Secure multi-party computing method, device, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115834064A CN115834064A (en) 2023-03-21
CN115834064B true CN115834064B (en) 2023-04-14

Family

ID=85522205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310157442.6A Active CN115834064B (en) 2023-02-23 2023-02-23 Secure multi-party computing method, device, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115834064B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116455585B (en) * 2023-06-15 2023-09-05 浪潮软件科技有限公司 Secure communication method and device based on multiple blind signatures

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219056A (en) * 2014-09-16 2014-12-17 西安电子科技大学 Privacy protection type real-time electric charge collecting method for intelligent power grid
CN110612696A (en) * 2017-05-18 2019-12-24 罗伯特·博世有限公司 Post-quantum secure private stream aggregation
CN112702341A (en) * 2020-12-23 2021-04-23 国网山东省电力公司信息通信公司 Privacy protection-based user electricity consumption data sharing method and system
CN113300828A (en) * 2021-05-27 2021-08-24 南开大学 Distributed differential privacy aggregation method
CN114866222A (en) * 2022-06-16 2022-08-05 山东大学 Ciphertext data statistical analysis system and method supporting privacy protection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9876636B2 (en) * 2016-01-07 2018-01-23 Empire Technology Development Llc Homomorphic public-key encryption scheme

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219056A (en) * 2014-09-16 2014-12-17 西安电子科技大学 Privacy protection type real-time electric charge collecting method for intelligent power grid
CN110612696A (en) * 2017-05-18 2019-12-24 罗伯特·博世有限公司 Post-quantum secure private stream aggregation
CN112702341A (en) * 2020-12-23 2021-04-23 国网山东省电力公司信息通信公司 Privacy protection-based user electricity consumption data sharing method and system
CN113300828A (en) * 2021-05-27 2021-08-24 南开大学 Distributed differential privacy aggregation method
CN114866222A (en) * 2022-06-16 2022-08-05 山东大学 Ciphertext data statistical analysis system and method supporting privacy protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴云 等.基于身份认证和聚合加密的智能电表数据隐私保护方案.东北电力大学学报.2018,第38卷(第05期),全文. *

Also Published As

Publication number Publication date
CN115834064A (en) 2023-03-21

Similar Documents

Publication Publication Date Title
CN112822014B (en) Data processing method and device, electronic equipment and storage medium
CN110391900B (en) Private key processing method based on SM2 algorithm, terminal and key center
US8429408B2 (en) Masking the output of random number generators in key generation protocols
Kolhar et al. Cloud data auditing techniques with a focus on privacy and security
CN102187615B (en) Method of generating a cryptographic key and network therefor
CN115834064B (en) Secure multi-party computing method, device, system, equipment and storage medium
CN109361519B (en) Improved secret-containing number generation method and system
CN114584278A (en) Data homomorphic encryption method and device and data transmission method and device
US20150023498A1 (en) Byzantine fault tolerance and threshold coin tossing
CN112995215B (en) Decryption system, method, device, electronic equipment and storage medium
CN111404892A (en) Data supervision method and device and server
JP6294882B2 (en) Key storage device, key storage method, and program thereof
CN110401524B (en) Method and system for collaborative generation of secret-containing numbers by means of homomorphic encryption
CN110266478B (en) Information processing method and electronic equipment
EP2395698B1 (en) Implicit certificate generation in the case of weak pseudo-random number generators
CN111314080A (en) SM9 algorithm-based collaborative signature method, device and medium
CN113472734B (en) Identity authentication method and device
WO2023070831A1 (en) Block confirmation method and device
CN114697001A (en) Information encryption transmission method, equipment and medium based on block chain
CN111404668B (en) Information processing method, equipment and storage medium
Hayward et al. Parallelizing fully homomorphic encryption
CN115134145B (en) Consensus method, apparatus, computing device and computer readable storage medium in blockchain system
CN114710359B (en) Industrial network dynamic key management method and industrial network encryption communication method
Long et al. Secret sharing based SM2 digital signature generation using homomorphic encryption
CN117254911B (en) Multiparty security computing processing method and multiparty security computing processing system based on secret sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant