CN114944936A - Privacy routing server, encryption protocol conversion method and machine readable storage medium - Google Patents

Privacy routing server, encryption protocol conversion method and machine readable storage medium Download PDF

Info

Publication number
CN114944936A
CN114944936A CN202210434859.8A CN202210434859A CN114944936A CN 114944936 A CN114944936 A CN 114944936A CN 202210434859 A CN202210434859 A CN 202210434859A CN 114944936 A CN114944936 A CN 114944936A
Authority
CN
China
Prior art keywords
privacy
encryption protocol
computing platform
routing
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210434859.8A
Other languages
Chinese (zh)
Inventor
陈琨
王国赛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huakong Tsingjiao Information Technology Beijing Co Ltd
Original Assignee
Huakong Tsingjiao Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huakong Tsingjiao Information Technology Beijing Co Ltd filed Critical Huakong Tsingjiao Information Technology Beijing Co Ltd
Priority to CN202210434859.8A priority Critical patent/CN114944936A/en
Publication of CN114944936A publication Critical patent/CN114944936A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion

Abstract

The embodiment of the invention provides a privacy routing server, an encryption protocol conversion method and a machine readable storage medium. The privacy routing server side supports a universal encryption protocol, and comprises: the data plane component is used for executing first interactive operation based on a ciphertext with the first privacy computing platform and converting first ciphertext data held by the first privacy computing platform into intermediate ciphertext data held by the data plane component, wherein the first ciphertext data conforms to a first encryption protocol, the first encryption protocol is an encryption protocol supported by the first privacy computing platform, and the intermediate ciphertext data conforms to a general encryption protocol; and the data plane component is also used for executing second interactive operation based on the ciphertext with the second privacy computing platform, converting the intermediate ciphertext data held by the data plane component into second ciphertext data held by the second privacy computing platform, wherein the second ciphertext data conforms to a second encryption protocol. The embodiment of the invention can realize cross-platform data fusion calculation among a plurality of privacy calculation platforms.

Description

Privacy routing server, encryption protocol conversion method and machine readable storage medium
Technical Field
The invention relates to the field of multiparty security computing, in particular to a privacy routing server, an encryption protocol conversion method and a machine readable storage medium.
Background
In the big data era, data has become an important strategic resource. However, in consideration of privacy protection, parties grasping data are not willing to share data, a data island phenomenon is formed, and data value is difficult to sufficiently mine. The privacy computing technology aims to realize fusion computing of a plurality of data parties on the premise of protecting data privacy of a data owner, is beneficial to solving the problem of data island, and is widely concerned and rapidly developed.
At present, on the one hand, the privacy computing technology is rapidly developed, and various innovative technologies and solutions are developed. On the other hand, the application of the privacy computing technology is in an early stage, and a unified standard and specification have not been formed yet. Therefore, data of different privacy computing platforms cannot be compatible with each other, and cross-platform data fusion computing among multiple privacy computing platforms is difficult to realize.
Disclosure of Invention
The embodiment of the invention provides a privacy routing server, an encryption protocol conversion method and a machine readable storage medium, which can convert ciphertext data between privacy computing platforms using different encryption protocols, so that cross-platform data fusion computing among a plurality of privacy computing platforms can be realized.
In order to solve the above problem, an embodiment of the present invention discloses a privacy routing server, where the privacy routing server supports a universal encryption protocol, and includes:
the data plane component is used for executing first interactive operation based on ciphertext with a first privacy computing platform and converting first ciphertext data held by the first privacy computing platform into intermediate ciphertext data held by the data plane component, wherein the first ciphertext data conforms to a first encryption protocol, the first encryption protocol is an encryption protocol supported by the first privacy computing platform, and the intermediate ciphertext data conforms to the general encryption protocol;
and the data plane component is further used for executing a second interactive operation based on a ciphertext with a second privacy computing platform, converting the intermediate ciphertext data held by the data plane component into second ciphertext data held by the second privacy computing platform, wherein the second ciphertext data conform to a second encryption protocol, and the second encryption protocol is an encryption protocol supported by the second privacy computing platform.
On the other hand, the embodiment of the invention discloses an encryption protocol conversion method, which is applied to a privacy routing server side, wherein the privacy routing server side supports a general encryption protocol, and the method comprises the following steps:
executing a first interactive operation based on a ciphertext with a first privacy computing platform through a data surface component, and converting first ciphertext data held by the first privacy computing platform into intermediate ciphertext data held by the data surface component, wherein the first ciphertext data conforms to a first encryption protocol, the first encryption protocol is an encryption protocol supported by the first privacy computing platform, and the intermediate ciphertext data conforms to a general encryption protocol;
and executing second interactive operation based on ciphertext through the data surface component and a second privacy computing platform, and converting the intermediate ciphertext data held by the data surface component into second ciphertext data held by the second privacy computing platform, wherein the second ciphertext data conforms to a second encryption protocol, and the second encryption protocol is an encryption protocol supported by the second privacy computing platform.
In yet another aspect, embodiments of the invention disclose a machine-readable storage medium having instructions stored thereon, which when executed by one or more processors of an apparatus, cause the apparatus to perform a cryptographic protocol conversion method as described in one or more of the preceding.
The embodiment of the invention has the following advantages:
the embodiment of the invention provides a privacy routing server side applicable to a multi-party fusion computing system, wherein the privacy routing server side supports a universal encryption protocol. First ciphertext data under a first encryption protocol from a first privacy computing platform is converted into intermediate ciphertext data under a general encryption protocol through first ciphertext-based interactive operation executed by the privacy routing server and the first privacy computing platform, and then the intermediate ciphertext data is converted into second ciphertext data under a second encryption protocol supported by a second privacy computing platform through second ciphertext-based interactive operation executed by the privacy routing server and the second privacy computing platform, so that ciphertext data conversion and interaction between the first privacy computing platform and the second privacy computing platform are realized, and cross-platform fusion computing of the first privacy computing platform and the second privacy computing platform is realized. By the embodiment of the invention, multi-party fusion calculation among a plurality of privacy calculation platforms using different encryption protocols can be realized, and the conversion and interaction of ciphertext data are executed in a secret state, so that the privacy data of the privacy calculation platforms are not exposed. In addition, through the privacy routing server provided by the invention, each privacy computing platform only needs to pay attention to how to convert ciphertext data under the self encryption protocol into intermediate ciphertext data under the general encryption protocol, and does not need to pay attention to how to convert ciphertext data under the self encryption protocol into ciphertext data under the encryption protocols of other privacy computing platforms, so that the usability and the expandability of the multi-party fusion computing system are facilitated.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor.
FIG. 1 is a schematic structural diagram of an embodiment of a privacy routing server according to the present invention;
FIG. 2 is a schematic structural diagram of a multi-party converged computing system implemented by the privacy routing server of the present invention;
FIG. 3 is a block diagram of a multi-party fusion computing system in accordance with an example of the invention;
FIG. 4 is a block diagram of a multi-party fusion computing system in another example of the invention;
FIG. 5 is a flow diagram illustrating an embodiment of a cryptographic protocol conversion method of the present invention;
fig. 6 is a schematic diagram of a server in some embodiments of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the invention may be practiced other than those illustrated or described herein, and that the objects identified as "first," "second," etc. are generally a class of objects and do not limit the number of objects, e.g., a first object may be one or more. Furthermore, the term "and/or" in the specification and claims is used to describe an association relationship of associated objects, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. The term "plurality" in the embodiments of the present invention means two or more, and other terms are similar thereto.
Method embodiment
Referring to fig. 1, a schematic structural diagram of an embodiment of a privacy routing server 100 according to the present invention is shown, where the privacy routing server supports a general encryption protocol, and the privacy routing server may include:
the data plane component 101 is configured to perform a first cipher text-based interactive operation with a first privacy computing platform, and convert first cipher text data held by the first privacy computing platform into intermediate cipher text data held by the data plane component, where the first cipher text data conforms to a first encryption protocol, the first encryption protocol is an encryption protocol supported by the first privacy computing platform, and the intermediate cipher text data conforms to the general encryption protocol;
the data plane component 101 is further configured to perform a second interactive operation based on a ciphertext with a second privacy computing platform, and convert the intermediate ciphertext data held by the data plane component into second ciphertext data held by the second privacy computing platform, where the second ciphertext data conform to a second encryption protocol, and the second encryption protocol is an encryption protocol supported by the second privacy computing platform.
The privacy routing server includes a data plane component 101, which is responsible for processing data flow. The data plane component 101 includes at least two privacy routing nodes 1011. The privacy routing node may be any device with a ciphertext computing function. Two privacy routing nodes are exemplified in fig. 1.
The privacy routing server provided by the invention can be applied to a multi-party fusion computing system to realize ciphertext data conversion among different privacy computing platforms, thereby realizing interconnection and intercommunication of different privacy computing platforms and further realizing fusion computing of different privacy computing platforms.
Referring to fig. 2, a schematic structural diagram of a multi-party fusion computing system implemented by applying the privacy routing server of the present invention is shown, where the system may include a first privacy computing platform 201, a second privacy computing platform 202, and a privacy routing server 203, where the first privacy computing platform 201 supports a first encryption protocol, the second privacy computing platform 202 supports a second encryption protocol, and the privacy routing server 203 supports a preset general encryption protocol.
A private computing platform is a computing platform that protects data privacy security. The embodiment of the invention does not limit the encryption protocols supported by the first privacy computing platform and the second privacy computing platform. The first encryption protocol supported by the first privacy computing platform and the second encryption protocol supported by the second privacy computing platform may be different encryption protocols. Illustratively, the first encryption protocol may be a homomorphic encryption protocol, and the second encryption protocol may be a secret sharing protocol; alternatively, the first encryption protocol may be a secret sharing protocol and the second encryption protocol may be a homomorphic encryption protocol.
In a specific implementation, the principle of the secret sharing protocol is to divide a secret into a plurality of shares, each of which is called a secret sharing fragment, the secret sharing fragments are distributed to different users, and the secret can be reconstructed only if a certain number of users provide their respective secret sharing fragments together. The (t, n) threshold secret sharing protocol means that a secret is divided into n secret sharing fragments and distributed to different users, the secret is easy to calculate when any t secret sharing fragments are known, and the secret cannot be calculated when any less than t secret sharing fragments are known. Further, the (t, n) threshold secret sharing protocol may include: (t, n) a summing threshold secret sharing protocol, (t, n) a multiplying threshold secret sharing protocol, and (t, n) a multiplying threshold secret sharing protocol. t and n are integers greater than or equal to 2, and n is greater than or equal to t.
The first encryption protocol may be any one of the above (t, n) threshold secret sharing protocols, the second encryption protocol may be any one of the above (t, n) threshold secret sharing protocols, and the general encryption protocol may be any one of the above (t, n) threshold secret sharing protocols.
The homomorphic encryption protocol is an encryption algorithm which uses an encryption function to perform ring addition and multiplication operation on a plaintext and then encrypts the plaintext, and performs corresponding operation on a ciphertext after encryption to obtain an equivalent result. The encryption function having the homomorphic property means an encryption function in which two plain texts a and b satisfy d (c), (a), (b), (c), (b), and a ≧ b. Wherein c is an encryption function, d is a decryption function, which indicates an addition operation or a multiplication operation on the ciphertext domain, and ^ indicates an addition operation or a multiplication operation on the plaintext domain. When |, indicates an addition operation, it is referred to as an addition homomorphic encryption protocol; when |, indicates a multiplication operation, it is referred to as a multiply-homomorphic encryption protocol; when an |, includes both an addition operation and a multiplication operation, it is referred to as a fully homomorphic encryption protocol.
The first encryption protocol may be any one of the above homomorphic encryption protocols, the second encryption protocol may be any one of the above homomorphic encryption protocols, and the general encryption protocol may be any one of the above homomorphic encryption protocols.
For example, the first encryption protocol may be a (3,3) add threshold secret sharing protocol, the general encryption protocol may be a (2,2) add threshold secret sharing protocol, and the second encryption protocol may be a homomorphic encryption protocol. As another example, the first encryption protocol may be a (3,3) multiplicative threshold secret sharing protocol, the general encryption protocol may be a (2,2) multiplicative threshold secret sharing protocol, and the second encryption protocol may be a multiplicative homomorphic encryption protocol. As another example, the first encryption protocol may be a homomorphic encryption protocol, the common encryption protocol may be a (2,2) additive threshold secret sharing protocol, and the second encryption protocol may be a (2,4) additive threshold secret sharing protocol. As another example, the first encryption protocol may be a (3,3) add threshold secret sharing protocol, the general encryption protocol may be a homomorphic encryption protocol, the second encryption protocol may be a (2,2) add threshold secret sharing protocol, and so on. Of course, the first encryption protocol and/or the second encryption protocol and/or the general encryption protocol are not limited to the above-mentioned encryption protocols, and may also include protocols such as garbled circuit and inadvertent transmission.
It should be noted that fig. 2 shows that the system architecture includes two privacy computing platforms (a first privacy computing platform and a second privacy computing platform), and the system architecture is only an application example of the embodiment of the present invention, and the embodiment of the present invention does not limit the number of privacy computing platforms participating in the multi-party fusion computing. Referring to fig. 3, a schematic diagram of a multi-party fusion computing system including four privacy computing platforms in an example of the present invention is shown. For convenience of description, the embodiment of the present invention is described by taking two private computing platforms as an example.
The multiparty fusion calculation in the embodiment of the invention refers to fusion calculation between at least two privacy calculation platforms, and each privacy calculation platform can own a respective data source. Through the privacy routing server provided by the embodiment of the invention, each privacy computing platform can utilize the privacy data of each data source to realize cross-platform fusion computing, and the privacy data of each privacy computing platform cannot be exposed. It will be appreciated that the private data may be any data that is not convenient to disclose, and may include, but is not limited to, data representing personal information of the user, or trade secrets or the like.
For convenience of description, the embodiment of the present invention refers to a privacy computing platform for providing data in multi-party fusion computing as a first privacy computing platform, and refers to a privacy computing platform for receiving data as a second privacy computing platform. Exemplarily, it is assumed that the privacy computing platform a supports a first encryption protocol, the privacy computing platform B supports a second encryption protocol, the first encryption protocol is different from the second encryption protocol, the privacy computing platform B needs to perform fusion computation by using first ciphertext data held by the privacy computing platform a, and the first ciphertext data is obtained by performing ciphertext computation on the privacy data provided by the data source of the privacy computing platform a based on the first encryption protocol. Firstly, the privacy computing platform A and the privacy routing server side execute first interactive operation based on a ciphertext, and first ciphertext data under a first encryption protocol are converted into intermediate ciphertext data under a general encryption protocol. Then, the privacy routing server and the second privacy computing platform B execute second interactive operation based on the ciphertext to convert the intermediate ciphertext data under the general encryption protocol into second ciphertext data under a second encryption protocol. Thus, the privacy computing platform B can perform the fusion computation using the second ciphertext data.
In this example, the privacy computing platform that provides the data (e.g., privacy computing platform a) may be referred to as a first privacy computing platform, and the privacy computing platform that receives the data (e.g., privacy computing platform B) may be referred to as a second privacy computing platform. It is understood that, in a specific implementation, the embodiment of the present invention does not limit the number of the first privacy computing platforms and the number of the second privacy computing platforms in the multi-party fusion computing system.
In the embodiment of the invention, the first interactive operation and the second interactive operation are both performed in a secret state, and data does not need to be decrypted, so that data communication between privacy computing platforms is realized on the premise of meeting the security requirements of the privacy computing platforms.
It should be noted that the multiparty fusion computing system includes at least two privacy computing platforms, and the privacy computing platforms using different encryption protocols may perform ciphertext data interaction through the privacy routing server.
Further, when the first privacy computing platform and the second privacy computing platform adopt the same type of encryption protocol, the cryptograph data of the first privacy computing platform and the second privacy computing platform still need to be subjected to encryption protocol conversion to perform cross-platform fusion computing due to different specific types of the encryption protocols or different adopted keys. Illustratively, the first privacy computing platform and the second privacy computing platform both employ a secret sharing protocol, but the first privacy computing platform employs an addition threshold secret sharing protocol and the second privacy computing platform employs a multiplication threshold secret sharing protocol. As another example, the first and second privacy computing platforms each employ a homomorphic encryption protocol, but the keys of the homomorphic encryption protocols employed by the first and second privacy computing platforms are different. At this time, ciphertext data conversion and interaction between the first privacy computing platform and the second privacy computing platform can be achieved by using the privacy routing server as a link hub.
Certainly, for privacy computing platforms adopting the same encryption protocol, ciphertext data interaction can be carried out through the privacy routing server, in the multiparty fusion computing process, the privacy routing server is used for forwarding intermediate data generated by different privacy computing platforms, transmission interfaces of the privacy computing platforms can be managed in a unified mode through routing nodes, the fact that the transmission interfaces of the privacy computing platforms are exposed among the privacy computing platforms can be avoided, and then network safety of the privacy computing platforms is improved.
The privacy routing server side supports a preset general encryption protocol, and can be used as a link to realize ciphertext data conversion and interaction among different privacy computing platforms. The general encryption protocol adopted by the privacy routing server side can be any encryption protocol, and the general encryption protocol can be negotiated and determined by all the participants of the multi-party fusion computing task.
In an optional embodiment of the present invention, the universal encryption protocol may include a (2,2) threshold secret sharing protocol, the privacy routing server includes at least two privacy routing nodes, and the intermediate ciphertext data includes two secret sharing fragments, and the two secret sharing fragments are respectively held by the two privacy routing nodes. Further, the (2,2) threshold secret sharing protocol may include any one of (2,2) a summing threshold secret sharing protocol, (2,2) a multiplying threshold secret sharing protocol, and (2,2) a multiplying threshold secret sharing protocol.
The privacy routing node may be any device with a ciphertext computation function. The general encryption protocol adopted by the privacy routing server side can be any encryption protocol, in order to simplify the operation process of converting the first ciphertext data into the intermediate ciphertext data and improve the conversion efficiency, the general encryption protocol can adopt an encryption protocol which is as simple and safe as possible, such as (2,2) threshold secret sharing protocol. Further, the (2,2) threshold secret sharing protocol may include any one of (2,2) a summing threshold secret sharing protocol, (2,2) a multiplying threshold secret sharing protocol, and (2,2) a multiplying threshold secret sharing protocol.
Secret sharing is a cryptography technology, which means that secret information is split in a proper manner to obtain a plurality of secret sharing fragments, and the secret sharing fragments are sent to different participants for management. A single participant cannot recover the secret information and a certain number of participants must be joined to recover the secret information. And (2,2) the threshold secret sharing protocol is to split secret information to obtain two secret sharing fragments.
It should be noted that, although the system architecture shown in the drawings of the embodiment of the present invention abstracts each of the privacy computing platform and the privacy routing server as one node, in a specific implementation, both the privacy computing platform and the privacy routing server may include a plurality of distributed nodes. For example, when the general encryption protocol adopted by the privacy routing server is a (2,2) threshold secret sharing protocol, the privacy routing server may include at least two privacy routing nodes. After the privacy routing server side and the first privacy computing platform execute first interactive operation based on a ciphertext, an encryption protocol of first ciphertext data is converted into a general encryption protocol to obtain intermediate ciphertext data, the intermediate ciphertext data comprise two secret sharing fragments, and the two secret sharing fragments are respectively held by two privacy routing nodes of the privacy routing server side. For another example, the first privacy computing platform and the second privacy computing platform are deployed with a corresponding number of privacy computing nodes according to respective encryption protocols. The private computing node may be any device with ciphertext computing functionality. For convenience of description, in the embodiment of the present invention, a privacy computing node in a first privacy computing platform is referred to as a first privacy computing node, and a privacy computing node in a second privacy computing platform is referred to as a second privacy computing node.
In an optional embodiment of the invention, the common encryption protocol may be determined jointly according to the first encryption protocol and the second encryption protocol. For example, in the case that the first encryption protocol and the second encryption protocol are determined, the common encryption protocol adopted by the privacy routing server can be determined according to the first encryption protocol and the second encryption protocol. The following principles may be followed when selecting a generic encryption protocol: the conversion process from the first encryption protocol to the general encryption protocol and the conversion process from the general encryption protocol to the second encryption protocol are both simple and convenient, so as to reduce the calculation amount as much as possible and improve the conversion efficiency. Illustratively, the first encryption protocol supported by the first privacy computing platform is a (2,4) addition threshold secret sharing protocol, the second encryption protocol supported by the second privacy computing platform is a multiplicative homomorphic encryption protocol, and preferably, the general encryption protocol supported by the privacy routing server is a (2,2) multiplicative threshold secret sharing protocol.
In an optional embodiment of the present invention, two privacy routing nodes respectively holding the two secret sharing segments belong to different administrative domains.
Further, the two privacy routing nodes respectively holding the two secret sharing fragments can belong to different management domains, so that the two privacy routing nodes are not communicated with each other, and the risk of data leakage caused by the fact that the secret sharing fragments are integrated together and recovered into plaintext data is avoided. Optionally, the administrative domain of the privacy routing node holding one of the secret sharing segments belongs to the first privacy computing platform, and the administrative domain of the privacy routing node holding another one of the secret sharing segments belongs to the second privacy computing platform.
In the embodiment of the present invention, the privacy routing node is a data plane component of the privacy routing server, and the privacy routing server may include at least two privacy routing nodes in different administrative domains. First ciphertext data under a first encryption protocol from the first privacy computing platform are converted into second ciphertext data under a second encryption protocol through a privacy routing node of the privacy routing server and then transmitted to the second privacy computing platform, and therefore data surface communication between the first privacy computing platform and the second privacy computing platform is achieved.
In an optional embodiment of the present invention, the privacy routing server may further include a control plane component, configured to receive a multi-party fusion computation task, and respectively issue task configuration information of the multi-party fusion computation task to the first privacy computation platform and the second privacy computation platform, so that the first privacy computation platform and the second privacy computation platform respectively perform ciphertext computation by using privacy data provided by respective data sources according to the task configuration information, and perform ciphertext data interaction through the privacy routing server, so as to cooperatively execute the multi-party fusion computation task.
In a specific implementation, the control plane component is configured to process a control flow, and the control plane component may include at least one control node, where the control node may implement cross-platform task scheduling, resource management, and the like. Specifically, the control node may receive a multiparty fusion computing task triggered by a client, and respectively issue task configuration information of the multiparty fusion computing task to each privacy computing platform participating in the multiparty fusion computing task, for example, issue task configuration information of the multiparty fusion computing task to the first privacy computing platform and the second privacy computing platform, respectively. The task configuration information may include description information of the multi-party fusion computing task and port information of each node participating in the multi-party fusion computing task. The nodes participating in the multi-party fusion computing task may include a first computing node of the first privacy computing platform, a second computing node of the second privacy computing platform, and a privacy routing node of the privacy routing server.
The data source may provide services of data storage, data provision, computation result storage, and the like. Each private computing platform has a respective data source. And each privacy computing platform performs ciphertext computing based on the privacy data provided by the data source of the privacy computing platform according to the received task configuration information to obtain the ciphertext data of the privacy computing platform, and the interaction of the ciphertext data is realized through the privacy routing server, so that the multiparty fusion computing task is cooperatively executed.
It should be noted that, the embodiment of the present invention does not limit the task type of the multi-party fusion computing task. The multi-party fusion computing task includes, but is not limited to, any one or more of the following: privacy-preserving-based computational operations, privacy-preserving-based model training and prediction, privacy-preserving-based database query operations, and the like. Wherein the computing operations include, but are not limited to: digital computation such as addition, subtraction, multiplication and division, and logical computation such as AND, OR and NOT.
In the embodiment of the invention, the control node is a control surface component, all privacy routing nodes of the privacy routing server side can be centrally managed through the control node according to specific algorithms and business requirements, and the control node is interacted with the task scheduling node of each privacy computing platform to realize coordination and synchronization of multi-party fusion computing tasks.
In an optional embodiment of the present invention, the control plane component is further configured to initialize a routing configuration table, where the routing configuration table records routing information of each node accessing the privacy routing server, and when the privacy routing server accesses a new privacy computing platform, updates the routing configuration table according to the routing information of each node in the new privacy computing platform.
Each private computing platform participating in the multi-party converged computing task can initiate a respective computing node to perform the multi-party converged computing task. A computing node in one privacy computing platform may interact with a computing node in another privacy computing platform through a privacy routing node of a privacy routing server. In order to avoid the risk that each computing node in each privacy computing platform exposes its own port to the outside, which causes the computing node to be attacked and invaded, the embodiment of the invention uniformly manages the routing information of each node in the multi-party fusion computing system through the control node of the privacy routing server. Specifically, the control node may maintain a routing configuration table, where the routing configuration table records routing information of each node in the multi-party fusion computing system, including routing information of a task scheduling node and each computing node in each privacy computing platform and routing information of each privacy routing node in the privacy routing server. When a new privacy computing platform is accessed in the multi-party fusion computing system, the control node updates the routing configuration table according to the routing information of each node (task scheduling node and privacy computing node) in the new privacy computing platform.
Referring to FIG. 4, a schematic diagram of a multi-party fusion computing system in another example of the invention is shown. As shown in fig. 4, the multi-party fusion computing system includes a first privacy computing platform, a second privacy computing platform, and a privacy routing server. In this example, the first encryption protocol supported by the first privacy computing platform is a (2,4) threshold secret sharing protocol, the first privacy computing platform including 4 privacy computing nodes. The second encryption protocol supported by the second privacy computing platform is a homomorphic encryption protocol, and the second privacy computing platform comprises two privacy computing nodes. The privacy routing server side comprises two privacy routing nodes (RSs) and a control node. The first privacy computing platform and the second privacy computing platform respectively comprise a task scheduling node and a privacy routing client. The first privacy computing platform and the second privacy computing platform can perform ciphertext computing based on respective data sources, and ciphertext data interaction is achieved through the privacy routing server side, so that cross-platform fusion computing is achieved. The solid line in fig. 4 indicates the transmission process of the data flow, and the broken line indicates the transmission process of the control flow.
In the multiparty fusion computing system, each privacy computing platform can deploy a respective privacy routing client, and the privacy routing client interacts with a privacy routing server to realize encryption protocol conversion of ciphertext data. Therefore, each privacy computing platform only needs to be configured with the privacy routing client conforming to the self encryption protocol, and the original functions of the computing nodes in the privacy computing platform are not changed.
The privacy routing client may be an entity device deployed in the privacy computing platform, or the privacy routing client may be an application program deployed on the entity device, and exemplarily, the privacy routing client may be an application program deployed on a certain privacy computing node in the privacy computing platform. By deploying privacy routing clients adapted to the privacy computing platforms in the privacy computing platforms, the privacy computing platforms can interact with the privacy routing server through the privacy routing clients, and therefore interconnection and intercommunication among the privacy computing platforms can be achieved, and fusion computing of the privacy computing platforms is achieved. Each privacy computing platform is only required to be adapted to the privacy routing client side according to how ciphertext data of each privacy computing platform is converted with ciphertext data under a general encryption protocol, and how encryption protocols between the ciphertext data of each privacy computing platform and other privacy computing platforms are converted is not required to be concerned, so that the encryption protocol, the technical architecture, the resource scheduling, the algorithm implementation and the like of each privacy computing platform are all unlimited. On one hand, the multi-party fusion computing system has easy implementation, on the other hand, the multi-party fusion computing system has expandability, and when a certain privacy computing platform accessed to the multi-party fusion computing system is changed or expanded in an encryption protocol, or when a new privacy computing platform is accessed to the multi-party fusion computing system, other accessed privacy computing platforms do not need to be additionally changed.
Each privacy computing platform can be provided with a plurality of privacy routing clients, and the privacy routing clients interact with the privacy routing server to realize secret state data conversion between the heterogeneous privacy computing platforms. The heterogeneous privacy computing platform refers to privacy computing platforms adopting different encryption protocols. The secret state data refers to data in a secret text state. According to the specific requirements of different secret data conversion, a corresponding number of privacy routing clients can be set. Furthermore, in order to realize the unified management and network security of the multi-party fusion computing system, communication and data interaction can be carried out between the nodes of the privacy routing client and the privacy routing server and between the privacy routing clients of the same privacy computing platform; and the privacy routing clients of different privacy computing platforms communicate and exchange data through the privacy routing server side, and the privacy routing clients of different privacy computing platforms do not directly communicate and exchange data.
Because the encryption protocols of different privacy computing platforms are possibly different and the possibility of change and expansion exists in the future, the functions of the privacy routing client can be provided by standard SDK (Software Development Kit), and each privacy computing platform can be adapted and perfected on the basis of the standard SDK, so that the privacy routing client meeting the requirements of the privacy routing client can be realized. The number of privacy routing clients of different privacy computing platforms can be adjusted according to actual requirements. In addition, when the privacy routing server is deployed with the control node, the privacy routing client can also interact with the control node to receive the scheduling and management of the control node.
In an optional embodiment of the present invention, the first encryption protocol is a homomorphic encryption protocol, the common encryption protocol is a (2,2) threshold secret sharing protocol, the first privacy computing platform includes at least two first privacy routing clients, the at least two first privacy routing clients include a first end and a second end, the first end holds first ciphertext data, the first ciphertext data is obtained by performing ciphertext computation on privacy data provided by a data source by the first privacy computing platform based on a homomorphic encryption function of the homomorphic encryption protocol, and the privacy routing server includes a first privacy routing node and a second privacy routing node; wherein, the first and the second end of the pipe are connected with each other,
the first end is used for generating a first random number and encrypting the first random number by using the homomorphic encryption function to obtain a first temporary ciphertext;
the first end is further configured to calculate, according to the first ciphertext data and the first temporary ciphertext, a second temporary ciphertext using the secret sharing protocol, and send the second temporary ciphertext to the second privacy routing client;
the second end is used for decrypting the second ciphertext by using a homomorphic decryption function corresponding to the homomorphic encryption function to obtain a second random number;
the first end is further configured to send the first random number to the first privacy routing node;
the second end is further configured to send the second random number to the second privacy routing node.
Wherein the first end and the second end can be any two privacy routing clients deployed in a first privacy computing platform.
The homomorphic encryption protocol supported by the first privacy computing platform may include any one of a homomorphic encryption protocol, a multiplicative homomorphic encryption protocol, and a fully homomorphic encryption protocol. The (2,2) threshold secret sharing protocol supported by the privacy routing server side can comprise any one of (2,2) adding threshold secret sharing protocol, (2,2) multiplying threshold secret sharing protocol, and (2,2) adding threshold secret sharing protocol.
In one example, let x denote the original data of the first privacy computing platform side data source, c denote the encryption function of the homomorphic encryption protocol supported by the first privacy computing platform, and d denote the decryption function of the homomorphic encryption protocol. After the original data x is homomorphic encrypted, the first ciphertext data obtained is c (x).
Further, in this example, it is assumed that the homomorphic encryption protocol supported by the first privacy computing platform is a homomorphic encryption protocol, and the general encryption protocol supported by the privacy routing server is a (2,2) addition threshold secret sharing protocol.
The first privacy computing platform sends the first ciphertext data c (x) to the first end. The first terminal generates a first random number, such as r 1 . The first end applies a first random number r 1 And sending the information to the first privacy routing node. The first end uses the encryption function c to r 1 Encrypting to obtain a first temporary ciphertext, such as c (r) 1 ). The first end according to the first ciphertext data c (x) and the first temporary ciphertext c (r) 1 ) Calculated by using (2,2) addition threshold secret sharing protocolAnd obtaining a second temporary ciphertext, and sending the second temporary ciphertext to the second end. Specifically, according to the definition of the homomorphic encryption protocol, the first end may calculate the second temporary ciphertext cr by 2 :cr 2 =c(x)-c(r 1 ). The first end combines the second temporary ciphertext cr 2 And sending to the second end. The second end uses the decryption function d to decrypt the second temporary ciphertext cr 2 Decrypting to obtain a second random number r 2 =d(cr 2 ). The second end combines the second random number r 2 And sending to the second privacy routing node. Since the encryption function and the decryption function in the homomorphic protocol are inverse functions of each other, and the homomorphic protocol has addition homomorphism, cr 2 =c(x)-c(r 1 )=c(r 2 ) So that c (x) c (r) 1 )+c(r 2 ). Thus, x ═ r 1 +r 2 . Due to r 1 And r 2 Respectively belong to a first privacy routing node and a second privacy routing node, and r 1 For the generated random numbers, according to the definition of the (2,2) addition threshold secret sharing protocol, r 1 And r 2 A shard is shared for a set of secrets for the original data x. That is, the first random number and the second random number are intermediate ciphertext data conforming to a (2,2) addition threshold secret sharing protocol (universal encryption protocol) supported by the privacy routing server.
Thus, the first ciphertext data (under the first encryption protocol) of the first privacy computing platform is converted into the intermediate ciphertext data (under the general encryption protocol) of the privacy routing service side through the first interaction operation performed by the first privacy computing platform (between the first end and the second end) and the privacy routing service side (between the first privacy routing node and the second privacy routing node). The intermediate ciphertext data may include a first nonce and a second nonce, the first nonce being held by the first privacy routing node, and the second nonce being held by the second privacy routing node. Likewise, the second privacy computing platform comprises a second privacy computing node, and the second privacy computing node can directly execute second cipher text-based interactive operation with the privacy routing server, or the second privacy platform can deploy a second privacy routing client and execute second cipher text-based interactive operation with the privacy routing server through the second privacy routing client.
In an optional embodiment of the present invention, a second encryption protocol supported by the second privacy computing platform is a homomorphic encryption protocol, the second privacy computing platform includes a target privacy routing client, a general encryption protocol supported by the privacy routing server is a preset privacy sharing protocol, the privacy routing server includes t privacy routing nodes, and t is greater than or equal to 2; the t privacy routing nodes respectively hold t data fragments of original data under the preset secret sharing protocol;
the t privacy routing nodes are respectively used for encrypting the data fragments held by the privacy routing nodes by using the encryption function of the target homomorphic encryption protocol to obtain the encryption fragments held by the privacy routing nodes, and sending the encryption fragments held by the privacy routing nodes to the target privacy routing client;
the target privacy routing client is used for determining a target decryption function according to the decryption function of the preset secret sharing protocol and the encryption function of the target homomorphic encryption protocol, and decrypting the t encryption fragments by using the target decryption function to obtain the encrypted data of the original data under the target homomorphic encryption protocol.
The t privacy routing nodes respectively hold t data fragments of the original data under the preset secret sharing protocol, that is, the t privacy routing nodes respectively hold t secret sharing fragments of the original data under the preset secret sharing protocol.
Further, when the preset secret sharing protocol is a (t, n) addition threshold secret sharing protocol, the target homomorphic encryption protocol may be an addition homomorphic encryption protocol; or, when the preset secret sharing protocol is a (t, n) multiplication threshold secret sharing protocol, the target homomorphic encryption protocol may be a multiplication homomorphic encryption protocol; or, when the preset secret sharing protocol is a (t, n) multiplied threshold secret sharing protocol, the target homomorphic encryption protocol may be a fully homomorphic encryption protocol.
In one exampleAssuming that the preset secret sharing protocol is a (2,2) addition threshold secret sharing protocol, for original data x (assuming that x is private data of a data source on the first privacy computing platform side), two privacy routing nodes in the privacy routing server side respectively hold two data fragments (namely two secret sharing fragments) of which x is under the (2,2) addition threshold secret sharing protocol, and if the two data fragments are marked as x, the two privacy routing nodes are marked as x 1 And x 2 . For example, privacy routing node 1 holds x 1 The privacy routing node 2 holds x 2
In this example, the target homomorphic encryption protocol may be a homomorphic encryption protocol.
And the two privacy routing nodes respectively use the encryption functions of the target homomorphic encryption protocol to encrypt the data fragments held by the privacy routing nodes to obtain the encryption fragments held by the privacy routing nodes. For example, the privacy routing node 1 uses the encryption function of the target homomorphic encryption protocol to fragment the data held by the privacy routing node 1 1 Encrypting to obtain the encrypted fragment held by it, as c (x) 1 ) And c is an encryption function of the target homomorphic encryption protocol. The privacy routing node 2 uses the encryption function of the target homomorphic encryption protocol to fragment the data held by the privacy routing node x 2 Encrypting to obtain the encrypted fragment held by it, as c (x) 2 )。
And the two privacy routing nodes respectively send the encryption fragments held by the two privacy routing nodes to a target privacy routing client in the second privacy computing platform. The target privacy routing client receives c (x) 1 ) And c (x) 2 ) Two encrypted slices.
And the target privacy routing client determines a target decryption function according to the decryption function of the preset secret sharing protocol and the encryption function of the target homomorphic encryption protocol.
Assuming that a decryption function of the preset secret sharing protocol is denoted as f, an encryption function of the target homomorphic encryption protocol is denoted as c, and a target decryption function is denoted as g, the target decryption function g should satisfy the following formula: g (c (x) 1 ),c(x 2 ),…,c(x t ))=c(f(x 1 ,x 2 ,…,x t ) Wherein x is 1 ,x 2 ,…,x t T data fragments (i.e. t secret sharing fragments) of the original data x under the preset secret sharing protocol are obtained.
Taking f as the decryption function of an (t, n) addition threshold secret sharing protocol as an example, f is defined as follows:
f=p 0 +p 1 x 1 +…+p t x t (1)
wherein x is 1 ~x t T data fragments (i.e. t secret sharing fragments) under the (t, n) addition threshold secret sharing protocol are used for the original data x. p is a radical of 0 ~p t Are integers.
And when the preset secret sharing protocol is a (t, n) addition threshold secret sharing protocol and the target homomorphic encryption protocol is an addition homomorphic encryption protocol. Assuming that c is an encryption function of a homomorphic encryption protocol, c satisfies: c (x) 1 )⊙c(x 2 )=c(x 1 ⊕x 2 ). Operation on plain text field in homomorphic encryption protocol
Figure BDA0003612150850000161
Operation in decryption function f of the secret sharing protocol is covered, so that g can be determined according to the operation of the ciphertext field in the homomorphic encryption protocol [ ], e.g
Figure BDA0003612150850000162
Then, g (c (x) 1 ),c(x 2 ))=c(x 1 )⊙c(x 2 )⊙c(x 2 )。
Thus, there is a function g that satisfies the following equation:
g(c(x 1 ),c(x 2 ),…,c(x t ))=c(f(x 1 ,x 2 ,…,x t ))=c(x) (2)
in this example, the target privacy routing client may determine that the target decryption function is g (c (x) 1 ),c(x 2 ))=c(f(x 1 ,x 2 )). The target privacy routing client decrypts the received two encrypted fragments by using the target decryption function, so as to obtain the original data x in the target homomorphic encryption protocol (homomorphic encryption protocol)The encrypted data c (x) of (b).
Thus, the intermediate ciphertext data (under the general encryption protocol) of the privacy routing server is converted into second encrypted data (under the second encryption protocol) of the second privacy computing platform through the second interaction operation based on the ciphertext performed by the privacy routing server (the first privacy routing node and the second privacy routing node) and the second privacy computing platform (the target privacy routing client). In this example, the general encryption protocol is the intermediate ciphertext data x under the (2,2) addition threshold secret sharing protocol 1 And x 2 And converting the encrypted data into the encrypted data c (x) under the homomorphic encryption protocol.
It will be appreciated that embodiments of the present invention use a first privacy computing platform and a second privacy computing platform to identify two peer communicating entities. The first privacy computing platform and the second privacy computing platform respectively correspond to a ciphertext data sender and a ciphertext data receiver, and in specific implementation, the positions of the ciphertext data sender and the ciphertext data receiver can be interchanged.
In an optional embodiment of the present invention, data transmission may be performed among nodes in the privacy routing server, the first privacy computing platform, and the second privacy computing platform according to ciphertext data packets in a preset format.
Wherein the ciphertext data packet of the preset format comprises a predefined field, and the predefined field at least comprises: the data identification of the original ciphertext data, the number of data packets corresponding to the original ciphertext data, and the ciphertext operation instruction corresponding to the original ciphertext data.
In an optional embodiment of the present invention, the data sending node in the privacy routing server may be configured to segment original ciphertext data to be sent according to a preset size, and pack the segmented data according to a predefined field to obtain a ciphertext data packet corresponding to the original ciphertext data, and send the ciphertext data packet to the data receiving node.
In an optional embodiment of the present invention, the data receiving node in the privacy routing server may be configured to receive a ciphertext data packet, where the ciphertext data packet is obtained by segmenting original ciphertext data according to a preset size by a data sending node, and packaging the segmented data according to a predefined field; when receiving a ciphertext data packet, the data receiving node judges whether all ciphertext data packets of original ciphertext data to which the ciphertext data packet belongs are received or not according to the data identification and the data packet number in the predefined field of the ciphertext data packet; storing the ciphertext data packets when determining that all ciphertext data packets of the original ciphertext data are not received; and when all the ciphertext data packets of the original ciphertext data are determined to be received, executing the ciphertext operation instruction by using the original ciphertext data to obtain a ciphertext operation result.
The invention provides a predefined ciphertext data packet format, in the transmission process of ciphertext data, original ciphertext data are split according to a preset size and are packaged according to the predefined format, then the original ciphertext data are transmitted and processed between nodes in the form of the ciphertext data packet in the predefined format, each node receives the ciphertext data packet and then carries out preset processing and forwarding according to a predefined field carried by the ciphertext data packet, and no additional control logic is needed. Therefore, the decoupling of the data plane and the control plane can be realized, and further, the decoupling of the encryption protocol conversion process of the ciphertext data and the logic of an upper application algorithm can be realized.
The predefined fields include, but are not limited to: the data identification of the original ciphertext data, the number of data packets corresponding to the original ciphertext data, and the ciphertext operation instruction corresponding to the original ciphertext data.
In one example, a ciphertext data packet may include the following predefined fields: task identification, data packet quantity, source node identification, target node identification, encryption protocol, secret key, ciphertext operation instruction and routing information.
Wherein the task identifier can be used to identify the multi-party fusion computing task. The data identification may be used to identify the original ciphertext data that was sliced. The data packet identifier may be used to identify a ciphertext data packet obtained by segmenting and packaging the original ciphertext data. The number of data packets may be used to identify the number of ciphertext data packets that the original ciphertext data contains. The source node identification may be used to identify the sending node of the original ciphertext data. The target node identification may be used to identify the receiving node of the original ciphertext data. The encryption protocol refers to the encryption protocol adopted by the original ciphertext data. The key refers to a key used by the original ciphertext data. The ciphertext operation instruction refers to an instruction in which the original ciphertext data participates. The routing information may include path information between the original ciphertext data from the source node to the destination node. Of course, the predefined field of the ciphertext data packet may further include a data shape (shape), a data type (type), data content, and the like.
In the embodiment of the invention, each node transmits ciphertext data by adopting a predefined format and a 'storage-processing-forwarding' mode, when a certain node receives a certain ciphertext data packet, firstly, whether all ciphertext data packets of original ciphertext data required by a ciphertext operation instruction to be executed currently are received completely is judged according to a predefined field of the ciphertext data packet, and if not, the ciphertext data packet is stored; if the ciphertext operation instruction is received, each original ciphertext data required by the ciphertext operation instruction to be executed can be obtained according to the received ciphertext data packet, and therefore the ciphertext operation instruction can be executed. After the ciphertext operation instruction is executed, the node may send the result to the next node according to the routing information after the obtained ciphertext operation result is cut and packed in the above manner.
In the embodiment of the invention, each node firstly caches the received ciphertext data packet until all ciphertext data packets of all original ciphertext data (possibly from a plurality of nodes) required by the current ciphertext operation instruction are received, then the operation is carried out, and then the result is forwarded to the node executing the next operation. Therefore, the ciphertext data operation of the bottom layer and the calculation logic decoupling of the upper layer are achieved, therefore, each privacy calculation platform can carry out cross-platform data communication based on a data interface provided by the privacy routing server side, and the safety of privacy data is guaranteed.
To sum up, the embodiment of the present invention provides a privacy routing server applicable to a multiparty convergence computing system, where the privacy routing server supports a universal encryption protocol. First ciphertext data under a first encryption protocol from a first privacy computing platform is converted into intermediate ciphertext data under a general encryption protocol through first ciphertext-based interactive operation executed by the privacy routing server and the first privacy computing platform, and then the intermediate ciphertext data is converted into second ciphertext data under a second encryption protocol supported by a second privacy computing platform through second ciphertext-based interactive operation executed by the privacy routing server and the second privacy computing platform, so that ciphertext data conversion and interaction between the first privacy computing platform and the second privacy computing platform are realized, and cross-platform fusion computing of the first privacy computing platform and the second privacy computing platform is realized. By the embodiment of the invention, multi-party fusion calculation among a plurality of privacy calculation platforms using different encryption protocols can be realized, and the conversion and interaction of ciphertext data are executed in a secret state, so that the privacy data of the privacy calculation platforms are not exposed. In addition, through the privacy routing server provided by the invention, each privacy computing platform only needs to pay attention to how to convert ciphertext data under the self encryption protocol into intermediate ciphertext data under a general encryption protocol, and does not need to pay attention to how to convert ciphertext data under the self encryption protocol into ciphertext data under the encryption protocols of other privacy computing platforms, so that the usability and the expandability of the multi-party fusion computing system are facilitated.
Referring to fig. 5, a schematic flowchart illustrating an embodiment of an encryption protocol conversion method according to the present invention is shown, where the method is applicable to a privacy routing server, where the privacy routing server supports a generic encryption protocol, and the method may include:
step 501, a data plane component and a first privacy computing platform execute a first interactive operation based on ciphertext, and first ciphertext data held by the first privacy computing platform is converted into intermediate ciphertext data held by the data plane component, wherein the first ciphertext data conforms to a first encryption protocol, the first encryption protocol is an encryption protocol supported by the first privacy computing platform, and the intermediate ciphertext data conforms to a general encryption protocol;
step 502, performing a second cipher-based interactive operation with a second privacy computing platform through the data plane component, and converting the intermediate cipher text data held by the data plane component into second cipher text data held by the second privacy computing platform, where the second cipher text data conforms to a second encryption protocol, and the second encryption protocol is an encryption protocol supported by the second privacy computing platform.
Optionally, the universal encryption protocol includes a (2,2) threshold secret sharing protocol, the privacy routing server includes at least two privacy routing nodes, the intermediate ciphertext data includes two secret sharing fragments, and the two secret sharing fragments are respectively held by the two privacy routing nodes.
Optionally, two privacy routing nodes holding the two secret sharing fragments respectively belong to different administrative domains.
Optionally, the administrative domain of the privacy routing node holding one of the secret sharing segments belongs to the first privacy computing platform, and the administrative domain of the privacy routing node holding another one of the secret sharing segments belongs to the second privacy computing platform.
Optionally, the method further comprises:
receiving a multi-party fusion computing task through a control surface assembly, and respectively issuing task configuration information of the multi-party fusion computing task to the first privacy computing platform and the second privacy computing platform, so that the first privacy computing platform and the second privacy computing platform respectively perform ciphertext computing by using privacy data provided by respective data sources according to the task configuration information, and perform ciphertext data interaction through the privacy routing server to cooperatively execute the multi-party fusion computing task.
Optionally, the method further comprises:
initializing a routing configuration table through the control plane component, wherein routing information of each node accessed to the privacy routing server side is recorded in the routing configuration table;
and when the privacy routing server side is accessed to a new privacy computing platform, updating the routing configuration table through the control plane component according to the routing information of each node in the new privacy computing platform.
Optionally, the first encryption protocol comprises a homomorphic encryption protocol, the second encryption protocol comprises a secret sharing protocol; alternatively, the first encryption protocol comprises a secret sharing protocol and the second encryption protocol comprises a homomorphic encryption protocol.
Optionally, the common encryption protocol is determined jointly according to the first encryption protocol and the second encryption protocol.
The embodiment of the invention provides an encryption protocol conversion method applicable to a privacy routing server, wherein the privacy routing server supports a universal encryption protocol. First ciphertext data under a first encryption protocol from a first privacy computing platform is converted into intermediate ciphertext data under a general encryption protocol through first ciphertext-based interactive operation executed by the privacy routing server and the first privacy computing platform, and then the intermediate ciphertext data is converted into second ciphertext data under a second encryption protocol supported by a second privacy computing platform through second ciphertext-based interactive operation executed by the privacy routing server and the second privacy computing platform, so that ciphertext data conversion and interaction between the first privacy computing platform and the second privacy computing platform are realized, and cross-platform fusion computing of the first privacy computing platform and the second privacy computing platform is realized. By the embodiment of the invention, multi-party fusion calculation among a plurality of privacy calculation platforms using different encryption protocols can be realized, conversion and interaction of ciphertext data are executed in a secret state, and respective privacy data cannot be exposed among the privacy calculation platforms. In addition, through the privacy routing server provided by the invention, each privacy computing platform only needs to pay attention to how to convert ciphertext data under the self encryption protocol into intermediate ciphertext data under the general encryption protocol, and does not need to pay attention to how to convert ciphertext data under the self encryption protocol into ciphertext data under the encryption protocols of other privacy computing platforms, so that the usability and the expandability of the multi-party fusion computing system are facilitated.
It should be noted that for simplicity of description, the method embodiments are shown as a series of combinations of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
With regard to the method in the above-described embodiment, the specific manner in which each step performs an operation has been described in detail in the foregoing device embodiment, and will not be described in detail here.
Fig. 6 is a schematic diagram of a server in some embodiments of the invention. The server 1900 may vary widely by configuration or performance and may include one or more Central Processing Units (CPUs) 1922 (e.g., one or more processors) and memory 1932, one or more storage media 1930 (e.g., one or more mass storage devices) storing applications 1942 or data 1944. Memory 1932 and storage medium 1930 can be, among other things, transient or persistent storage. The program stored in the storage medium 1930 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a server. Still further, a central processor 1922 may be provided in communication with the storage medium 1930 to execute a series of instruction operations in the storage medium 1930 on the server 1900.
The server 1900 may also include one or more power supplies 1926, one or more wired or wireless network interfaces 1950, one or more input-output interfaces 1958, one or more keyboards 1956, and/or one or more operating systems 1941, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
A non-transitory computer-readable storage medium in which instructions, when executed by a processor of an apparatus (server or terminal), enable the apparatus to perform the encryption protocol conversion method shown in fig. 5.
A non-transitory computer-readable storage medium, wherein instructions in the storage medium, when executed by a processor of a device (server or terminal), enable the device to perform the description of the encryption protocol conversion method in the embodiment corresponding to fig. 5, and therefore, the description thereof will not be repeated herein. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in the embodiments of the computer program product or the computer program referred to in the present application, reference is made to the description of the embodiments of the method of the present application.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements that have been described above and shown in the drawings, and that various modifications and changes can be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.
The privacy routing server, the encryption protocol conversion method and the machine-readable storage medium provided by the invention are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the above embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (17)

1. A privacy routing server, wherein the privacy routing server supports a universal encryption protocol, and wherein the privacy routing server comprises:
the data plane component is used for executing first interactive operation based on ciphertext with a first privacy computing platform and converting first ciphertext data held by the first privacy computing platform into intermediate ciphertext data held by the data plane component, wherein the first ciphertext data conforms to a first encryption protocol, the first encryption protocol is an encryption protocol supported by the first privacy computing platform, and the intermediate ciphertext data conforms to the general encryption protocol;
the data plane component is further configured to perform a second interactive operation based on a ciphertext with a second privacy computing platform, and convert the intermediate ciphertext data held by the data plane component into second ciphertext data held by the second privacy computing platform, where the second ciphertext data conforms to a second encryption protocol, and the second encryption protocol is an encryption protocol supported by the second privacy computing platform.
2. The privacy routing server of claim 1, wherein the universal encryption protocol comprises a (2,2) threshold secret sharing protocol, the privacy routing server comprises at least two privacy routing nodes, and the intermediate ciphertext data comprises two secret sharing fragments, and the two secret sharing fragments are respectively held by the two privacy routing nodes.
3. The privacy routing server of claim 2, wherein two privacy routing nodes respectively holding the two privacy sharing segments belong to different administrative domains.
4. The privacy routing server side according to claim 3, wherein the administrative domain of the privacy routing node holding one of the privacy sharing segments belongs to the first privacy computing platform, and the administrative domain of the privacy routing node holding another one of the privacy sharing segments belongs to the second privacy computing platform.
5. The privacy routing server of claim 1, further comprising a control plane component, configured to receive a multi-party fusion computation task, and send task configuration information of the multi-party fusion computation task to the first privacy computation platform and the second privacy computation platform, respectively, so that the first privacy computation platform and the second privacy computation platform perform ciphertext computation according to the task configuration information by using privacy data provided by their respective data sources, and perform ciphertext data interaction through the privacy routing server, so as to cooperatively execute the multi-party fusion computation task.
6. The privacy routing server of claim 5, wherein the control plane component is further configured to initialize a routing configuration table, where routing information of each node accessing the privacy routing server is recorded in the routing configuration table, and when the privacy routing server accesses a new privacy computing platform, the routing configuration table is updated according to the routing information of each node in the new privacy computing platform.
7. The privacy routing server of any one of claims 1 to 6, wherein the first encryption protocol comprises a homomorphic encryption protocol and the second encryption protocol comprises a secret sharing protocol; alternatively, the first encryption protocol comprises a secret sharing protocol and the second encryption protocol comprises a homomorphic encryption protocol.
8. The privacy routing server of any one of claims 1 to 6, wherein the generic encryption protocol is determined jointly based on the first encryption protocol and the second encryption protocol.
9. An encryption protocol conversion method is applied to a privacy routing server side, and the privacy routing server side supports a general encryption protocol, and the method comprises the following steps:
executing a first interactive operation based on a ciphertext with a first privacy computing platform through a data surface component, and converting first ciphertext data held by the first privacy computing platform into intermediate ciphertext data held by the data surface component, wherein the first ciphertext data conforms to a first encryption protocol, the first encryption protocol is an encryption protocol supported by the first privacy computing platform, and the intermediate ciphertext data conforms to a general encryption protocol;
and executing second interactive operation based on ciphertext through the data surface component and a second privacy computing platform, and converting the intermediate ciphertext data held by the data surface component into second ciphertext data held by the second privacy computing platform, wherein the second ciphertext data conforms to a second encryption protocol, and the second encryption protocol is an encryption protocol supported by the second privacy computing platform.
10. The method according to claim 9, wherein the common encryption protocol comprises a (2,2) threshold secret sharing protocol, the privacy routing server includes at least two privacy routing nodes, and the intermediate ciphertext data includes two secret sharing fragments, and the two secret sharing fragments are respectively held by the two privacy routing nodes.
11. The method according to claim 10, wherein two privacy routing nodes respectively holding the two secret sharing slices belong to different administrative domains.
12. The method according to claim 11, wherein the administrative domain of the privacy routing node holding one of the secret sharing slices belongs to the first privacy computing platform, and the administrative domain of the privacy routing node holding another one of the secret sharing slices belongs to the second privacy computing platform.
13. The method of claim 9, further comprising:
receiving a multi-party fusion computing task through a control surface assembly, and respectively issuing task configuration information of the multi-party fusion computing task to the first privacy computing platform and the second privacy computing platform, so that the first privacy computing platform and the second privacy computing platform respectively perform ciphertext computing by using privacy data provided by respective data sources according to the task configuration information, and perform ciphertext data interaction through the privacy routing server to cooperatively execute the multi-party fusion computing task.
14. The method of claim 13, further comprising:
initializing a routing configuration table through the control plane component, wherein the routing configuration table records routing information of each node accessed to the privacy routing server;
and when the privacy routing server side is accessed to a new privacy computing platform, updating the routing configuration table through the control plane component according to the routing information of each node in the new privacy computing platform.
15. The method of any of claims 9 to 14, wherein the first encryption protocol comprises a homomorphic encryption protocol and the second encryption protocol comprises a secret sharing protocol; alternatively, the first encryption protocol comprises a secret sharing protocol and the second encryption protocol comprises a homomorphic encryption protocol.
16. The method according to any of claims 9 to 14, wherein the generic encryption protocol is determined jointly based on the first encryption protocol and the second encryption protocol.
17. A machine-readable storage medium having stored thereon instructions which, when executed by one or more processors of an apparatus, cause the apparatus to perform the cryptographic protocol conversion method of any of claims 9 to 16.
CN202210434859.8A 2022-04-24 2022-04-24 Privacy routing server, encryption protocol conversion method and machine readable storage medium Pending CN114944936A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210434859.8A CN114944936A (en) 2022-04-24 2022-04-24 Privacy routing server, encryption protocol conversion method and machine readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210434859.8A CN114944936A (en) 2022-04-24 2022-04-24 Privacy routing server, encryption protocol conversion method and machine readable storage medium

Publications (1)

Publication Number Publication Date
CN114944936A true CN114944936A (en) 2022-08-26

Family

ID=82907402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210434859.8A Pending CN114944936A (en) 2022-04-24 2022-04-24 Privacy routing server, encryption protocol conversion method and machine readable storage medium

Country Status (1)

Country Link
CN (1) CN114944936A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913790A (en) * 2023-03-03 2023-04-04 蓝象智联(杭州)科技有限公司 Data transmission method based on private computing network, electronic equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0969831A (en) * 1995-08-31 1997-03-11 Hitachi Ltd Cipher communication system
KR20180031107A (en) * 2016-09-19 2018-03-28 코나아이 (주) Apparatus and method for converting to common protocol
WO2018127004A1 (en) * 2017-01-03 2018-07-12 北京奇虎科技有限公司 Conversion method and device for encapsulation protocol of stream data
US10289816B1 (en) * 2018-06-08 2019-05-14 Gsfm Llc Methods, systems, and devices for an encrypted and obfuscated algorithm in a computing environment
CN111031352A (en) * 2019-12-02 2020-04-17 北京奇艺世纪科技有限公司 Audio and video encryption method, security processing method, device and storage medium
CN111783129A (en) * 2020-07-24 2020-10-16 支付宝(杭州)信息技术有限公司 Data processing method and system for protecting privacy
CN112597523A (en) * 2021-03-02 2021-04-02 冷杉云(北京)科技股份有限公司 File processing method, file conversion encryption machine, terminal, server and medium
CN113111356A (en) * 2021-03-09 2021-07-13 深圳市教育信息技术中心(深圳市教育装备中心) Data encryption method, device, equipment and medium
CN113254956A (en) * 2021-05-07 2021-08-13 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN113783687A (en) * 2021-09-07 2021-12-10 浙江吉利控股集团有限公司 Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile
CN114003971A (en) * 2021-11-17 2022-02-01 国网江苏省电力有限公司物资分公司 Material storage, inspection and distribution full-flow information management method based on block chain technology
US20220060314A1 (en) * 2020-08-18 2022-02-24 Seagate Technology Llc Privacy preserving fully homomorphic encryption with circuit verification

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0969831A (en) * 1995-08-31 1997-03-11 Hitachi Ltd Cipher communication system
KR20180031107A (en) * 2016-09-19 2018-03-28 코나아이 (주) Apparatus and method for converting to common protocol
WO2018127004A1 (en) * 2017-01-03 2018-07-12 北京奇虎科技有限公司 Conversion method and device for encapsulation protocol of stream data
US10289816B1 (en) * 2018-06-08 2019-05-14 Gsfm Llc Methods, systems, and devices for an encrypted and obfuscated algorithm in a computing environment
CN111031352A (en) * 2019-12-02 2020-04-17 北京奇艺世纪科技有限公司 Audio and video encryption method, security processing method, device and storage medium
CN111783129A (en) * 2020-07-24 2020-10-16 支付宝(杭州)信息技术有限公司 Data processing method and system for protecting privacy
US20220060314A1 (en) * 2020-08-18 2022-02-24 Seagate Technology Llc Privacy preserving fully homomorphic encryption with circuit verification
CN112597523A (en) * 2021-03-02 2021-04-02 冷杉云(北京)科技股份有限公司 File processing method, file conversion encryption machine, terminal, server and medium
CN113111356A (en) * 2021-03-09 2021-07-13 深圳市教育信息技术中心(深圳市教育装备中心) Data encryption method, device, equipment and medium
CN113254956A (en) * 2021-05-07 2021-08-13 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN113783687A (en) * 2021-09-07 2021-12-10 浙江吉利控股集团有限公司 Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile
CN114003971A (en) * 2021-11-17 2022-02-01 国网江苏省电力有限公司物资分公司 Material storage, inspection and distribution full-flow information management method based on block chain technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913790A (en) * 2023-03-03 2023-04-04 蓝象智联(杭州)科技有限公司 Data transmission method based on private computing network, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
Hohenberger et al. Online/offline attribute-based encryption
CN109246098B (en) Method for supporting comparison of synchronous ciphertext of backup server
CN113179150B (en) Homomorphic privacy set intersection method based on order preserving function
CN114944935A (en) Multi-party fusion computing system, multi-party fusion computing method and readable storage medium
JP6363032B2 (en) Key change direction control system and key change direction control method
Das Secure cloud computing algorithm using homomorphic encryption and multi-party computation
CN103873236B (en) One kind can search for encryption method and equipment
Meshram et al. A subtree‐based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing
Li et al. Privacy-aware secure anonymous communication protocol in CPSS cloud computing
Sarma et al. PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT
CN114268439A (en) Identity-based authentication key negotiation method based on lattice
Sathi et al. Novel protocols to mitigate network slice topology learning attacks and protect privacy of users’ service access behavior in softwarized 5G networks
Wang et al. Privacy preserving computations over healthcare data
Bakiras et al. Secure and anonymous communications over delay tolerant networks
Fan et al. An efficient data protection scheme based on hierarchical ID-based encryption for MQTT
Al-Zubi et al. Efficient signcryption scheme based on El-Gamal and Schnorr
CN114944936A (en) Privacy routing server, encryption protocol conversion method and machine readable storage medium
Jalali et al. Federated learning security and privacy-preserving algorithm and experiments research under internet of things critical infrastructure
Fakhar et al. Management of symmetric cryptographic keys in cloud based environment
CN114944934A (en) Federated learning method and system, first privacy computing platform and second privacy computing platform
Al-Shablan et al. Secure multi-owner-based cloud computing scheme for big data
Ramezanian et al. Lightweight privacy-preserving ride-sharing protocols for autonomous cars
Carls et al. Overview of multiple user encryption for exchange of private data via blockchains
Drosatos et al. An efficient privacy-preserving solution for finding the nearest doctor
Sakuma et al. Link analysis for private weighted graphs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination