CN116760647B - Parameter self-adaption-based multiparty security computing method, system and storage medium - Google Patents
Parameter self-adaption-based multiparty security computing method, system and storage medium Download PDFInfo
- Publication number
- CN116760647B CN116760647B CN202311059002.3A CN202311059002A CN116760647B CN 116760647 B CN116760647 B CN 116760647B CN 202311059002 A CN202311059002 A CN 202311059002A CN 116760647 B CN116760647 B CN 116760647B
- Authority
- CN
- China
- Prior art keywords
- algorithm
- parameter
- parameter list
- cache
- logic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004364 calculation method Methods 0.000 title claims abstract description 33
- 238000000034 method Methods 0.000 claims abstract description 33
- 230000008569 process Effects 0.000 claims description 20
- 230000003044 adaptive effect Effects 0.000 claims description 16
- 230000003993 interaction Effects 0.000 claims description 14
- 230000006978 adaptation Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The application discloses a multiparty security computing method, a multiparty security computing system and a storage medium based on parameter self-adaption, wherein the method comprises the following steps: acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache; acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list; and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result. The application can be quickly presented on the front end interface under the condition of changing the XSCE algorithm and adjusting the new algorithm, the characteristic parameters and the like, and is provided for users to use, thereby expanding the use range and the scene of the existing products and having wide requirements in practical application.
Description
Technical Field
The application relates to the technical field of data processing, in particular to a multiparty security computing method, system and storage medium based on parameter self-adaption.
Background
XSCE (XDP Secure Computing Engine) provides the most common MPC algorithm as a unified MPC framework, which is easily integrated by upper layer applications. The XSCE is a multiparty security computing framework based on a multiparty security computing protocol based on cryptography, and the current framework provides different parameter configuration interfaces for different algorithms.
However, with the increasing of XSCE algorithms, the increasing of algorithm parameters and the increasing of hardware platforms for algorithm operation, the development of a matched front-end interface and the development of a back-end server are required, and meanwhile, different algorithm interface styles are not uniform due to different algorithms, so that users are familiar with the use modes of the algorithms, the mode cannot quickly respond to the demands of the XSCE algorithms, and new functions and new characteristics of the XSCE algorithms cannot be quickly popularized.
Disclosure of Invention
The application aims to provide a multiparty safety calculation method, a multiparty safety calculation system and a multiparty safety calculation storage medium based on parameter adaptation, which can be rapidly presented on a front-end interface for users to use under the condition that an XSCE algorithm is changed, a new algorithm, characteristic parameters and the like are adjusted, expands the use range and the scene of the existing products, and has wide requirements in practical application.
The application provides a multiparty security calculation method based on parameter self-adaption, which comprises the following steps:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
In this scheme, when the second back end has no preset algorithm version update, temporary caching is performed on the request parameters based on the front end and the first back end, where the first back end includes a web server, the second back end includes an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end includes an XSCE algorithm.
In this solution, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
In this solution, the method further includes configuration parameter display, which specifically includes:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
In this scheme, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
In this solution, after the parameter configuration based on the combined data is completed, algorithm logic is executed based on the algorithm configuration, and an output result of the algorithm logic is displayed, which specifically includes:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
The second aspect of the present application also provides a parameter-based adaptive multiparty security computing system, comprising a memory and a processor, wherein the memory includes a parameter-based adaptive multiparty security computing method program, and the parameter-based adaptive multiparty security computing method program, when executed by the processor, implements the following steps:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
In this scheme, when the second back end has no preset algorithm version update, temporary caching is performed on the request parameters based on the front end and the first back end, where the first back end includes a web server, the second back end includes an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end includes an XSCE algorithm.
In this solution, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
In this solution, the method further includes configuration parameter display, which specifically includes:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
In this scheme, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
In this solution, after the parameter configuration based on the combined data is completed, algorithm logic is executed based on the algorithm configuration, and an output result of the algorithm logic is displayed, which specifically includes:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
A third aspect of the present application provides a computer readable storage medium comprising a parameter-based adaptive multi-party security calculation method program of a machine, which when executed by a processor, implements the steps of a parameter-based adaptive multi-party security calculation method as described in any of the preceding claims.
The parameter self-adaption-based multiparty safe computing method, system and storage medium disclosed by the application can be quickly presented on a front-end interface for users to use under the condition that an XSCE algorithm is changed, a new algorithm, characteristic parameters and the like are adjusted, so that the application range and scene of the existing product are expanded, and the actual application has wide requirements.
Drawings
FIG. 1 illustrates a flow chart of a parameter-adaptive-based multiparty security computing method of the present application;
FIG. 2 illustrates a front-end interface diagram of a parameter-adaptive-based multi-party security computing method of the present application;
FIG. 3 illustrates a block diagram of a parameter-based adaptive multi-party secure computing system in accordance with the present application.
Detailed Description
In order that the above-recited objects, features and advantages of the present application will be more clearly understood, a more particular description of the application will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, however, the present application may be practiced in other ways than those described herein, and therefore the scope of the present application is not limited to the specific embodiments disclosed below.
Specifically, the application aims to provide a parameter self-adaptive configuration method, which abstracts and componentizes the execution process of an XSCE algorithm, provides a configuration interface with a unified style for a user, and enables a front-end UI interface and a back-end web service not to be independently developed under the condition of changing the XSCE algorithm and parameters, and to quickly respond to the change of the XSCE algorithm so that the user can quickly experience new algorithms and new characteristics of the XSCE.
FIG. 1 illustrates a flow chart of a parameter-adaptive-based multiparty security computing method of the present application.
As shown in fig. 1, the application discloses a multiparty security calculation method based on parameter self-adaption, which comprises the following steps:
s102, acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
s104, acquiring combined data of a user on a front-end interface to perform parameter configuration, wherein the front-end interface comprises the parameter list;
and S106, executing algorithm logic based on the algorithm configuration after the parameter configuration is completed based on the combined data, and displaying an algorithm logic output result.
It should be noted that, in this embodiment, a user may perform component combination on the front-end interface in a drag manner, so that it is first ensured that parameters on the front-end interface may be configured, specifically, a parameter list is obtained to obtain the front-end interface, where when the parameter list is obtained, the parameter list may be obtained based on a front-end cache, or the parameter list may be obtained based on a first back-end cache, or the parameter list may be obtained based on a second back-end cache, after the front-end interface is configured, the combined data of the user on the front-end interface is obtained to perform parameter configuration, so that an algorithm logic may be executed based on the configured algorithm component to display an algorithm logic output result, so that a changing XSCE algorithm and its parameters may be quickly presented for the user to use, and the application of multiparty safe calculation in a complex and changeable environment is effectively supported.
According to the embodiment of the application, when the second back end does not update the preset algorithm version, temporary caching is performed on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end comprises an XSCE algorithm.
It should be noted that, when the parameter list is obtained according to the foregoing embodiment, the parameter list may be obtained based on a front-end cache, specifically, in this embodiment, when the second back-end has no preset algorithm version update, temporary caching processing may be performed on the request parameter based on the front-end and the first back-end, where the first back-end includes a network server, and the second back-end includes an algorithm dispatcher, where the preset algorithm in the algorithm dispatcher includes an XSCE algorithm, so that the front-end cache may be obtained based on the temporary cache of the front-end, so as to obtain the parameter list, that is, when the configuration parameter request is made, the algorithm supported by XSCE and the configuration parameter thereof are first requested from the back-end, and if there is a request before and the XSCE has no version update, the parameter list cached by the front-end is directly used, and the request from the back-end is not needed.
According to an embodiment of the present application, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
It should be noted that, when the parameter list is obtained in the foregoing embodiment, the parameter list may be obtained based on the first back-end cache, or the parameter list may be obtained based on the second back-end cache, and in this embodiment, if the request parameter is not identified, or the XSCE algorithm has a version update, the parameter list is obtained based on the cache of the network server, that is, if the parameter is not previously requested, or the XSCE has a version update, the parameter request is sent to the network server, and if the network server has a cache, the parameter list is directly obtained from the cache; if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on the algorithm dispatcher end to obtain the parameter list, namely directly requesting parameters from the algorithm dispatcher end if the front end and the first rear end do not have the cache, wherein the configuration parameters of the XSCE are stored in the algorithm dispatcher end so as to return all algorithms supported by the XSCE of the current version and the parameter list thereof.
According to the embodiment of the application, the method further comprises the step of configuring parameter display, and specifically comprises the following steps:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
It should be noted that, in this embodiment, after the front end requests the parameter list corresponding to the algorithm, the parameter needs to be presented in an abstract and componentized manner, so that the user can configure the parameter flexibly, as shown in fig. 2, the configuration interface abstracts each algorithm into an operator, and abstracts processes such as input and output, so as to form a basic operator component, the components have respective configuration parameters, the components can be combined in any pipeline manner, the output of one component can be used as the input of another component, and by this manner, the user can combine flexibly according to the basic operator, so as to complete a more complex multiparty safe calculation task.
According to an embodiment of the present application, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
It should be noted that, in this embodiment, a user may perform operator component combination on a front end interface, so that a corresponding combination order needs to be obtained by acquiring drag data of the user on the front end interface, so that based on a result of the combination order, the basic operator component obtains an ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
According to an embodiment of the present application, after the parameter configuration based on the combined data is completed, executing an algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result, specifically including:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It should be noted that, in this embodiment, after the operator component and the algorithm logic are selected by the user, logic execution needs to be performed on the combined data, where the combined data is issued to the first back end and the second back end for interaction based on the input/output execution logic, specifically, after the configuration is completed, the front end may issue an algorithm execution command, issue the configuration logic to the back end in JSON format, and the back end interacts with the second back end algorithm dispatcher through the first back end network server, and the XSCE algorithm in the algorithm dispatcher executes the algorithm logic; and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It is worth mentioning that the method further comprises:
identifying a logical rational degree value of the ordered combination;
and judging based on the reasonable degree value, wherein,
if the reasonable degree value is lower than a first threshold value, reminding a user of logic errors, stopping the process, and waiting for user feedback;
if the reasonable degree value is between the first threshold value and the second threshold value, reminding the user of logic errors, not stopping the process, and continuing to execute the algorithm logic.
It should be noted that, in this embodiment, since a problem of logic error may occur when a user selects a combination, in actual detection, it is necessary to identify a logic reasonable degree value besides ensuring that input and output of logic itself are complete, where if the reasonable degree value is lower than a first threshold, the user is reminded of logic error, and the process is terminated, and waiting for user feedback, that is, it is indicated that the current ordered combination cannot normally execute algorithm logic, and the user is required to feed back a new ordered combination again; if the reasonable degree value is between the first threshold value and the second threshold value, the user is reminded of logic errors, the process is not stopped, the algorithm logic is continuously executed, namely logic errors exist, but the execution of the algorithm logic is not affected, so that the algorithm logic can be continuously executed without stopping the process at the moment, but the user is informed to remind of logic errors.
It should be noted that the identifying the logical rational degree value of the ordered combination specifically includes:
extracting the number values of all basic operator components in the current ordered combination as denominator values;
based on the subsequent output of each basic operator component, reference empirical analysis is performed to identify a corresponding proportional molecular value for each basic operator component;
and comparing and calculating the logical reasonable degree value based on the proportional molecular value and the denominator value.
It should be noted that, in this embodiment, the value of the scale molecular value is "1" at the maximum and "0" at the minimum, where a reference value exists in the subsequent input of each basic operator component, for example, the subsequent reference value of the a operator is the B operator, if the current ordered combination has a total of "5" operators, where the a operator exists, and the operator corresponding to the subsequent output of the current a operator is the B, then the reference scale molecular value of the position is "1", and the calculation result is "B"If the operator corresponding to the subsequent output of the current operator A is C, the reference proportion molecular value of the position is 0, and the calculation result is \ "per>The reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, the reference value of the position is "50%", and the calculation result is "50%", if the current ordered combination has 5 operators, wherein the A operator and the E operator exist, and the operator corresponding to the subsequent output of the current A operator is B, the reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, and the reference value of the position is "50%", and the calculation result is "", is" 90% ".
FIG. 3 illustrates a block diagram of a parameter-based adaptive multi-party secure computing system in accordance with the present application.
As shown in fig. 3, the application discloses a parameter-based adaptive multiparty security computing system, which comprises a memory and a processor, wherein the memory comprises a parameter-based adaptive multiparty security computing method program, and the parameter-based adaptive multiparty security computing method program realizes the following steps when being executed by the processor:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
It should be noted that, in this embodiment, a user may perform component combination on the front-end interface in a drag manner, so that it is first ensured that parameters on the front-end interface may be configured, specifically, a parameter list is obtained to obtain the front-end interface, where when the parameter list is obtained, the parameter list may be obtained based on a front-end cache, or the parameter list may be obtained based on a first back-end cache, or the parameter list may be obtained based on a second back-end cache, after the front-end interface is configured, the combined data of the user on the front-end interface is obtained to perform parameter configuration, so that an algorithm logic may be executed based on the configured algorithm component to display an algorithm logic output result, so that a changing XSCE algorithm and its parameters may be quickly presented for the user to use, and the application of multiparty safe calculation in a complex and changeable environment is effectively supported.
According to the embodiment of the application, when the second back end does not update the preset algorithm version, temporary caching is performed on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end comprises an XSCE algorithm.
It should be noted that, when the parameter list is obtained according to the foregoing embodiment, the parameter list may be obtained based on a front-end cache, specifically, in this embodiment, when the second back-end has no preset algorithm version update, temporary caching processing may be performed on the request parameter based on the front-end and the first back-end, where the first back-end includes a network server, and the second back-end includes an algorithm dispatcher, where the preset algorithm in the algorithm dispatcher includes an XSCE algorithm, so that the front-end cache may be obtained based on the temporary cache of the front-end, so as to obtain the parameter list, that is, when the configuration parameter request is made, the algorithm supported by XSCE and the configuration parameter thereof are first requested from the back-end, and if there is a request before and the XSCE has no version update, the parameter list cached by the front-end is directly used, and the request from the back-end is not needed.
According to an embodiment of the present application, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
It should be noted that, when the parameter list is obtained in the foregoing embodiment, the parameter list may be obtained based on the first back-end cache, or the parameter list may be obtained based on the second back-end cache, and in this embodiment, if the request parameter is not identified, or the XSCE algorithm has a version update, the parameter list is obtained based on the cache of the network server, that is, if the parameter is not previously requested, or the XSCE has a version update, the parameter request is sent to the network server, and if the network server has a cache, the parameter list is directly obtained from the cache; if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on the algorithm dispatcher end to obtain the parameter list, namely directly requesting parameters from the algorithm dispatcher end if the front end and the first rear end do not have the cache, wherein the configuration parameters of the XSCE are stored in the algorithm dispatcher end so as to return all algorithms supported by the XSCE of the current version and the parameter list thereof.
According to the embodiment of the application, the method further comprises the step of configuring parameter display, and specifically comprises the following steps:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
It should be noted that, in this embodiment, after the front end requests the parameter list corresponding to the algorithm, the parameter needs to be presented in an abstract and componentized manner, so that the user can configure the parameter flexibly, as shown in fig. 2, the configuration interface abstracts each algorithm into an operator, and abstracts processes such as input and output, so as to form a basic operator component, the components have respective configuration parameters, the components can be combined in any pipeline manner, the output of one component can be used as the input of another component, and by this manner, the user can combine flexibly according to the basic operator, so as to complete a more complex multiparty safe calculation task.
According to an embodiment of the present application, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
It should be noted that, in this embodiment, a user may perform operator component combination on a front end interface, so that a corresponding combination order needs to be obtained by acquiring drag data of the user on the front end interface, so that based on a result of the combination order, the basic operator component obtains an ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
According to an embodiment of the present application, after the parameter configuration based on the combined data is completed, executing an algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result, specifically including:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It should be noted that, in this embodiment, after the operator component and the algorithm logic are selected by the user, logic execution needs to be performed on the combined data, where the combined data is issued to the first back end and the second back end for interaction based on the input/output execution logic, specifically, after the configuration is completed, the front end may issue an algorithm execution command, issue the configuration logic to the back end in JSON format, and the back end interacts with the second back end algorithm dispatcher through the first back end network server, and the XSCE algorithm in the algorithm dispatcher executes the algorithm logic; and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It is worth mentioning that the method further comprises:
identifying a logical rational degree value of the ordered combination;
and judging based on the reasonable degree value, wherein,
if the reasonable degree value is lower than a first threshold value, reminding a user of logic errors, stopping the process, and waiting for user feedback;
if the reasonable degree value is between the first threshold value and the second threshold value, reminding the user of logic errors, not stopping the process, and continuing to execute the algorithm logic.
It should be noted that, in this embodiment, since a problem of logic error may occur when a user selects a combination, in actual detection, it is necessary to identify a logic reasonable degree value besides ensuring that input and output of logic itself are complete, where if the reasonable degree value is lower than a first threshold, the user is reminded of logic error, and the process is terminated, and waiting for user feedback, that is, it is indicated that the current ordered combination cannot normally execute algorithm logic, and the user is required to feed back a new ordered combination again; if the reasonable degree value is between the first threshold value and the second threshold value, the user is reminded of logic errors, the process is not stopped, the algorithm logic is continuously executed, namely logic errors exist, but the execution of the algorithm logic is not affected, so that the algorithm logic can be continuously executed without stopping the process at the moment, but the user is informed to remind of logic errors.
It should be noted that the identifying the logical rational degree value of the ordered combination specifically includes:
extracting the number values of all basic operator components in the current ordered combination as denominator values;
based on the subsequent output of each basic operator component, reference empirical analysis is performed to identify a corresponding proportional molecular value for each basic operator component;
and comparing and calculating the logical reasonable degree value based on the proportional molecular value and the denominator value.
It should be noted that, in this embodiment, the value of the scale molecular value is "1" at the maximum and "0" at the minimum, where a reference value exists in the subsequent input of each basic operator component, for example, the subsequent reference value of the a operator is the B operator, if the current ordered combination has a total of "5" operators, where the a operator exists, and the operator corresponding to the subsequent output of the current a operator is the B, then the reference scale molecular value of the position is "1", and the calculation result is "B"If the operator corresponding to the subsequent output of the current operator A is C, the reference proportion molecular value of the position is 0, and the calculation result is \ "per>The reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, the reference value of the position is "50%", and the calculation result is "50%", if the current ordered combination has 5 operators, wherein the A operator and the E operator exist, and the operator corresponding to the subsequent output of the current A operator is B, the reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, and the reference value of the position is "50%", and the calculation result is "", is" 90% ".
A third aspect of the present application provides a computer readable storage medium comprising a parameter-based adaptive multi-party security calculation method program, which when executed by a processor, implements the steps of a parameter-based adaptive multi-party security calculation method as described in any of the preceding claims.
The parameter self-adaption-based multiparty safe computing method, system and storage medium disclosed by the application can be quickly presented on a front-end interface for users to use under the condition that an XSCE algorithm is changed, a new algorithm, characteristic parameters and the like are adjusted, so that the application range and scene of the existing product are expanded, and the actual application has wide requirements.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, or the like, which can store program codes.
Alternatively, the above-described integrated units of the present application may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in essence or a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.
Claims (6)
1. A parameter-adaptive-based multiparty security computing method, the method comprising:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache; when the second back end does not update the preset algorithm version, performing temporary cache processing on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm dispatcher end, and the preset algorithm in the algorithm dispatcher end comprises an XSCE algorithm;
acquiring a parameter list, and further comprising: if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server; if the network server does not have the cache, acquiring an XSCE algorithm of a current version based on an algorithm dispatcher end to obtain the parameter list;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
2. The parameter-adaptive-based multiparty security computing method according to claim 1, further comprising configuring parameter presentation, specifically comprising:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
3. The parameter-adaptive-based multiparty security computing method according to claim 2, wherein the obtaining the combined data of the user on the front-end interface for parameter configuration specifically comprises:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
4. A multi-party security computing method based on parameter adaptation according to claim 3, wherein after the parameter configuration based on the combined data is completed, the algorithm logic is executed based on the algorithm configuration, and the output result of the algorithm logic is displayed, which specifically comprises:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
5. A parameter-based adaptive multiparty security computing system, comprising a memory and a processor, wherein the memory comprises a parameter-based adaptive multiparty security computing method program, which when executed by the processor, performs the steps of:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache; when the second back end does not update the preset algorithm version, performing temporary cache processing on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm dispatcher end, and the preset algorithm in the algorithm dispatcher end comprises an XSCE algorithm;
acquiring a parameter list, and further comprising: if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server; if the network server does not have the cache, acquiring an XSCE algorithm of a current version based on an algorithm dispatcher end to obtain the parameter list;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
6. A computer readable storage medium, characterized in that it comprises a parameter-based adaptive multiparty security computing method program, which, when executed by a processor, implements the steps of a parameter-based adaptive multiparty security computing method according to any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311059002.3A CN116760647B (en) | 2023-08-22 | 2023-08-22 | Parameter self-adaption-based multiparty security computing method, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311059002.3A CN116760647B (en) | 2023-08-22 | 2023-08-22 | Parameter self-adaption-based multiparty security computing method, system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116760647A CN116760647A (en) | 2023-09-15 |
CN116760647B true CN116760647B (en) | 2023-11-10 |
Family
ID=87950144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311059002.3A Active CN116760647B (en) | 2023-08-22 | 2023-08-22 | Parameter self-adaption-based multiparty security computing method, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116760647B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359470A (en) * | 2018-08-14 | 2019-02-19 | 阿里巴巴集团控股有限公司 | Secure calculation method and device, electronic equipment |
CN114880015A (en) * | 2021-07-26 | 2022-08-09 | 深圳前海微众银行股份有限公司 | Task configuration method, device, equipment and storage medium |
CN115065461A (en) * | 2022-05-13 | 2022-09-16 | 浪潮云信息技术股份公司 | Secure multiparty computing method, system and computer readable medium |
CN115061785A (en) * | 2022-04-15 | 2022-09-16 | 支付宝(杭州)信息技术有限公司 | Information issuing method and device, storage medium and server |
CN115774552A (en) * | 2022-12-19 | 2023-03-10 | 中国平安人寿保险股份有限公司 | Configurated algorithm design method and device, electronic equipment and readable storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11782952B2 (en) * | 2021-08-18 | 2023-10-10 | International Business Machines Corporation | Automation of multi-party computation as a service according to user regulations and requirements |
-
2023
- 2023-08-22 CN CN202311059002.3A patent/CN116760647B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359470A (en) * | 2018-08-14 | 2019-02-19 | 阿里巴巴集团控股有限公司 | Secure calculation method and device, electronic equipment |
CN114880015A (en) * | 2021-07-26 | 2022-08-09 | 深圳前海微众银行股份有限公司 | Task configuration method, device, equipment and storage medium |
CN115061785A (en) * | 2022-04-15 | 2022-09-16 | 支付宝(杭州)信息技术有限公司 | Information issuing method and device, storage medium and server |
CN115065461A (en) * | 2022-05-13 | 2022-09-16 | 浪潮云信息技术股份公司 | Secure multiparty computing method, system and computer readable medium |
CN115774552A (en) * | 2022-12-19 | 2023-03-10 | 中国平安人寿保险股份有限公司 | Configurated algorithm design method and device, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116760647A (en) | 2023-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108153670B (en) | Interface testing method and device and electronic equipment | |
US10686843B2 (en) | Authorization policy recommendation method and apparatus, server, and storage medium | |
US10652315B2 (en) | Method, apparatus, and system for distributing information in graphic code | |
CN110321273B (en) | Service statistics method and device | |
US10922743B1 (en) | Adaptive performance of actions associated with custom user interface controls | |
CN106027644B (en) | Service verification method and system | |
CN110825399B (en) | Deployment method and device of application program | |
CN109218054B (en) | Terminal dynamic configuration, corresponding server implementation method, device and storage medium | |
CN109298960A (en) | Application crashes processing method, device, computer installation and storage medium | |
CN110995539A (en) | Business system monitoring method and device and computer equipment | |
CN114140099A (en) | Project management method based on AIOTDAaS digital twin cloud platform | |
CN110413161B (en) | Component configuration method and device and electronic equipment | |
CN115437933A (en) | Automatic testing method and device, computer equipment and storage medium | |
CN113590097B (en) | API interface generation method and device, electronic equipment and storage medium | |
CN108646577B (en) | Client operation management method and client | |
CN116760647B (en) | Parameter self-adaption-based multiparty security computing method, system and storage medium | |
US11595493B2 (en) | System and method for namespace masking in an integration flow | |
CN113157480A (en) | Error information processing method, device, storage medium and terminal | |
CN107332703B (en) | Method and device for checking multi-application logs | |
US11755310B2 (en) | Prioritized ranking for memory device preparation | |
CN115795203A (en) | Menu page construction method and device, electronic equipment and storage medium | |
CN112631577B (en) | Model scheduling method, model scheduler and model safety test platform | |
CN112114931B (en) | Deep learning program configuration method and device, electronic equipment and storage medium | |
US9497253B2 (en) | Authorization review system | |
CN108848183B (en) | Login method and device for simulation user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |