CN116760647B - Parameter self-adaption-based multiparty security computing method, system and storage medium - Google Patents

Parameter self-adaption-based multiparty security computing method, system and storage medium Download PDF

Info

Publication number
CN116760647B
CN116760647B CN202311059002.3A CN202311059002A CN116760647B CN 116760647 B CN116760647 B CN 116760647B CN 202311059002 A CN202311059002 A CN 202311059002A CN 116760647 B CN116760647 B CN 116760647B
Authority
CN
China
Prior art keywords
algorithm
parameter
parameter list
cache
logic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311059002.3A
Other languages
Chinese (zh)
Other versions
CN116760647A (en
Inventor
李钢
潘光明
杨超
张李军
张�浩
王震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Basebit Shanghai Information Technology Co ltd
Wing Fang Jianshu Beijing Information Technology Co ltd
Original Assignee
Basebit Shanghai Information Technology Co ltd
Wing Fang Jianshu Beijing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Basebit Shanghai Information Technology Co ltd, Wing Fang Jianshu Beijing Information Technology Co ltd filed Critical Basebit Shanghai Information Technology Co ltd
Priority to CN202311059002.3A priority Critical patent/CN116760647B/en
Publication of CN116760647A publication Critical patent/CN116760647A/en
Application granted granted Critical
Publication of CN116760647B publication Critical patent/CN116760647B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application discloses a multiparty security computing method, a multiparty security computing system and a storage medium based on parameter self-adaption, wherein the method comprises the following steps: acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache; acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list; and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result. The application can be quickly presented on the front end interface under the condition of changing the XSCE algorithm and adjusting the new algorithm, the characteristic parameters and the like, and is provided for users to use, thereby expanding the use range and the scene of the existing products and having wide requirements in practical application.

Description

Parameter self-adaption-based multiparty security computing method, system and storage medium
Technical Field
The application relates to the technical field of data processing, in particular to a multiparty security computing method, system and storage medium based on parameter self-adaption.
Background
XSCE (XDP Secure Computing Engine) provides the most common MPC algorithm as a unified MPC framework, which is easily integrated by upper layer applications. The XSCE is a multiparty security computing framework based on a multiparty security computing protocol based on cryptography, and the current framework provides different parameter configuration interfaces for different algorithms.
However, with the increasing of XSCE algorithms, the increasing of algorithm parameters and the increasing of hardware platforms for algorithm operation, the development of a matched front-end interface and the development of a back-end server are required, and meanwhile, different algorithm interface styles are not uniform due to different algorithms, so that users are familiar with the use modes of the algorithms, the mode cannot quickly respond to the demands of the XSCE algorithms, and new functions and new characteristics of the XSCE algorithms cannot be quickly popularized.
Disclosure of Invention
The application aims to provide a multiparty safety calculation method, a multiparty safety calculation system and a multiparty safety calculation storage medium based on parameter adaptation, which can be rapidly presented on a front-end interface for users to use under the condition that an XSCE algorithm is changed, a new algorithm, characteristic parameters and the like are adjusted, expands the use range and the scene of the existing products, and has wide requirements in practical application.
The application provides a multiparty security calculation method based on parameter self-adaption, which comprises the following steps:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
In this scheme, when the second back end has no preset algorithm version update, temporary caching is performed on the request parameters based on the front end and the first back end, where the first back end includes a web server, the second back end includes an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end includes an XSCE algorithm.
In this solution, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
In this solution, the method further includes configuration parameter display, which specifically includes:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
In this scheme, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
In this solution, after the parameter configuration based on the combined data is completed, algorithm logic is executed based on the algorithm configuration, and an output result of the algorithm logic is displayed, which specifically includes:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
The second aspect of the present application also provides a parameter-based adaptive multiparty security computing system, comprising a memory and a processor, wherein the memory includes a parameter-based adaptive multiparty security computing method program, and the parameter-based adaptive multiparty security computing method program, when executed by the processor, implements the following steps:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
In this scheme, when the second back end has no preset algorithm version update, temporary caching is performed on the request parameters based on the front end and the first back end, where the first back end includes a web server, the second back end includes an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end includes an XSCE algorithm.
In this solution, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
In this solution, the method further includes configuration parameter display, which specifically includes:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
In this scheme, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
In this solution, after the parameter configuration based on the combined data is completed, algorithm logic is executed based on the algorithm configuration, and an output result of the algorithm logic is displayed, which specifically includes:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
A third aspect of the present application provides a computer readable storage medium comprising a parameter-based adaptive multi-party security calculation method program of a machine, which when executed by a processor, implements the steps of a parameter-based adaptive multi-party security calculation method as described in any of the preceding claims.
The parameter self-adaption-based multiparty safe computing method, system and storage medium disclosed by the application can be quickly presented on a front-end interface for users to use under the condition that an XSCE algorithm is changed, a new algorithm, characteristic parameters and the like are adjusted, so that the application range and scene of the existing product are expanded, and the actual application has wide requirements.
Drawings
FIG. 1 illustrates a flow chart of a parameter-adaptive-based multiparty security computing method of the present application;
FIG. 2 illustrates a front-end interface diagram of a parameter-adaptive-based multi-party security computing method of the present application;
FIG. 3 illustrates a block diagram of a parameter-based adaptive multi-party secure computing system in accordance with the present application.
Detailed Description
In order that the above-recited objects, features and advantages of the present application will be more clearly understood, a more particular description of the application will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, however, the present application may be practiced in other ways than those described herein, and therefore the scope of the present application is not limited to the specific embodiments disclosed below.
Specifically, the application aims to provide a parameter self-adaptive configuration method, which abstracts and componentizes the execution process of an XSCE algorithm, provides a configuration interface with a unified style for a user, and enables a front-end UI interface and a back-end web service not to be independently developed under the condition of changing the XSCE algorithm and parameters, and to quickly respond to the change of the XSCE algorithm so that the user can quickly experience new algorithms and new characteristics of the XSCE.
FIG. 1 illustrates a flow chart of a parameter-adaptive-based multiparty security computing method of the present application.
As shown in fig. 1, the application discloses a multiparty security calculation method based on parameter self-adaption, which comprises the following steps:
s102, acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
s104, acquiring combined data of a user on a front-end interface to perform parameter configuration, wherein the front-end interface comprises the parameter list;
and S106, executing algorithm logic based on the algorithm configuration after the parameter configuration is completed based on the combined data, and displaying an algorithm logic output result.
It should be noted that, in this embodiment, a user may perform component combination on the front-end interface in a drag manner, so that it is first ensured that parameters on the front-end interface may be configured, specifically, a parameter list is obtained to obtain the front-end interface, where when the parameter list is obtained, the parameter list may be obtained based on a front-end cache, or the parameter list may be obtained based on a first back-end cache, or the parameter list may be obtained based on a second back-end cache, after the front-end interface is configured, the combined data of the user on the front-end interface is obtained to perform parameter configuration, so that an algorithm logic may be executed based on the configured algorithm component to display an algorithm logic output result, so that a changing XSCE algorithm and its parameters may be quickly presented for the user to use, and the application of multiparty safe calculation in a complex and changeable environment is effectively supported.
According to the embodiment of the application, when the second back end does not update the preset algorithm version, temporary caching is performed on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end comprises an XSCE algorithm.
It should be noted that, when the parameter list is obtained according to the foregoing embodiment, the parameter list may be obtained based on a front-end cache, specifically, in this embodiment, when the second back-end has no preset algorithm version update, temporary caching processing may be performed on the request parameter based on the front-end and the first back-end, where the first back-end includes a network server, and the second back-end includes an algorithm dispatcher, where the preset algorithm in the algorithm dispatcher includes an XSCE algorithm, so that the front-end cache may be obtained based on the temporary cache of the front-end, so as to obtain the parameter list, that is, when the configuration parameter request is made, the algorithm supported by XSCE and the configuration parameter thereof are first requested from the back-end, and if there is a request before and the XSCE has no version update, the parameter list cached by the front-end is directly used, and the request from the back-end is not needed.
According to an embodiment of the present application, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
It should be noted that, when the parameter list is obtained in the foregoing embodiment, the parameter list may be obtained based on the first back-end cache, or the parameter list may be obtained based on the second back-end cache, and in this embodiment, if the request parameter is not identified, or the XSCE algorithm has a version update, the parameter list is obtained based on the cache of the network server, that is, if the parameter is not previously requested, or the XSCE has a version update, the parameter request is sent to the network server, and if the network server has a cache, the parameter list is directly obtained from the cache; if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on the algorithm dispatcher end to obtain the parameter list, namely directly requesting parameters from the algorithm dispatcher end if the front end and the first rear end do not have the cache, wherein the configuration parameters of the XSCE are stored in the algorithm dispatcher end so as to return all algorithms supported by the XSCE of the current version and the parameter list thereof.
According to the embodiment of the application, the method further comprises the step of configuring parameter display, and specifically comprises the following steps:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
It should be noted that, in this embodiment, after the front end requests the parameter list corresponding to the algorithm, the parameter needs to be presented in an abstract and componentized manner, so that the user can configure the parameter flexibly, as shown in fig. 2, the configuration interface abstracts each algorithm into an operator, and abstracts processes such as input and output, so as to form a basic operator component, the components have respective configuration parameters, the components can be combined in any pipeline manner, the output of one component can be used as the input of another component, and by this manner, the user can combine flexibly according to the basic operator, so as to complete a more complex multiparty safe calculation task.
According to an embodiment of the present application, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
It should be noted that, in this embodiment, a user may perform operator component combination on a front end interface, so that a corresponding combination order needs to be obtained by acquiring drag data of the user on the front end interface, so that based on a result of the combination order, the basic operator component obtains an ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
According to an embodiment of the present application, after the parameter configuration based on the combined data is completed, executing an algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result, specifically including:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It should be noted that, in this embodiment, after the operator component and the algorithm logic are selected by the user, logic execution needs to be performed on the combined data, where the combined data is issued to the first back end and the second back end for interaction based on the input/output execution logic, specifically, after the configuration is completed, the front end may issue an algorithm execution command, issue the configuration logic to the back end in JSON format, and the back end interacts with the second back end algorithm dispatcher through the first back end network server, and the XSCE algorithm in the algorithm dispatcher executes the algorithm logic; and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It is worth mentioning that the method further comprises:
identifying a logical rational degree value of the ordered combination;
and judging based on the reasonable degree value, wherein,
if the reasonable degree value is lower than a first threshold value, reminding a user of logic errors, stopping the process, and waiting for user feedback;
if the reasonable degree value is between the first threshold value and the second threshold value, reminding the user of logic errors, not stopping the process, and continuing to execute the algorithm logic.
It should be noted that, in this embodiment, since a problem of logic error may occur when a user selects a combination, in actual detection, it is necessary to identify a logic reasonable degree value besides ensuring that input and output of logic itself are complete, where if the reasonable degree value is lower than a first threshold, the user is reminded of logic error, and the process is terminated, and waiting for user feedback, that is, it is indicated that the current ordered combination cannot normally execute algorithm logic, and the user is required to feed back a new ordered combination again; if the reasonable degree value is between the first threshold value and the second threshold value, the user is reminded of logic errors, the process is not stopped, the algorithm logic is continuously executed, namely logic errors exist, but the execution of the algorithm logic is not affected, so that the algorithm logic can be continuously executed without stopping the process at the moment, but the user is informed to remind of logic errors.
It should be noted that the identifying the logical rational degree value of the ordered combination specifically includes:
extracting the number values of all basic operator components in the current ordered combination as denominator values;
based on the subsequent output of each basic operator component, reference empirical analysis is performed to identify a corresponding proportional molecular value for each basic operator component;
and comparing and calculating the logical reasonable degree value based on the proportional molecular value and the denominator value.
It should be noted that, in this embodiment, the value of the scale molecular value is "1" at the maximum and "0" at the minimum, where a reference value exists in the subsequent input of each basic operator component, for example, the subsequent reference value of the a operator is the B operator, if the current ordered combination has a total of "5" operators, where the a operator exists, and the operator corresponding to the subsequent output of the current a operator is the B, then the reference scale molecular value of the position is "1", and the calculation result is "B"If the operator corresponding to the subsequent output of the current operator A is C, the reference proportion molecular value of the position is 0, and the calculation result is \ "per>The reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, the reference value of the position is "50%", and the calculation result is "50%", if the current ordered combination has 5 operators, wherein the A operator and the E operator exist, and the operator corresponding to the subsequent output of the current A operator is B, the reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, and the reference value of the position is "50%", and the calculation result is "", is" 90% ".
FIG. 3 illustrates a block diagram of a parameter-based adaptive multi-party secure computing system in accordance with the present application.
As shown in fig. 3, the application discloses a parameter-based adaptive multiparty security computing system, which comprises a memory and a processor, wherein the memory comprises a parameter-based adaptive multiparty security computing method program, and the parameter-based adaptive multiparty security computing method program realizes the following steps when being executed by the processor:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing the algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
It should be noted that, in this embodiment, a user may perform component combination on the front-end interface in a drag manner, so that it is first ensured that parameters on the front-end interface may be configured, specifically, a parameter list is obtained to obtain the front-end interface, where when the parameter list is obtained, the parameter list may be obtained based on a front-end cache, or the parameter list may be obtained based on a first back-end cache, or the parameter list may be obtained based on a second back-end cache, after the front-end interface is configured, the combined data of the user on the front-end interface is obtained to perform parameter configuration, so that an algorithm logic may be executed based on the configured algorithm component to display an algorithm logic output result, so that a changing XSCE algorithm and its parameters may be quickly presented for the user to use, and the application of multiparty safe calculation in a complex and changeable environment is effectively supported.
According to the embodiment of the application, when the second back end does not update the preset algorithm version, temporary caching is performed on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm scheduler end, and the preset algorithm in the algorithm scheduler end comprises an XSCE algorithm.
It should be noted that, when the parameter list is obtained according to the foregoing embodiment, the parameter list may be obtained based on a front-end cache, specifically, in this embodiment, when the second back-end has no preset algorithm version update, temporary caching processing may be performed on the request parameter based on the front-end and the first back-end, where the first back-end includes a network server, and the second back-end includes an algorithm dispatcher, where the preset algorithm in the algorithm dispatcher includes an XSCE algorithm, so that the front-end cache may be obtained based on the temporary cache of the front-end, so as to obtain the parameter list, that is, when the configuration parameter request is made, the algorithm supported by XSCE and the configuration parameter thereof are first requested from the back-end, and if there is a request before and the XSCE has no version update, the parameter list cached by the front-end is directly used, and the request from the back-end is not needed.
According to an embodiment of the present application, the obtaining the parameter list specifically further includes:
if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server;
and if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on an algorithm dispatcher end to obtain the parameter list.
It should be noted that, when the parameter list is obtained in the foregoing embodiment, the parameter list may be obtained based on the first back-end cache, or the parameter list may be obtained based on the second back-end cache, and in this embodiment, if the request parameter is not identified, or the XSCE algorithm has a version update, the parameter list is obtained based on the cache of the network server, that is, if the parameter is not previously requested, or the XSCE has a version update, the parameter request is sent to the network server, and if the network server has a cache, the parameter list is directly obtained from the cache; if the network server does not have the cache, acquiring an XSCE algorithm of the current version based on the algorithm dispatcher end to obtain the parameter list, namely directly requesting parameters from the algorithm dispatcher end if the front end and the first rear end do not have the cache, wherein the configuration parameters of the XSCE are stored in the algorithm dispatcher end so as to return all algorithms supported by the XSCE of the current version and the parameter list thereof.
According to the embodiment of the application, the method further comprises the step of configuring parameter display, and specifically comprises the following steps:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
It should be noted that, in this embodiment, after the front end requests the parameter list corresponding to the algorithm, the parameter needs to be presented in an abstract and componentized manner, so that the user can configure the parameter flexibly, as shown in fig. 2, the configuration interface abstracts each algorithm into an operator, and abstracts processes such as input and output, so as to form a basic operator component, the components have respective configuration parameters, the components can be combined in any pipeline manner, the output of one component can be used as the input of another component, and by this manner, the user can combine flexibly according to the basic operator, so as to complete a more complex multiparty safe calculation task.
According to an embodiment of the present application, the obtaining the combination data of the user on the front end interface for parameter configuration specifically includes:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
It should be noted that, in this embodiment, a user may perform operator component combination on a front end interface, so that a corresponding combination order needs to be obtained by acquiring drag data of the user on the front end interface, so that based on a result of the combination order, the basic operator component obtains an ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
According to an embodiment of the present application, after the parameter configuration based on the combined data is completed, executing an algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result, specifically including:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It should be noted that, in this embodiment, after the operator component and the algorithm logic are selected by the user, logic execution needs to be performed on the combined data, where the combined data is issued to the first back end and the second back end for interaction based on the input/output execution logic, specifically, after the configuration is completed, the front end may issue an algorithm execution command, issue the configuration logic to the back end in JSON format, and the back end interacts with the second back end algorithm dispatcher through the first back end network server, and the XSCE algorithm in the algorithm dispatcher executes the algorithm logic; and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
It is worth mentioning that the method further comprises:
identifying a logical rational degree value of the ordered combination;
and judging based on the reasonable degree value, wherein,
if the reasonable degree value is lower than a first threshold value, reminding a user of logic errors, stopping the process, and waiting for user feedback;
if the reasonable degree value is between the first threshold value and the second threshold value, reminding the user of logic errors, not stopping the process, and continuing to execute the algorithm logic.
It should be noted that, in this embodiment, since a problem of logic error may occur when a user selects a combination, in actual detection, it is necessary to identify a logic reasonable degree value besides ensuring that input and output of logic itself are complete, where if the reasonable degree value is lower than a first threshold, the user is reminded of logic error, and the process is terminated, and waiting for user feedback, that is, it is indicated that the current ordered combination cannot normally execute algorithm logic, and the user is required to feed back a new ordered combination again; if the reasonable degree value is between the first threshold value and the second threshold value, the user is reminded of logic errors, the process is not stopped, the algorithm logic is continuously executed, namely logic errors exist, but the execution of the algorithm logic is not affected, so that the algorithm logic can be continuously executed without stopping the process at the moment, but the user is informed to remind of logic errors.
It should be noted that the identifying the logical rational degree value of the ordered combination specifically includes:
extracting the number values of all basic operator components in the current ordered combination as denominator values;
based on the subsequent output of each basic operator component, reference empirical analysis is performed to identify a corresponding proportional molecular value for each basic operator component;
and comparing and calculating the logical reasonable degree value based on the proportional molecular value and the denominator value.
It should be noted that, in this embodiment, the value of the scale molecular value is "1" at the maximum and "0" at the minimum, where a reference value exists in the subsequent input of each basic operator component, for example, the subsequent reference value of the a operator is the B operator, if the current ordered combination has a total of "5" operators, where the a operator exists, and the operator corresponding to the subsequent output of the current a operator is the B, then the reference scale molecular value of the position is "1", and the calculation result is "B"If the operator corresponding to the subsequent output of the current operator A is C, the reference proportion molecular value of the position is 0, and the calculation result is \ "per>The reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, the reference value of the position is "50%", and the calculation result is "50%", if the current ordered combination has 5 operators, wherein the A operator and the E operator exist, and the operator corresponding to the subsequent output of the current A operator is B, the reference value of the position is "1", the operator corresponding to the subsequent output of the E operator is F, and the reference value of the position is "50%", and the calculation result is "", is" 90% ".
A third aspect of the present application provides a computer readable storage medium comprising a parameter-based adaptive multi-party security calculation method program, which when executed by a processor, implements the steps of a parameter-based adaptive multi-party security calculation method as described in any of the preceding claims.
The parameter self-adaption-based multiparty safe computing method, system and storage medium disclosed by the application can be quickly presented on a front-end interface for users to use under the condition that an XSCE algorithm is changed, a new algorithm, characteristic parameters and the like are adjusted, so that the application range and scene of the existing product are expanded, and the actual application has wide requirements.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, or the like, which can store program codes.
Alternatively, the above-described integrated units of the present application may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in essence or a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.

Claims (6)

1. A parameter-adaptive-based multiparty security computing method, the method comprising:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache; when the second back end does not update the preset algorithm version, performing temporary cache processing on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm dispatcher end, and the preset algorithm in the algorithm dispatcher end comprises an XSCE algorithm;
acquiring a parameter list, and further comprising: if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server; if the network server does not have the cache, acquiring an XSCE algorithm of a current version based on an algorithm dispatcher end to obtain the parameter list;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
2. The parameter-adaptive-based multiparty security computing method according to claim 1, further comprising configuring parameter presentation, specifically comprising:
the front-end interface is presented in an abstract componentization manner based on the parameter list, wherein,
abstracting each algorithm into operators, and abstracting the input and output of the algorithm to obtain a basic operator component;
the different base operator components are arbitrarily combined based on pipeline manner to complete the multiparty secure computing task.
3. The parameter-adaptive-based multiparty security computing method according to claim 2, wherein the obtaining the combined data of the user on the front-end interface for parameter configuration specifically comprises:
acquiring the dragging data of a user on the front-end interface to obtain a combination sequence;
and based on the combination sequence result, the basic operator component obtains the ordered combination of complete input and output execution logic, and based on the ordered combination, the combination data is obtained.
4. A multi-party security computing method based on parameter adaptation according to claim 3, wherein after the parameter configuration based on the combined data is completed, the algorithm logic is executed based on the algorithm configuration, and the output result of the algorithm logic is displayed, which specifically comprises:
issuing the input/output execution logic to the first back end and the second back end for interaction;
and in the interaction process, executing algorithm logic by utilizing corresponding algorithm configuration based on the ordered combination, thereby obtaining an algorithm logic output result to be displayed based on the front-end interface feedback.
5. A parameter-based adaptive multiparty security computing system, comprising a memory and a processor, wherein the memory comprises a parameter-based adaptive multiparty security computing method program, which when executed by the processor, performs the steps of:
acquiring a parameter list, wherein the parameter list is acquired based on a front-end cache, or the parameter list is acquired based on a first back-end cache, or the parameter list is acquired based on a second back-end cache; when the second back end does not update the preset algorithm version, performing temporary cache processing on the request parameters based on the front end and the first back end, wherein the first back end comprises a network server, the second back end comprises an algorithm dispatcher end, and the preset algorithm in the algorithm dispatcher end comprises an XSCE algorithm;
acquiring a parameter list, and further comprising: if the request parameters are not identified, or the version of the XSCE algorithm is updated, acquiring the parameter list based on the cache of the network server; if the network server does not have the cache, acquiring an XSCE algorithm of a current version based on an algorithm dispatcher end to obtain the parameter list;
acquiring combined data of a user on a front-end interface for parameter configuration, wherein the front-end interface comprises the parameter list;
and after the parameter configuration is completed based on the combined data, executing algorithm logic based on the algorithm configuration, and displaying an algorithm logic output result.
6. A computer readable storage medium, characterized in that it comprises a parameter-based adaptive multiparty security computing method program, which, when executed by a processor, implements the steps of a parameter-based adaptive multiparty security computing method according to any of claims 1 to 4.
CN202311059002.3A 2023-08-22 2023-08-22 Parameter self-adaption-based multiparty security computing method, system and storage medium Active CN116760647B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311059002.3A CN116760647B (en) 2023-08-22 2023-08-22 Parameter self-adaption-based multiparty security computing method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311059002.3A CN116760647B (en) 2023-08-22 2023-08-22 Parameter self-adaption-based multiparty security computing method, system and storage medium

Publications (2)

Publication Number Publication Date
CN116760647A CN116760647A (en) 2023-09-15
CN116760647B true CN116760647B (en) 2023-11-10

Family

ID=87950144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311059002.3A Active CN116760647B (en) 2023-08-22 2023-08-22 Parameter self-adaption-based multiparty security computing method, system and storage medium

Country Status (1)

Country Link
CN (1) CN116760647B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359470A (en) * 2018-08-14 2019-02-19 阿里巴巴集团控股有限公司 Secure calculation method and device, electronic equipment
CN114880015A (en) * 2021-07-26 2022-08-09 深圳前海微众银行股份有限公司 Task configuration method, device, equipment and storage medium
CN115065461A (en) * 2022-05-13 2022-09-16 浪潮云信息技术股份公司 Secure multiparty computing method, system and computer readable medium
CN115061785A (en) * 2022-04-15 2022-09-16 支付宝(杭州)信息技术有限公司 Information issuing method and device, storage medium and server
CN115774552A (en) * 2022-12-19 2023-03-10 中国平安人寿保险股份有限公司 Configurated algorithm design method and device, electronic equipment and readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11782952B2 (en) * 2021-08-18 2023-10-10 International Business Machines Corporation Automation of multi-party computation as a service according to user regulations and requirements

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359470A (en) * 2018-08-14 2019-02-19 阿里巴巴集团控股有限公司 Secure calculation method and device, electronic equipment
CN114880015A (en) * 2021-07-26 2022-08-09 深圳前海微众银行股份有限公司 Task configuration method, device, equipment and storage medium
CN115061785A (en) * 2022-04-15 2022-09-16 支付宝(杭州)信息技术有限公司 Information issuing method and device, storage medium and server
CN115065461A (en) * 2022-05-13 2022-09-16 浪潮云信息技术股份公司 Secure multiparty computing method, system and computer readable medium
CN115774552A (en) * 2022-12-19 2023-03-10 中国平安人寿保险股份有限公司 Configurated algorithm design method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN116760647A (en) 2023-09-15

Similar Documents

Publication Publication Date Title
CN108153670B (en) Interface testing method and device and electronic equipment
US10686843B2 (en) Authorization policy recommendation method and apparatus, server, and storage medium
US10652315B2 (en) Method, apparatus, and system for distributing information in graphic code
CN110321273B (en) Service statistics method and device
US10922743B1 (en) Adaptive performance of actions associated with custom user interface controls
CN106027644B (en) Service verification method and system
CN110825399B (en) Deployment method and device of application program
CN109218054B (en) Terminal dynamic configuration, corresponding server implementation method, device and storage medium
CN109298960A (en) Application crashes processing method, device, computer installation and storage medium
CN110995539A (en) Business system monitoring method and device and computer equipment
CN114140099A (en) Project management method based on AIOTDAaS digital twin cloud platform
CN110413161B (en) Component configuration method and device and electronic equipment
CN115437933A (en) Automatic testing method and device, computer equipment and storage medium
CN113590097B (en) API interface generation method and device, electronic equipment and storage medium
CN108646577B (en) Client operation management method and client
CN116760647B (en) Parameter self-adaption-based multiparty security computing method, system and storage medium
US11595493B2 (en) System and method for namespace masking in an integration flow
CN113157480A (en) Error information processing method, device, storage medium and terminal
CN107332703B (en) Method and device for checking multi-application logs
US11755310B2 (en) Prioritized ranking for memory device preparation
CN115795203A (en) Menu page construction method and device, electronic equipment and storage medium
CN112631577B (en) Model scheduling method, model scheduler and model safety test platform
CN112114931B (en) Deep learning program configuration method and device, electronic equipment and storage medium
US9497253B2 (en) Authorization review system
CN108848183B (en) Login method and device for simulation user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant