CN117319086A - System, method, electronic device and storage medium for inadvertent transmission - Google Patents

System, method, electronic device and storage medium for inadvertent transmission Download PDF

Info

Publication number
CN117319086A
CN117319086A CN202311594929.7A CN202311594929A CN117319086A CN 117319086 A CN117319086 A CN 117319086A CN 202311594929 A CN202311594929 A CN 202311594929A CN 117319086 A CN117319086 A CN 117319086A
Authority
CN
China
Prior art keywords
vector
data
matrix
transmitted
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311594929.7A
Other languages
Chinese (zh)
Other versions
CN117319086B (en
Inventor
龚晓燕
王翊心
胡进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN ARGUSEC TECHNOLOGY CO LTD
Beijing Infosec Technologies Co Ltd
Original Assignee
WUHAN ARGUSEC TECHNOLOGY CO LTD
Beijing Infosec Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN ARGUSEC TECHNOLOGY CO LTD, Beijing Infosec Technologies Co Ltd filed Critical WUHAN ARGUSEC TECHNOLOGY CO LTD
Priority to CN202311594929.7A priority Critical patent/CN117319086B/en
Publication of CN117319086A publication Critical patent/CN117319086A/en
Application granted granted Critical
Publication of CN117319086B publication Critical patent/CN117319086B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)

Abstract

The embodiment of the application provides an unintentional transmission system, a method, electronic equipment and a storage medium. Wherein, careless transmission system includes: the device comprises a trusted third party device, a sending end and a receiving end; the trusted third party equipment adopts a Setup algorithm in a pseudo-random correlation generator (PCG) protocol to generate seed parameters, and the sending end and the receiving end both adopt an expansion algorithm in the PCG protocol to Expand the seed parameters; the transmitting end and the receiving end interact with each other so that the receiving end obtains the selected data to be transmitted from a plurality of data to be transmitted of the transmitting end. Thus, an unintentional transmission scheme based on the PCG protocol is provided, and the scheme can effectively improve the safety and the transmission efficiency of unintentional transmission.

Description

System, method, electronic device and storage medium for inadvertent transmission
Technical Field
The present disclosure relates to the field of data transmission technologies, and in particular, to an unintentional transmission system, an unintentional transmission method, an electronic device, and a storage medium.
Background
The inadvertent transmission (Oblivious Transfer, OT for short) protocol is a protocol for delivering secret messages, delivering information in a vague manner, protecting the privacy of both parties of message delivery, is a basic protocol in cryptography, and is widely used in fields such as privacy information recovery, fair transaction contract signing, secure multi-party computation (MPC) and the like.
The traditional careless transmission scheme is generally designed based on the traditional cryptographic algorithm, so that malicious attacks are difficult to effectively resist, and the safety of careless transmission is poor.
Disclosure of Invention
Aspects of the present application provide an unintended transmission system, method, electronic device, and storage medium for effectively improving security of unintended transmission.
An embodiment of the present application provides an unintentional transmission system, including: the device comprises a trusted third party device, a sending end and a receiving end; the trusted third party equipment is used for randomly generating random numbers, generating first seed parameters and second seed parameters based on the random numbers and the security parameters by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol, sending the first seed parameters to the sending end, and sending the second seed parameters and the random numbers to the receiving end; the sending end is used for receiving the first seed parameter sent by the trusted third party equipment, and expanding the first seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a first vector and a second vector; acquiring a plurality of data to be transmitted, which are arranged in sequence, wherein the data sequence number of the data to be transmitted represents the arrangement sequence of the data to be transmitted in the plurality of data to be transmitted, and the plurality of data to be transmitted comprise target data to be received by a receiving end; receiving target parameters returned by a receiving end; generating a first matrix according to the data to be transmitted, generating a second matrix taking the first vector as a column vector, and generating a third matrix according to the first matrix and the second matrix; generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number; transmitting the third matrix and the third vector to a receiving end; the receiving end is used for receiving the second seed parameter and the random number sent by the trusted third party equipment, and expanding the second seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a fourth vector; generating a unit column vector with the x element as 1, wherein the value of x is the data sequence number of the target data; receiving a third matrix and a third vector sent by a sending end; and obtaining target data according to the third matrix, the third vector, the fourth vector and the unit column vector.
The embodiment of the application also provides an unintentional transmission method, which is applied to a transmitting end and comprises the following steps: receiving a first seed parameter sent by a trusted third party device, wherein the first seed parameter is obtained by the trusted third party device based on a random number and a security parameter by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol; expanding the first seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a first vector and a second vector; acquiring a plurality of data to be transmitted, which are arranged in sequence, wherein the data sequence number of the data to be transmitted represents the arrangement sequence of the data to be transmitted in the plurality of data to be transmitted, and the plurality of data to be transmitted comprise target data to be received by a receiving end; receiving a target parameter returned by a receiving end, wherein the target parameter is obtained by the receiving end according to a data sequence number and a random number of target data; generating a first matrix according to the plurality of data to be transmitted, generating a second matrix taking the first vector as a column vector, generating a third matrix according to the first matrix and the second matrix, and generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number; and transmitting the third matrix and the third vector to the receiving end so that the receiving end obtains target data based on the third matrix and the third vector.
The embodiment of the application also provides an unintentional transmission method, which is applied to a receiving end and comprises the following steps: receiving a second seed parameter and a random number sent by the trusted third party equipment, wherein the second seed parameter is obtained by the trusted third party equipment based on the random number and the security parameter by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol; expanding the second seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a fourth vector; generating a unit column vector with the x element as 1, wherein the value of x is the data sequence number of the target data; receiving a third matrix and a third vector sent by a sending end; and obtaining target data according to the third matrix, the third vector, the fourth vector and the unit column vector.
The embodiment of the application also provides electronic equipment, which comprises: a memory and a processor; a memory for storing a computer program; the processor is coupled to the memory for executing the computer program for performing the steps in the method of inadvertent transmission.
The embodiments also provide a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement steps in an unintended transmission method.
The embodiment of the application provides an unintentional transmission system, which comprises: the device comprises a trusted third party device, a sending end and a receiving end; the trusted third party equipment adopts a Setup algorithm in a pseudo-random correlation generator (PCG) protocol to generate seed parameters, and the sending end and the receiving end both adopt an expansion algorithm in the PCG protocol to Expand the seed parameters; the transmitting end and the receiving end interact with each other so that the receiving end obtains the selected data to be transmitted from a plurality of data to be transmitted of the transmitting end. Thus, an unintentional transmission scheme based on the PCG protocol is provided, and the scheme can effectively improve the safety and the transmission efficiency of unintentional transmission.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a schematic structural diagram of an unintentional transmission system according to an embodiment of the present disclosure;
fig. 2 is a flowchart of an unintentional transmission method according to an embodiment of the present disclosure;
fig. 3 is a flowchart of an unintentional transmission method according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purposes, technical solutions and advantages of the present application, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
In embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or" describes the access relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may represent: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural. In the text description of the present application, the character "/" generally indicates that the front-rear association object is an or relationship. In addition, in the embodiments of the present application, "first", "second", "third", etc. are only for distinguishing the contents of different objects, and have no other special meaning.
First, some theoretical basis is introduced:
LPN (Learning with Parity Noise) it is assumed that: 1. random generator matrix,/>Is a finite field; 2. randomly generated secret line vector +.>The method comprises the steps of carrying out a first treatment on the surface of the 3. Randomly generated error row vector +.>The method comprises the steps of carrying out a first treatment on the surface of the 4. Calculate vector +.>The method comprises the steps of carrying out a first treatment on the surface of the Then (I)>Here, a->Is randomly generated. For more description of LPN assumptions see prior art.
Function secret sharing mechanism (function secretsharing, FSS for short): given function,/>To define a domain +.>Is a value range; FSS defines two algorithms, namely fss= (FSS.Gen, FSS.Eval). Wherein, for: given security parameters +.>Sum function->Outputting a pair of keys->The method comprises the steps of carrying out a first treatment on the surface of the For the purpose ofGiven b, key->And input value x, output f b (x) Wherein->,/>,f b (x)∈. See the prior art for more description of FSS.
Pseudo-random correlation generator (Pseudorandom Correlation Gen)The operator, PCG) protocol: let LPN assume public parametersK, n, t and +.>The PCG protocol defines two algorithms, the Setup algorithm and the Expand algorithm, respectively. Let the Setup algorithm be denoted +.>The Expand algorithm is noted +.>
For the purpose of: given security parameters +.>And inputting a value x, outputting a pair of seed parameters +.>. Specifically, first, randomly generate +>,/>Respectively vectors; randomly generated->,/>For vectors, constraint->I.e. vector->The number of non-0 elements in the method is t; HW () refers to hamming weight (hamming weight). Next, the meterCalculating vector->The method comprises the steps of carrying out a first treatment on the surface of the Next, the (E) is (are) added>Constraint conditionsThe method comprises the steps of carrying out a first treatment on the surface of the Next, let seed parameter->Seed parameters->Outputting a pair of seed parameters->
For the purpose of: given->And->Output->Or->,/>、/>Respectively vectors.
1. If it is,/>Is->Calculate +.>Output of,/>Respectively vectors;
2. if it is,/>Is->Calculate +.>Output vector
Of course, for more description about the PCG protocol see the prior art.
Fig. 1 is a schematic structural diagram of an unintentional transmission system according to an embodiment of the present disclosure. Referring to fig. 1, the system may include: a trusted third party device 10, a sender 20 and a receiver 30. The trusted third party device 10, the sending end 20 and the receiving end 30 may interact with each other through a wired network or a wireless network, where the wired network may include a coaxial cable, a twisted pair, an optical fiber, and the like, and the wireless network may be a 2G (2 generation ) network, a 3G (3 generation ) network, a 4G (4 generation ) network, a 5G (5 generation ) network, a wireless fidelity (Wireless Fidelity, abbreviated as WIFI) network, and the like. The specific type or specific form of interaction is not limited in this application, as long as it can implement the interaction function. The number of devices and the positional relationship between the devices shown in fig. 1 are merely exemplary, and the embodiments of the present application are not limited.
In this embodiment, the trusted third party device 10, the sender 20 and the receiver 30 may be comprised of software and/or hardware. The trusted third party device 10, the sending end 20 and the receiving end 30 may be, for example, terminal devices or servers, where the terminal devices are, for example, mobile phones, tablet computers, desktop computers, wearable intelligent devices, smart home devices, etc.; the server is, for example, a single server, a distributed server cluster formed by a plurality of servers, or a cloud server. When the trusted third party device 10, the sender 20 and the receiver 30 are software, they may be installed in the above listed hardware devices.
In this embodiment, the trusted third party device may be any trusted authority responsible for generating, storing, and managing keys, including, for example, but not limited to: a key generation center (Key Generation Center, KGC).
In this embodiment, the trusted third party device is configured to randomly generate a random number, and generate a first seed parameter and a second seed parameter based on the random number and a security parameter by using a Setup algorithm in a pseudo-random correlation generator PCG protocol, and send the first seed parameter to the transmitting end, and send the second seed parameter and the random number to the receiving end.
Specifically, assume that the random number is counted as,/>The first seed parameter is marked +.>The second seed parameter is recorded asThe security parameter is marked as->Invoking the Setup algorithm in the PCG protocol>A first seed parameter and a second seed parameter are generated. Finally, the trusted third party device 10 will first seed parameter +.>Transmitting to the transmitting end and transmitting the second seed parameter +.>And random number->And sending the message to a receiving end.
In this embodiment, the transmitting end is configured to receive a first seed parameter sent by the trusted third party device, and Expand the first seed parameter by using an expansion algorithm in the PCG protocol to obtain a first vector and a second vector; acquiring a plurality of data to be transmitted, which are arranged in sequence, wherein the data sequence number of the data to be transmitted represents the arrangement sequence of the data to be transmitted in the plurality of data to be transmitted, and the plurality of data to be transmitted comprise target data to be received by a receiving end; receiving target parameters returned by a receiving end; generating a first matrix according to the data to be transmitted, generating a second matrix taking the first vector as a column vector, and generating a third matrix according to the first matrix and the second matrix; generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number; and transmitting the third matrix and the third vector to the receiving end.
Specifically, assume that the first vector is noted asThe second vector is marked->Calling the Expand algorithm in the PCG protocol to perform +.>Expansion, i.e.)>To obtain a first vector +.>And a second vector->
Assuming that the transmitting end has n data to be transmitted, n is a positive integer greater than 1, and the n data to be transmitted are divided intoThe method comprises the steps of carrying out a first treatment on the surface of the The data sequence numbers of the n data to be transmitted are respectively 0, 1, 2, … … n-1 and the like, and reflect the arrangement sequence of the data to be transmitted in the n data to be transmitted; data sequence number x,/of the data to be transmitted (referred to herein as target data) selected by the receiving end to be received>That is, the data sequence number x of the target data may be any one of 0, 1, 2, … … n-1, in other words, the receiving end obtains one data to be transmitted from the n data to be transmitted as the target data.
Assume that the target parameter returned by the receiving end is recorded as m x The first matrix is marked asThe second matrix is marked->The third matrix is marked->The third vector is marked as +.>
Illustratively, generating a first matrix from a plurality of data to be transmitted includes: determining difference vectors between data to be transmitted with the minimum data sequence number and other data to be transmitted respectively; a first matrix is generated with each difference vector as each column vector.
Specifically, the data to be transmitted with the smallest data sequence number, namely,/>Comprising n-1 column vectors, ">Is +.1 column vector>(i.e.)>Difference vector obtained by vector subtraction)>Is +.>(i.e.)>Difference vector obtained by vector subtraction)>Is +.>(i.e.)>Difference vector obtained by vector subtraction) … … and so on, +.>The n-1 th column vector of (2) is +.>(i.e.)>The difference vector resulting from the vector subtraction).
In the present embodiment, the second matrixComprises n-1 column vectors, the second matrix +.>Is the first vector +.>
Illustratively, generating a third matrix from the first matrix and the second matrix includes: subtracting the second matrix from the first matrix to obtain a third matrix, i.e
Illustratively, generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number includes: multiplying the first vector by the target parameter to obtain a fifth vector; adding the fifth vector and the second vector to obtain a sixth vector; subtracting the data to be transmitted with the minimum data sequence number from the sixth vector to obtain a third vector, namelyWherein->Refer to the fifth vector, ">Refers to the sixth vector. It will be appreciated that in participating in the vector operation, the data to be transmitted is represented in a vector form.
In this embodiment, the transmitting end transmits the third matrix and the third vector to the receiving end, so that the receiving end obtains the target data from the plurality of data to be transmitted.
In this embodiment, the receiving end is configured to receive the second seed parameter and the random number sent by the trusted third party device, and Expand the second seed parameter by using an expansion algorithm in the PCG protocol to obtain a fourth vector; generating a unit column vector with the x element as 1, wherein the value of x is the data sequence number of the target data; receiving a third matrix and a third vector sent by a sending end; and obtaining target data according to the third matrix, the third vector, the fourth vector and the unit column vector.
Specifically, assume that the fourth vector is noted asThe unit column vector is marked +.>The vector form of the target data is recorded as
The receiving end calls an expansion algorithm in the PCG protocol to the second seed parameterExpanding to obtain a fourth vector +.>I.e.)>
Illustratively, obtaining the target data according to the third matrix, the third vector, the fourth vector, and the unit column vector includes: multiplying the third matrix by the unit column vector to obtain a seventh vector; adding the seventh vector, the third vector and the fourth vector to obtain target data, namelyWherein->Is the seventh vector. Vector->I.e. target data in the form of vectors.
The embodiment of the application provides an unintentional transmission system, which comprises: the device comprises a trusted third party device, a sending end and a receiving end; the trusted third party equipment adopts a Setup algorithm in a pseudo-random correlation generator (PCG) protocol to generate seed parameters, and the sending end and the receiving end both adopt an expansion algorithm in the PCG protocol to Expand the seed parameters; the transmitting end and the receiving end interact with each other so that the receiving end obtains the selected data to be transmitted from a plurality of data to be transmitted of the transmitting end. Thus, an unintentional transmission scheme based on the PCG protocol is provided, and the scheme can effectively improve the safety and the transmission efficiency of unintentional transmission.
The embodiment of the application also provides an unintentional transmission method. Fig. 2 is a flowchart of an unintentional transmission method according to an embodiment of the present application. The method is applied to a transmitting end, referring to fig. 2, the method may include the following steps:
201. and receiving a first seed parameter sent by the trusted third party equipment, wherein the first seed parameter is obtained by the trusted third party equipment based on the random number and the security parameter by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol.
202. And expanding the first seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a first vector and a second vector.
203. And acquiring a plurality of pieces of data to be transmitted, which are arranged in sequence, wherein the data sequence number of the data to be transmitted represents the arrangement sequence of the data to be transmitted in the plurality of pieces of data to be transmitted, and the plurality of pieces of data to be transmitted comprise target data to be received by a receiving end.
204. And receiving a target parameter returned by the receiving end, wherein the target parameter is obtained by the receiving end according to the data sequence number and the random number of the target data.
205. Generating a first matrix according to the plurality of data to be transmitted, generating a second matrix taking the first vector as a column vector, generating a third matrix according to the first matrix and the second matrix, and generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number.
206. And transmitting the third matrix and the third vector to the receiving end so that the receiving end obtains target data based on the third matrix and the third vector.
Optionally, generating the first matrix according to the plurality of data to be sent includes: determining difference vectors between data to be transmitted with the minimum data sequence number and other data to be transmitted respectively; a first matrix is generated with each difference vector as each column vector.
Optionally, generating a third matrix according to the first matrix and the second matrix includes: subtracting the second matrix from the first matrix to obtain a third matrix.
Optionally, generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number includes: multiplying the first vector by the target parameter to obtain a fifth vector; adding the data to be transmitted with the minimum data sequence number to the fifth vector to obtain a sixth vector; subtracting the second vector from the sixth vector to obtain a third vector.
The implementation manner and technical effects of each step in the above method embodiments have been described in detail in the foregoing system embodiments, and will not be described in detail herein.
The embodiment of the application also provides an unintentional transmission method. Fig. 3 is a flowchart of an unintentional transmission method according to an embodiment of the present application. The method is applied to a receiving end, referring to fig. 3, and the method may include the following steps:
301. and receiving a second seed parameter and a random number sent by the trusted third party equipment, wherein the second seed parameter is obtained by the trusted third party equipment based on the random number and the security parameter by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol.
302. And expanding the second seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a fourth vector, and generating a unit column vector with the x element as 1, wherein the value of x is the data sequence number of the target data.
303. And receiving the third matrix and the third vector sent by the sending end, and obtaining target data according to the third matrix, the third vector, the fourth vector and the unit column vector.
Optionally, obtaining the target data according to the third matrix, the third vector, the fourth vector and the unit column vector includes: multiplying the third matrix by the unit column vector to obtain a seventh vector; and adding the seventh vector, the third vector and the fourth vector to obtain target data.
The implementation manner and technical effects of each step in the above method embodiments have been described in detail in the foregoing system embodiments, and will not be described in detail herein.
It should be noted that, the execution subjects of each step of the method provided in the above embodiment may be the same device, or the method may also be executed by different devices. For example, the execution subject of steps 301 to 303 may be device a; for another example, the execution subject of steps 301 and 302 may be device a, and the execution subject of step 303 may be device B; etc.
In addition, in some of the flows described in the above embodiments and the drawings, a plurality of operations appearing in a specific order are included, but it should be clearly understood that the operations may be performed out of the order in which they appear herein or performed in parallel, the sequence numbers of the operations such as 301, 302, etc. are merely used to distinguish between the various operations, and the sequence numbers themselves do not represent any order of execution. In addition, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first" and "second" herein are used to distinguish different messages, devices, modules, etc., and do not represent a sequence, and are not limited to the "first" and the "second" being different types.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region, and provide corresponding operation entries for the user to select authorization or rejection.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 4, the electronic device includes: a memory 41 and a processor 42;
memory 41 for storing a computer program and may be configured to store various other data to support operations on the computing platform. Examples of such data include instructions for any application or method operating on a computing platform, contact data, phonebook data, messages, pictures, videos, and the like.
The Memory 41 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random access Memory (Static Random-AccessMemory, SRAM), electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read Only Memory, EEPROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic or optical disk.
A processor 42 coupled to the memory 41 for executing the computer program in the memory 41 for: steps in the method of inadvertent transmission are performed.
Further, as shown in fig. 4, the electronic device further includes: communication component 43, display 44, power component 45, audio component 46, and other components. Only some of the components are schematically shown in fig. 4, which does not mean that the electronic device only comprises the components shown in fig. 4. In addition, the components within the dashed box in fig. 4 are optional components, not necessarily optional components, depending on the product form of the electronic device.
The detailed implementation process of each action performed by the processor may refer to the related description in the foregoing method embodiment or the apparatus embodiment, and will not be repeated herein.
Accordingly, the present application further provides a computer readable storage medium storing a computer program, where the computer program is executed to implement the steps executable by the electronic device in the above method embodiments.
Accordingly, embodiments of the present application also provide a computer program product comprising a computer program/instructions which, when executed by a processor, cause the processor to carry out the steps of the above-described method embodiments that are executable by an electronic device.
The communication component is configured to facilitate wired or wireless communication between the device in which the communication component is located and other devices. The device where the communication component is located can access a wireless network based on a communication standard, such as a mobile communication network of WiFi,2G, 3G, 4G/LTE, 5G, etc., or a combination thereof. In one exemplary embodiment, the communication component receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component further includes a near field communication (Near Field Communication, NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on radio frequency identification (Radio Frequency Identification, RFID) technology, infrared data association (The Infrared Data Association, irDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
The display includes a screen, which may include a liquid crystal display (Liquid Crystal Display, LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or sliding action, but also the duration and pressure associated with the touch or sliding operation.
The power supply component provides power for various components of equipment where the power supply component is located. The power components may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the devices in which the power components are located.
The audio component described above may be configured to output and/or input an audio signal. For example, the audio component includes a Microphone (MIC) configured to receive external audio signals when the device in which the audio component is located is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may be further stored in a memory or transmitted via a communication component. In some embodiments, the audio assembly further comprises a speaker for outputting audio signals.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (central processing unit, CPUs), input/output interfaces, network interfaces, and memory.
The Memory may include non-volatile Memory in a computer readable medium, random access Memory (Random Access Memory, RAM) and/or non-volatile Memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase Change RAM (PRAM), static Random-Access Memory (SRAM), dynamic Random-Access Memory (Dynamic Random Access Memory, DRAM), other types of Random-Access Memory (Random Access Memory, RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash Memory or other Memory technology, compact disc Read Only Memory (CD-ROM), digital versatile disc (Digital versatile disc, DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, operable to store information that may be accessed by the computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (9)

1. An unintentional transfer system, comprising: the device comprises a trusted third party device, a sending end and a receiving end;
the trusted third party device is used for randomly generating a random number, generating a first seed parameter and a second seed parameter based on the random number and the security parameter by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol, sending the first seed parameter to a sending end, and sending the second seed parameter and the random number to a receiving end;
the sending end is used for receiving a first seed parameter sent by the trusted third party equipment, and expanding the first seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a first vector and a second vector; acquiring a plurality of data to be transmitted, which are arranged in sequence, wherein the data sequence number of the data to be transmitted represents the arrangement sequence of the data to be transmitted in the plurality of data to be transmitted, and the plurality of data to be transmitted comprise target data to be received by the receiving end; receiving target parameters returned by the receiving end; generating a first matrix according to the data to be transmitted, generating a second matrix taking the first vector as a column vector, and generating a third matrix according to the first matrix and the second matrix; generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number; transmitting the third matrix and the third vector to the receiving end;
the receiving end is used for receiving the second seed parameter and the random number sent by the trusted third party equipment, and expanding the second seed parameter by adopting an expansion algorithm in a PCG protocol to obtain a fourth vector; generating a unit column vector with the x element as 1, wherein the value of x is the data sequence number of the target data; receiving the third matrix and the third vector sent by the sending end; and obtaining the target data according to the third matrix, the third vector, the fourth vector and the unit column vector.
2. An unintentional transmission method, applied to a transmitting end, comprising:
receiving a first seed parameter sent by a trusted third party device, wherein the first seed parameter is obtained by the trusted third party device based on a random number and a security parameter by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol;
expanding the first seed parameter by adopting an expansion algorithm in the PCG protocol to obtain a first vector and a second vector;
acquiring a plurality of data to be transmitted, which are arranged in sequence, wherein the data sequence number of the data to be transmitted represents the arrangement sequence of the data to be transmitted in the plurality of data to be transmitted, and the plurality of data to be transmitted comprise target data to be received by a receiving end;
receiving a target parameter returned by the receiving end, wherein the target parameter is obtained by the receiving end according to the data sequence number and the random number of the target data;
generating a first matrix according to the plurality of data to be transmitted, generating a second matrix taking the first vector as a column vector, generating a third matrix according to the first matrix and the second matrix, and generating a third vector according to the first vector, the second vector, the target parameter and the data to be transmitted with the minimum data sequence number;
and transmitting the third matrix and the third vector to the receiving end so that the receiving end obtains the target data based on the third matrix and the third vector.
3. The method of claim 2, wherein generating a first matrix from the plurality of data to be transmitted comprises:
determining difference vectors between data to be transmitted with the minimum data sequence number and other data to be transmitted respectively;
a first matrix is generated with each difference vector as each column vector.
4. The method of claim 2, wherein generating a third matrix from the first matrix and the second matrix comprises:
subtracting the second matrix from the first matrix to obtain the third matrix.
5. The method of claim 2, wherein generating a third vector from the first vector, the second vector, the target parameter, and data to be transmitted with the smallest data sequence number comprises:
multiplying the first vector and the target parameter to obtain a fifth vector;
adding the fifth vector and the data to be transmitted with the minimum data sequence number to obtain a sixth vector;
subtracting the second vector from the sixth vector to obtain the third vector.
6. An unintentional transmission method, applied to a receiving end, comprising:
receiving a second seed parameter and a random number sent by a trusted third party device, wherein the second seed parameter is obtained by the trusted third party device based on the random number and a security parameter by adopting a Setup algorithm in a pseudo-random correlation generator (PCG) protocol;
expanding the second seed parameter by adopting an expansion algorithm in a PCG protocol to obtain a fourth vector;
generating a unit column vector with the x element as 1, wherein the value of x is the data sequence number of the target data;
receiving a third matrix and a third vector sent by a sending end;
and obtaining the target data according to the third matrix, the third vector, the fourth vector and the unit column vector.
7. The method of claim 6, wherein obtaining the target data from the third matrix, the third vector, the fourth vector, and the unit column vector comprises:
multiplying the third matrix and the unit column vector to obtain a seventh vector;
and adding the seventh vector, the third vector and the fourth vector to obtain the target data.
8. An electronic device, comprising: a memory and a processor; the memory is used for storing a computer program; the processor is coupled to the memory for executing the computer program for performing the steps in the method of any of claims 2-7.
9. A computer readable storage medium storing a computer program, which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 2-7.
CN202311594929.7A 2023-11-27 2023-11-27 System, method, electronic device and storage medium for inadvertent transmission Active CN117319086B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311594929.7A CN117319086B (en) 2023-11-27 2023-11-27 System, method, electronic device and storage medium for inadvertent transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311594929.7A CN117319086B (en) 2023-11-27 2023-11-27 System, method, electronic device and storage medium for inadvertent transmission

Publications (2)

Publication Number Publication Date
CN117319086A true CN117319086A (en) 2023-12-29
CN117319086B CN117319086B (en) 2024-02-09

Family

ID=89273918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311594929.7A Active CN117319086B (en) 2023-11-27 2023-11-27 System, method, electronic device and storage medium for inadvertent transmission

Country Status (1)

Country Link
CN (1) CN117319086B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117579255A (en) * 2024-01-17 2024-02-20 同盾科技有限公司 Method and device for generating inadvertent transmission instance, electronic equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095170A (en) * 2022-01-20 2022-02-25 北京信安世纪科技股份有限公司 Data processing method, device, system and computer readable storage medium
CN114301591A (en) * 2021-12-28 2022-04-08 支付宝(杭州)信息技术有限公司 Method, device and system for executing careless transmission protocol
WO2023027982A1 (en) * 2021-08-22 2023-03-02 Google Llc Cryptographically secure control using secure multi-party computation
CN116248359A (en) * 2022-12-30 2023-06-09 蚂蚁区块链科技(上海)有限公司 Data transmission system, method and device based on careless transmission protocol
CN116506226A (en) * 2023-06-27 2023-07-28 杭州金智塔科技有限公司 Private data processing system and method
CN116975906A (en) * 2023-06-12 2023-10-31 广州大学 Ridge regression privacy protection algorithm based on secure multiparty calculation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023027982A1 (en) * 2021-08-22 2023-03-02 Google Llc Cryptographically secure control using secure multi-party computation
CN114301591A (en) * 2021-12-28 2022-04-08 支付宝(杭州)信息技术有限公司 Method, device and system for executing careless transmission protocol
CN114095170A (en) * 2022-01-20 2022-02-25 北京信安世纪科技股份有限公司 Data processing method, device, system and computer readable storage medium
CN116248359A (en) * 2022-12-30 2023-06-09 蚂蚁区块链科技(上海)有限公司 Data transmission system, method and device based on careless transmission protocol
CN116975906A (en) * 2023-06-12 2023-10-31 广州大学 Ridge regression privacy protection algorithm based on secure multiparty calculation
CN116506226A (en) * 2023-06-27 2023-07-28 杭州金智塔科技有限公司 Private data processing system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117579255A (en) * 2024-01-17 2024-02-20 同盾科技有限公司 Method and device for generating inadvertent transmission instance, electronic equipment and medium
CN117579255B (en) * 2024-01-17 2024-03-29 同盾科技有限公司 Method and device for generating inadvertent transmission instance, electronic equipment and medium

Also Published As

Publication number Publication date
CN117319086B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
CN112751665B (en) Secure multi-party computing method, device, system and storage medium
CN114756886B (en) Method and device for inquiring hiding trace
CN111404943B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN112003696B (en) SM9 key generation method, system, electronic equipment, device and storage medium
CN117319086B (en) System, method, electronic device and storage medium for inadvertent transmission
JP7300799B2 (en) Computing device, method of protecting data, and computer program
CN106664308B (en) Device authentication prior to enrollment
CN111753318A (en) Multi-party security calculation method, device and system for private data
CN112667674B (en) Data processing method and device and data processing device
CN115941181B (en) Out-of-order secret sharing method, system and readable storage medium
CN114978512B (en) Privacy intersection method and device and readable storage medium
CN111130787B (en) Digital signature method, apparatus and storage medium
CN114553590A (en) Data transmission method and related equipment
CN117932685A (en) Privacy data processing method and related equipment based on longitudinal federal learning
CN111010283B (en) Method and apparatus for generating information
CN112163046A (en) Block chain-based equipment data storage method, device and system
CN112464257A (en) Data detection method and device for data detection
CN114885038B (en) Encryption protocol conversion method, result acquisition node and privacy calculation node
JP7300800B2 (en) Computing device, method of protecting data, and computer program
CN115208630B (en) Block chain-based data acquisition method and system and block chain system
CN114584284B (en) Homomorphic encryption operation method and device and electronic equipment
CN112580064B (en) Data processing method and device and data processing device
CN117134911B (en) Secret sharing method, secret segmentation terminal, secret recovery terminal, system and medium
CN112214751A (en) Verification code generation method and device
CN117155570B (en) Ciphertext replacement method, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant