General secret state data security calculation method

According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LIU XIN, ZHANG ZHIWEI, SONG ANXIAO, CHENG KE, FU JIAXUAN, SHEN YULONG, ZHU XINGHUI
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator LIU XIN
ZHANG ZHIWEI
SONG ANXIAO
CHENG KE
FU JIAXUAN
SHEN YULONG
ZHU XINGHUI
description According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition,
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116388954A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116388954A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116388954A3</originalsourceid><addsrcrecordid>eNrjZDB1T81LLUrMUShOTS5KLVEoLkksSVVISSxJBImUFmWWVCokJ-Ykl-YklmTm5ynkppZk5KfwMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLEZKCpJfHOfoaGZsYWFpamJo7GxKgBAH1HLX0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>General secret state data security calculation method</title><source>esp@cenet</source><creator>LIU XIN ; ZHANG ZHIWEI ; SONG ANXIAO ; CHENG KE ; FU JIAXUAN ; SHEN YULONG ; ZHU XINGHUI</creator><creatorcontrib>LIU XIN ; ZHANG ZHIWEI ; SONG ANXIAO ; CHENG KE ; FU JIAXUAN ; SHEN YULONG ; ZHU XINGHUI</creatorcontrib><description>According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition,</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230704&amp;DB=EPODOC&amp;CC=CN&amp;NR=116388954A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230704&amp;DB=EPODOC&amp;CC=CN&amp;NR=116388954A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LIU XIN</creatorcontrib><creatorcontrib>ZHANG ZHIWEI</creatorcontrib><creatorcontrib>SONG ANXIAO</creatorcontrib><creatorcontrib>CHENG KE</creatorcontrib><creatorcontrib>FU JIAXUAN</creatorcontrib><creatorcontrib>SHEN YULONG</creatorcontrib><creatorcontrib>ZHU XINGHUI</creatorcontrib><title>General secret state data security calculation method</title><description>According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition,</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB1T81LLUrMUShOTS5KLVEoLkksSVVISSxJBImUFmWWVCokJ-Ykl-YklmTm5ynkppZk5KfwMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLEZKCpJfHOfoaGZsYWFpamJo7GxKgBAH1HLX0</recordid><startdate>20230704</startdate><enddate>20230704</enddate><creator>LIU XIN</creator><creator>ZHANG ZHIWEI</creator><creator>SONG ANXIAO</creator><creator>CHENG KE</creator><creator>FU JIAXUAN</creator><creator>SHEN YULONG</creator><creator>ZHU XINGHUI</creator><scope>EVB</scope></search><sort><creationdate>20230704</creationdate><title>General secret state data security calculation method</title><author>LIU XIN ; ZHANG ZHIWEI ; SONG ANXIAO ; CHENG KE ; FU JIAXUAN ; SHEN YULONG ; ZHU XINGHUI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116388954A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>LIU XIN</creatorcontrib><creatorcontrib>ZHANG ZHIWEI</creatorcontrib><creatorcontrib>SONG ANXIAO</creatorcontrib><creatorcontrib>CHENG KE</creatorcontrib><creatorcontrib>FU JIAXUAN</creatorcontrib><creatorcontrib>SHEN YULONG</creatorcontrib><creatorcontrib>ZHU XINGHUI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIU XIN</au><au>ZHANG ZHIWEI</au><au>SONG ANXIAO</au><au>CHENG KE</au><au>FU JIAXUAN</au><au>SHEN YULONG</au><au>ZHU XINGHUI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>General secret state data security calculation method</title><date>2023-07-04</date><risdate>2023</risdate><abstract>According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition,</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN116388954A
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title General secret state data security calculation method
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T18%3A19%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LIU%20XIN&rft.date=2023-07-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116388954A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true