General secret state data security calculation method
According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | LIU XIN ZHANG ZHIWEI SONG ANXIAO CHENG KE FU JIAXUAN SHEN YULONG ZHU XINGHUI |
description | According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition, |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116388954A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116388954A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116388954A3</originalsourceid><addsrcrecordid>eNrjZDB1T81LLUrMUShOTS5KLVEoLkksSVVISSxJBImUFmWWVCokJ-Ykl-YklmTm5ynkppZk5KfwMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLEZKCpJfHOfoaGZsYWFpamJo7GxKgBAH1HLX0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>General secret state data security calculation method</title><source>esp@cenet</source><creator>LIU XIN ; ZHANG ZHIWEI ; SONG ANXIAO ; CHENG KE ; FU JIAXUAN ; SHEN YULONG ; ZHU XINGHUI</creator><creatorcontrib>LIU XIN ; ZHANG ZHIWEI ; SONG ANXIAO ; CHENG KE ; FU JIAXUAN ; SHEN YULONG ; ZHU XINGHUI</creatorcontrib><description>According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition,</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230704&DB=EPODOC&CC=CN&NR=116388954A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230704&DB=EPODOC&CC=CN&NR=116388954A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LIU XIN</creatorcontrib><creatorcontrib>ZHANG ZHIWEI</creatorcontrib><creatorcontrib>SONG ANXIAO</creatorcontrib><creatorcontrib>CHENG KE</creatorcontrib><creatorcontrib>FU JIAXUAN</creatorcontrib><creatorcontrib>SHEN YULONG</creatorcontrib><creatorcontrib>ZHU XINGHUI</creatorcontrib><title>General secret state data security calculation method</title><description>According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition,</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB1T81LLUrMUShOTS5KLVEoLkksSVVISSxJBImUFmWWVCokJ-Ykl-YklmTm5ynkppZk5KfwMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLEZKCpJfHOfoaGZsYWFpamJo7GxKgBAH1HLX0</recordid><startdate>20230704</startdate><enddate>20230704</enddate><creator>LIU XIN</creator><creator>ZHANG ZHIWEI</creator><creator>SONG ANXIAO</creator><creator>CHENG KE</creator><creator>FU JIAXUAN</creator><creator>SHEN YULONG</creator><creator>ZHU XINGHUI</creator><scope>EVB</scope></search><sort><creationdate>20230704</creationdate><title>General secret state data security calculation method</title><author>LIU XIN ; ZHANG ZHIWEI ; SONG ANXIAO ; CHENG KE ; FU JIAXUAN ; SHEN YULONG ; ZHU XINGHUI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116388954A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>LIU XIN</creatorcontrib><creatorcontrib>ZHANG ZHIWEI</creatorcontrib><creatorcontrib>SONG ANXIAO</creatorcontrib><creatorcontrib>CHENG KE</creatorcontrib><creatorcontrib>FU JIAXUAN</creatorcontrib><creatorcontrib>SHEN YULONG</creatorcontrib><creatorcontrib>ZHU XINGHUI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIU XIN</au><au>ZHANG ZHIWEI</au><au>SONG ANXIAO</au><au>CHENG KE</au><au>FU JIAXUAN</au><au>SHEN YULONG</au><au>ZHU XINGHUI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>General secret state data security calculation method</title><date>2023-07-04</date><risdate>2023</risdate><abstract>According to the universal secret state data security calculation method provided by the invention, various machine learning algorithms can be outsourced to the cloud server for privacy protection calculation through the combination of various components in the secret state data security calculation library, so that the data privacy and the model security are protected; and the outsourcing calculation efficiency and calculation precision of the machine learning algorithm are improved. Each component in the general secret state data security calculation library completes the calculation process based on the respective protocol, and the protocols are privacy protection outsourcing calculation protocols, so that provable security under a semi-honesty threat model can be realized on the premise of ensuring the precision of a machine learning algorithm, the calculation efficiency and the like; in other words, any privacy information of the user and the model owner cannot be leaked to the cloud server. In addition,</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN116388954A |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | General secret state data security calculation method |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T18%3A19%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LIU%20XIN&rft.date=2023-07-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116388954A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |