Secure computation and communication
Methods and systems for secure computation and communication are described herein. The method includes transforming identifications of a first dataset using a transforming scheme, dispatching the transformed identifications of the first dataset, receiving identifications of a second dataset, transfo...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Methods and systems for secure computation and communication are described herein. The method includes transforming identifications of a first dataset using a transforming scheme, dispatching the transformed identifications of the first dataset, receiving identifications of a second dataset, transforming the identifications of the second dataset, dispatching the transformed identifications of the second dataset, receiving a set of identifications, generating a first intersection of the received set of identifications and the transformed identifications of second dataset, and determining a first permutation based on the first intersection. The method also includes performing an oblivious shuffling based on the first permutation and a set of attributions to generate a first share. A size of the first share is the same as a size of the first intersection. The method further includes receiving a second share and constructing a first result based on the first share and the second share. |
---|