Secure computation and communication

Methods and systems for secure computation and communication are described herein. The method includes transforming identifications of a first dataset using a transforming scheme, dispatching the transformed identifications of the first dataset, receiving identifications of a second dataset, transfo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Qian, Haohao, Du, Jian, Jiang, Bo, Zhao, Yongjun, Yan, Qiang
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Methods and systems for secure computation and communication are described herein. The method includes transforming identifications of a first dataset using a transforming scheme, dispatching the transformed identifications of the first dataset, receiving identifications of a second dataset, transforming the identifications of the second dataset, dispatching the transformed identifications of the second dataset, receiving a set of identifications, generating a first intersection of the received set of identifications and the transformed identifications of second dataset, and determining a first permutation based on the first intersection. The method also includes performing an oblivious shuffling based on the first permutation and a set of attributions to generate a first share. A size of the first share is the same as a size of the first intersection. The method further includes receiving a second share and constructing a first result based on the first share and the second share.