Traitement en cours

Veuillez attendre...

Paramétrages

Paramétrages

Aller à Demande

1. WO2020006319 - PROCÉDÉ ET APPAREIL POUR OBTENIR UNE ENTRÉE D'UN PROTOCOLE DE CALCUL MULTIPARTITE SÉCURISÉ

Note: Texte fondé sur des processus automatiques de reconnaissance optique de caractères. Seule la version PDF a une valeur juridique

[ EN ]

CLAIMS

1. A method for privacy protection, wherein the method is performed by a second computing device and comprises:

receiving a data request for object data from a first computing device, wherein the object data is associated with an object and is stored in the second computing device;

performing encryption of the object data using a public key associated with the object based on the data request to generate a first ciphertext;

obtaining verification data based on the first ciphertext for verifying whether a ciphertext to be verified corresponds to the object data; and

sending the verification data to the first computing device for the first computing device to execute a cryptography protocol with a third computing device based on the verification data.

2. The method of claim 1, wherein:

the data request contains a random number for homomorphic encryption of the object data; and

performing encryption of the object data using the public key associated with the object based on the data request to generate the first ciphertext comprises performing homomorphic encryption of the object data using the public key received from the first computing device and the random number to generate the first ciphertext.

3. The method of any of claims 1-2, wherein:

sending the verification data to the first computing device comprises sending the verification data and the first ciphertext to the first computing device.

4. The method of any of claims 1-3, wherein:

obtaining the verification data based on the first ciphertext comprises storing the first ciphertext in a blockchain to obtain a storage location of the first ciphertext in the blockchain; and

the verification data comprises the storage location.

5. The method of claim 4, wherein:

the second computing device is associated with an authorized organization;

storing the first ciphertext in the blockchain comprises storing, at the storage location in the blockchain, the first ciphertext and the authorized organization's digital signature for the first ciphertext; and

the authorized organization's digital signature is generated by the second computing device.

6. The method of claim 4, wherein:

the second computing device is associated with an authorized organization;

storing the first ciphertext in the blockchain comprises storing, at the storage location in the blockchain, a hash value of the first ciphertext and the authorized organization's digital signature for the hash value;

the hash value is generated by the second computing device based on the first ciphertext; and

the authorized organization's digital signature is generated by the second computing device.

7. The method of any of claims 1-6, wherein:

the second computing device is associated with an authorized organization;

obtaining the verification data based on the first ciphertext comprises generating the authorized organization's digital signature for the first ciphertext; and

the verification data comprises the authorized organization's digital signature.

8. The method of any of claims 1-7, wherein:

sending the verification data to the first computing device for the first computing device to execute a cryptography protocol with a third computing device based on the verification data comprises sending the verification data to the first computing device for the first computing device to execute a secure multiparty computation protocol for the object data with the third computing device based on the verification data.

9. The method of claim 8, wherein:

sending the verification data to the first computing device for the first computing device to execute a secure multiparty computation protocol for the object data with the third computing device based on the verification data comprises: causing the third computing device to obtain and verify the first ciphertext based on the verification data and to determine the first ciphertext as an input to the secure multiparty computation protocol in response to determining that the first ciphertext corresponds to the object data.

10. A system for privacy protection, comprising:

one or more processors; and

one or more computer-readable memories coupled to the one or more processors and having instructions stored thereon that are executable by the one or more processors to perform the method of any of claims 1 to 9.

11. An apparatus for privacy protection, comprising a plurality of modules for performing the method of any of claims 1 to 9.

12. A non-transitory computer-readable medium having stored therein instructions that, when executed by a processor of a device, cause the device to perform the method of any of claims 1 to 9.

13. A method for privacy protection, wherein the method is performed by a first computing device and comprises:

sending a data request for object data to a second computing device, wherein the object data is associated with an object and is stored in the second computing device;

obtaining a second ciphertext corresponding to the object data, wherein the second ciphertext is an encrypted ciphertext based on a public key of the object;

receiving verification data from the second computing device; and

sending the second ciphertext and the verification data to a third computing device to execute a cryptography protocol with the third computing device based on the verification data.

14. The method of claim 13, wherein:

the first computing device stores the object data;

obtaining the second ciphertext corresponding to the object data comprises:

generating a random number and performing homomorphic encryption of the object data using the public key and the generated random number to obtain the second ciphertext; and the data request for the object data comprises the random number.

15. The method of any of claims 13-14, wherein:

sending the data request for object data to the second computing device comprises: sending the data request for object data to the second computing device, for the second computing device to perform homomorphic encryption of the object data using a public key associated with the object based on the data request to generate a first ciphertext; and

obtaining the second ciphertext corresponding to the object data comprises receiving from the second computing device the first ciphertext to use as the second ciphertext.

16. The method of any of claims 13-15, wherein:

the verification data comprises a storage location of the first ciphertext in a blockchain as stored by the second computing device; and

sending the second ciphertext and the verification data to the third computing device comprises sending the second ciphertext and the storage location to the third computing device.

17. The method of any of claims 13-16, wherein:

sending the second ciphertext and the verification data to the third computing device to execute the cryptography protocol with the third computing device based on the verification data comprises sending the second ciphertext and the verification data to the third computing device to execute a secure multiparty computation protocol for the object data with the third computing device based on the verification data.

18. A system for privacy protection, comprising:

one or more processors; and

one or more computer-readable memories coupled to the one or more processors and having instructions stored thereon that are executable by the one or more processors to perform the method of any of claims 13 to 17.

19. An apparatus for privacy protection, comprising a plurality of modules for performing the method of any of claims 13 to 17.

20. A non-transitory computer-readable medium having stored therein instructions that, when executed by a processor of a device, cause the device to perform the method of any of claims 13 to 17.