Secure Multi-Party Computation
Secure Multi-Party Computation platform which uses oblivious transfer, secret sharing and bit comparison and so on, is to protect data privacy of multiple parties when doing some computation and machine learning. Meanwhile, this platform uses the algorithm optimization of the exclusive design, greatly improve the calculation performance, and can support large-scale data calculation of 100 million levels.

Product Details

Arithmetic operation

The basic operator of statistical operation is provided, and the algorithm performance is optimized and upgraded. The calculation time of ten-thousand-level floating point number multiplication is millisecond

Union query

On the premise that the original data is not leaked, it provides SQL mode continuous table query, including mean, sum and other operations. It only takes tens of seconds for millions of database continuous table query to calculate the mean

Private set intersection

On the premise of not revealing the content of the set of both sides, the intersection data of both sides is calculated. The non-intersection data is not disclosed, and it only takes a few minutes to cross the data of hundreds of millions

Oblivious transfer

In the case of not divulging the purpose of the query, not divulging additional data, users can successfully query information, million level database, million level indistinguishable, can respond in a few seconds in a timely manner

Product Features

A variety of cryptographic protocols

The underlying implementation of each operator uses a variety of secret sharing, homomorphic encryption and careless transmission protocols including SPDZ, ABY3, CKKS, IKNP, KKRT and so on. While ensuring security, the most advanced SOTA protocol with the highest recognition is adopted

Provable security

The security of joint query, joint statistics, joint modeling and other tasks is reduced to mathematically difficult problems to ensure the security in the scheme and protocol

High versatility, high freedom

Computations can be submitted in JSON format. Computations can be performed using expressions and SQL and can be quickly deployed in public cloud, private, or offline environments

Independent and controllable, strong compatibility

The product is completely domestic and researched, and the underlying symmetric/asymmetric encryption mode of each cryptography protocol supports the use of state secret algorithm, compatible with mainstream databases and data services

Architecture Diagram

For more information, please contact our sales and technology team
contact us