CPC H04L 9/3066 (2013.01) [G06F 16/2456 (2019.01); G06F 16/258 (2019.01); H04L 2209/46 (2013.01)] | 20 Claims |
1. A method for secure computation and communication, the method comprising:
transforming identifications of a first dataset using a first transforming scheme and then a third transforming scheme so that the identifications of the first dataset are transformed twice;
transforming attributes of the first dataset using a second transforming scheme
transforming identifications of a second dataset using the third transforming scheme and then the first transforming scheme so that the identifications of the second dataset are transformed twice;
generating a first intersection of the identifications of the transformed first dataset and the transformed second dataset;
after the first intersection being generated, generating a first share based on the generated first intersection by applying a masking scheme to attributes of the generated first intersection;
generating a second intersection of the identifications of the transformed second dataset and the transformed first dataset;
generating a second share based on the second intersection; and
constructing a first result based on the first share and the second share.
|