| CPC G06F 21/6209 (2013.01) [G06F 21/6245 (2013.01)] | 20 Claims |

|
1. A computer-implemented method for secure-fragment-conversion privacy data protection, comprising:
performing by a first party or a third party:
updating, by adding an offset to a first fragment and as an updated first fragment, two local fragments held by a local party as two updated local fragments, wherein privacy data is split into a first fragment, a second fragment, and a third fragment in a first ring for performing a modulo operation on a first value, wherein the first value is an m power of 2, wherein the first party holds the first fragment and the second fragment, wherein a second party holds the second fragment and the third fragment, wherein the third party holds the third fragment and the first fragment, and wherein the offset enables offset data obtained by performing addition on updated fragments of each party to be greater than or equal to 0;
performing multi-party joint computation by using the two updated local fragments together with fragments held by the other two parties to obtain two overflow fragments of an overflow bit and in a second ring for performing a modulo operation on a second value, wherein the second value is an n power of 2, and m is less than n; and the overflow bit indicates whether the offset data is greater than or equal to the first value; and
obtaining two converted fragments in the second ring based on the two updated local fragments, the two overflow fragments, and the offset.
|