Google Privacy Intersection and Technical Analysis 1 – Application Scenario Analysis
How to solve it? The cryptography community has proposed a number of solutions, such as full homomorphic encryption and multiparty computing.
These technologies are universal and can be placed wherever you need them. However, due to the nature of the technology itself, there are more or less disadvantages in any place.
Google’s Private Join and Compute, an example of how to extract fruit from academia. It is to solve the problem in a specific scenario.
Academia, industry and business are a biological chain. It seems to be a different thing to do, but it is a supply relationship with each other. This is what we often call "production, learning, and research." But we often mess up the role, do not do their own role, but have to play multiple roles.
Google is a company that is willing to adopt early adopters. I remember a few years ago, when the lattice encryption algorithm was fired in the theoretical world because of its anti-quantum properties, Google took the lead in deploying a ring-based LWE-based key exchange protocol on its own server to test its performance and prepare for the anti-quantum era. . I don't know why, it will be restored to the original agreement in a few months.
- Google Privacy Intersection and Technical Analysis 2 – Technical Overview
- August 11th market: Bitcoin continues to fall, mainstream currency rebounds, market trend is clear
- Babbitt column | Gu Yanxi: the beginning of Libra, the end of the public chain
This technique is very useful in some scenarios. For example, two companies, one is an advertiser and the other is a seller. If you want to know how many users are click through the advertiser's ads, go to the sales merchant to make the purchase, and the total amount of sales. So as long as the two companies provide two data sets, then find the intersection, and then the number of centralized users and the transaction amount. However, neither company will be willing to share the data set of the other party.
However, cryptography can be done without relying on the law.
The intersections can be aggregated through privacy intersections and techniques to provide aggregated information about the intersections without revealing the data sets of both parties. Both are the best.
Privacy Intersection and Technology provides a function similar to a legal contract that allows you to know what you want to know without a legal contract, but you won't know more. All of this is guaranteed by a cryptographic protocol.
This is similar to the blockchain technology. (The blockchain provides a credit in an untrusted environment)
For example, in the above application scenario, the final summary information that may be obtained is: 10,000 customers purchased the product after seeing the advertisement, and the total purchase amount is 1 million. Nothing else is known. I know it, but I don’t know why.
The above scenario is an application scenario for calculating the conversion rate of an advertisement. Google's privacy blending and technology can calculate ad conversion rates while protecting privacy. Of course, it can also be applied to research in other fields such as health care, vehicle safety, public policy, diversity and inclusiveness.
The open source library is not officially produced by Google, so it is for learning use only. At present, Ge Mi Chain Network Technology Co., Ltd. has begun to study the project, and combined with homomorphic encryption to design a more reasonable solution. Companies interested in this technology can contact us and welcome cooperation and exchange.
Source: Gemi chain
Author: Dr. Zhiyuan
We will continue to update Blocking; if you have any questions or suggestions, please contact us!
Was this article helpful?
93 out of 132 found this helpful
Related articles
- The market ushered in a counter-offensive yesterday, or did not have too strong continuity
- Recruiting the central bank digital currency countdown
- Ethereum: Only when ETH becomes a currency, Ethereum can succeed
- South Korea's SK Group will establish a blockchain-based donation platform to issue two platform tokens
- Babbitt Column | Encrypted World: The Pirates of Dream Space in the Matrix of Digital Money
- Central bank official "portrait" legal digital currency
- Center absence: history, current status and prospects of atomic exchange and decentralized trading platforms