信息通信技术与政策

信息通信技术与政策

信息通信技术与政策 ›› 2022, Vol. 48 ›› Issue (5): 15-24.doi: 10.12267/j.issn.2096-5931.2022.05.003

研究论文 上一篇    下一篇

可信隐私计算:破解数据密态时代“技术困局”

Trusted-environment-based privacy preserving computing: breaks the bottleneck of ciphertext-exchange era

韦韬, 潘无穷, 李婷婷, 卫振强   

  1. 蚂蚁科技集团股份有限公司,杭州 310063
  • 收稿日期:2022-03-10 出版日期:2022-05-15 发布日期:2022-05-26
  • 作者简介:
    韦韬 蚂蚁科技集团股份有限公司副总裁,蚂蚁科技集团股份有限公司安全隐私科技委员会主席,北京大学客座教授,长期致力于让各种复杂系统变得更加安全,发表70多篇国际学术论文,获得中美授权发明专利30多项|潘无穷 蚂蚁科技集团股份有限公司高级专家,信息安全博士,主要研究领域为密码工程和隐私计算技术等,发表论文和专利50多项|李婷婷 蚂蚁科技集团股份有限公司资深专家,主要研究领域为基础安全架构的设计和实施等|卫振强 蚂蚁科技集团股份有限公司高级专家,主要研究领域为基础设施架构的设计和实施等

WEI Tao, PAN Wuqiong, LI Tingting, WEI Zhenqiang   

  1. Ant Group Co., Ltd., Hangzhou 310063, China
  • Received:2022-03-10 Online:2022-05-15 Published:2022-05-26

摘要:

因安全需求和法规要求,整个数据流通领域即将进入密态时代。要承载关系到国计民生各行各业的数据业务,数据密态技术必须要在安全性、性能、可靠性、适用性和成本上达到作为基础设施的关键指标要求。通过分析密态时代所需关键技术的现状,发现它们都有本质上难以克服的缺点。基于此,提出了一种新的隐私计算思路:可信隐私计算,它通过融合密码技术、可信计算技术等获得了更强大和更均衡的综合性质,并对其中的两项典型技术——受控匿名化和可信密态计算进行了介绍。

关键词: 密态时代, 隐私计算, 可信隐私计算, 可信密态计算

Abstract:

Due to security needs and regulatory requirements, the data exchange between entities is about to enter the ciphertext-exchange era. In order to satisfy the needs of data services related to the nation’s livelihood in various industries, the encrypted computing technology must meet the requirements as an infrastructure in terms of security, performance, reliability, applicability, and cost. In this paper, analyze the current status of key technologies required in the ciphertext-exchange era and find that they all have inherently insurmountable drawbacks. This paper proposes a new way of privacy preserving computing: Trusted-environment-based privacy preserving computing, which obtains more robust and balanced integrated properties by combining cryptographic and trusted computing techniques. Then, introduce two typical techniques-controlled anonymization and trusted-environment-based cryptographic computing.

Key words: ciphertext-exchange era, privacy preserving computing, trusted-environment-based privacy computing, trusted-environment-based cryptography computing

中图分类号: