Paper
11 July 2024 Federated privacy computing based on oblivious transfer in financial applications: a case study in credit risk management
Jian Liang, Fan Quan, Suyi Yang, Ping Tao, Fei Ge, Hualin Li
Author Affiliations +
Abstract
Invoice data is critical and highly sensitive for enterprises, yet it stands as one of the most extensively used data categories in the financial credit sector. Participants in the credit market, engaged in corporate lending activities, face the dual challenge of ensuring the security of enterprise invoice data and safeguarding the integrity of institutional rules. Traditional data computation and encryption present a dilemma, as two encrypted datasets cannot directly engage in calculations, and two datasets participating in calculations must be in plaintext. This necessitates the convergence of enterprise data and institutional rules for computation. Consequently, two sets of data must be exposed to one of the parties or a mutually trusted third party. In practice, identifying a genuinely trusted third party proves to be a formidable task. This paper introduces a federated privacy computing method based on an oblivious transfer algorithm in the context of risk control admission rules within the credit risk management field. This approach enables both parties holding data to determine admission rules without disclosing their own data.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Jian Liang, Fan Quan, Suyi Yang, Ping Tao, Fei Ge, and Hualin Li "Federated privacy computing based on oblivious transfer in financial applications: a case study in credit risk management", Proc. SPIE 13210, Third International Symposium on Computer Applications and Information Systems (ISCAIS 2024), 132100Y (11 July 2024); https://doi.org/10.1117/12.3034824
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantum communication protocols

Data privacy

Quantum cryptography protocols

Computer security

Quantum security

Industrial applications

Quantum encryption

Back to Top