Open Source Accelerates Data Circulation Inventory Hidden Language 1st Anniversary Meetup Highlights

On July 22, the Meetup for the first anniversary of the Yinyu Open Source Community was held in Shanghai. Under the guidance of the Shanghai Science and Technology Association, with the support of the Shanghai Open Source Information Technology Association, the Institute of Cloud Computing and Big Data of China Academy of Information and Communications Technology, and the Privacy Computing Alliance, Watch, listen, and play together with interested parties, industry users, and technology developers who are concerned about data elements and privacy computing, not only sharing the joy and insights of the first year, but also sharing and communicating around the future of communities, technologies, and applications .

picture

PART 01

1. Community Ecology

As the scale of the community expands and the content of exchanges deepens, the voices in the community for "improving the community organization structure as soon as possible, establishing modular work units, and clarifying the goals of joint construction" are gradually rising. At the event site, the Community Technical Steering Committee's pioneering and newcomers jointly released the "Arguments Open Source Community Special Interest Group (SIG) Development Plan and the First Batch of SIG Member Units".

picture

Qiushi Chair Professor of Zhejiang University, ACM / IEEE Fellow Kui
Ren Vice President and Chief Technology Security Officer of Ant Group, Visiting Professor of Peking University Tao Wei Yu Yuhua, Chief Scientist of Trusted Computing
, Professor of Shanghai Jiaotong University, Chief Scientist of Shanghai Future Intelligence Research Institute
, Jin Yier, co-chairman of IEEE Hardware Security and Trustworthiness Committee

In the first release, the Yinyu open source community has clearly established four SIGs including TEE, hardware acceleration, privacy and security algorithms, and technical standards, and announced the first batch of 14 member units . , and will continue to openly recruit member units (click at the end of the article to read the original text for details to join SIG), representatives of some units attended the scene and briefly introduced the direction of cooperation in the community to be carried out.

picture

2. Technical planning

The open-source Roadmap has always been the focus of the community. On the occasion of the first anniversary of open-source, Lingyu released version 1.0. Compared with the previous framework structure, its technical connotation and trend edge have been expanded. Standing at the new starting point of the version chapter, Wang Lei, General Manager of Yinyu of Ant Group's Privacy Computing Department and Head of Yinyu Framework, announced the target direction of the next stage on the spot.

picture

" The goal after Lingyu 1.0 is to develop into a community project and a social project. Open source co-construction is a very important theme. " Around this, Wang Lei and the scene introduced in detail the projects including Kuscia, YACL, SPU, HEU, TEEU, PSI / PIR, CCL mechanism, data analysis capabilities, federated learning capabilities, SecretPad adage white screen products, and the open source goals of each module in the next stage of interconnection.

The release of the Roadmap this time is slightly different from the past. In the explanation of each module, Wang Lei separately expanded the different functional positioning of each part and gave the portraits of the participants , including operation and maintenance development, cryptographic protocol/security research and development, machine Learning R&D, compiler R&D, data compliance research, TEE R&D, database R&D, AI security R&D, privacy computing product R&D, various algorithm R&D personnel, etc. By displaying relevant core goals for multiple types of community member roles and community user roles, it is convenient for developers with different backgrounds to find their own precise positioning in the community and give full play to their own technical advantages to participate in co-construction.

3. Co-construction tasks

Not only setting goals, Wang Lei also released the content of the second phase of the lingo "OSCP" open source contribution task, including SecretFlow, FL, SPU, YACL, HEU, TEEU, SCQL and other projects, covering algorithm optimization, model implementation, and example implementation , document verification, adding preprocessing tutorials, implementing unilateral operators, splitting algorithms and other tasks to improve the ease of use and richness of functions of the lingo framework. In the first phase of "OSCP", community developers actively participated in contributions through document verification, document translation, function development, etc. The value of building strength.

picture

PART 02

Where does the frontier trend of privacy computing point?

10 speech quotes to clear up confusion:

"In today's digital age marked by cloud computing, big data, artificial intelligence technology, etc., the information age with explosive growth in data scale, and the intelligent age with massive agglomeration." Minister Ge Zhaohui said: "The Association for Science and Technology will promote open source in Shanghai. Professional groups such as the Information Technology Association and the Shanghai Integrated Circuit Industry Association carry out more community activities with the privacy open source community, and jointly promote the growing and stable development of the argot open source community, and jointly promote the development and wider application of privacy computing technology , to truly implement the country's plan for the marketization of data elements. "

—— Ge Zhaohui/Deputy Director of the Academic Department of Shanghai Association for Science and Technology

picture

"The lingo was officially open-sourced in July last year, and the activity and participation of the community is beyond our imagination." Teacher Wei Tao said: "The lingo will definitely be the lingo of the community in the future, and it is a lingo that promotes development together. As a new type of trusted privacy computing The architecture bears the important mission of promoting the safe and healthy development of the external circulation of data elements . There will also be a new system upgrade, while firmly improving the ease of use and lowering the threshold for getting started. Together, we support the steady development of the community, cultivate a fertile ecological soil, and look forward to the growth of ecological innovation. 'Emerge'."

—— Wei Tao/Vice President and Chief Security Technology Officer of Ant Group

picture

"Before any technology is applied on a large scale, there must be a phenomenon-level application, and there must be a soil for the phenomena-level application to appear. This ecology is a soil." Professor Jin Yi'er said: "The hidden language community is one of many ecological A very good job”, and also expressed more expectations for the Yinyu open source community: “ An open source community is not only an open source of technology, but also an open source of mentality.

——Jin Yier/Co-Chair of IEEE Hardware Security and Trustworthiness Committee, Ph.D. in Electrical Engineering from Yale University

picture

"The large model of artificial intelligence, whether it is a large language model or a multimodal AIGC model, will become the largest data consumer and the largest producer of data in the entire human society in a short time. Privacy Computing technology will become a bottom-line security technology that utilizes the capabilities of artificial intelligence, AIGC and other large models in the future.

—— Ren Kui/ Qiushi Chair Professor of Zhejiang University, ACM/IEEE Fellow

picture

"Quantum Resistant Multiparty Secure Computing"

"The achievements of cryptography that won the Turing Award include basic algorithms and protocols such as public key cryptography and technologies related to privacy computing, such as multi-party secure computing and zero-knowledge proof. Post-quantum cryptography has many applications in emerging fields of cryptography, such as
: Fully homomorphic encryption, advanced cryptographic algorithms and theories based on LWE, VOLE protocol based on LPN, etc. The future development trend can be combined with some existing post-quantum cryptography technologies to do some post-quantum migration of multi-party secure computing protocols to achieve complete anti-corruption. Quantum-safe multi-party secure computing."

—— Yu Yu/Professor of Shanghai Jiaotong University, Chief Scientist of Shanghai Future Intelligence Research Institute

picture

"IIFAA × Hidden Words: Distributed Authentication Helps Visually Impaired People Watch Movies Online"

"China is the country with the largest number of blind people in the world. In order to solve the problem of blind people watching movies online, IIFAA uses distributed identity authentication technology based on the concept of Web 3 to build a new digital trust system for the visually impaired . Proof of knowledge solves the difficult problems of account trust and privacy protection.

—— Wu Sijie/Operation Director of Internet Trusted Certification Alliance

picture

"Privacy Computing in the Practice of Insurance Risk Control Scenarios"

"The current challenge facing insurance companies is how to fully mobilize data assets inside and outside the company under the premise of safety and compliance. Under the original model, the unilateral data of insurance companies cannot be supported, and the scene partners also have compliance concerns. The privacy-like computing framework and the multi-party secure computing solution based on it provide us with new options.**Based on privacy computing, we can propose some new risk control models,** and build a joint risk control network.*** *"

——Liu Xiangbin/Deputy General Manager of Cathay Pacific Insurance Technology Center

picture

"Application of Privacy Computing in Smart Car Scenarios"

"With the change of insurance's determination of liability for traffic accidents, it is necessary to introduce key data elements for autonomous driving. From the occurrence of traffic accidents to on-site surveys, to pulling data, to the rules of professional institutions, and to settlement of claims by corresponding institutions, the process is complicated and involves A large amount of privacy such as car owner's personal information, driving track, location information, etc. **We introduce blockchain privacy technology around this scenario, and based on the argot open source framework as the base, we have developed a solution that can guarantee data privacy and security.** I hope that Yinyu can support domestic Xinchuang in the future, and I also hope that Yinyu will provide more operators and algorithms in the future.”

——Hu Yuwan/Lingshu Technology Privacy Computing, Blockchain Product Director

picture

"Privacy Computing Interconnection: Connotation, Application Status and Future Prospects"

"**Privacy computing interconnection involves many aspects, among which algorithm interoperability is the core. **The current main technical route includes algorithm component migration, open algorithm protocol, and the cross-domain data exchange protocol proposed by Huakong Qingjiao for future data circulation ( IDDE). Huakong Qingjiao and Yinyu have realized the ECDH-PSI open algorithm and IDDE-based horizontal LR modeling, and completed the interactive verification on the public network. We welcome more participants to enrich and improve interconnection-related algorithms and protocol."

——Wang Yunhe/Strategy Director and Head of Standardization of Huakong Qingjiao

picture

"Efficient and secure multi-party learning with enhanced differential privacy"

"**The application of machine learning in various fields is data-driven, and more high-quality data means better models. However, these data often involve personal privacy, and their use needs to be regulated and supervised. **We A secure differential privacy stochastic gradient descent protocol is proposed to provide quantifiable privacy guarantees for secure multi-party learning. Two optimization methods are proposed from the perspective of machine learning model training to reduce the accuracy loss caused by differential privacy and improve the efficiency of secure multi-party learning .The experimental results show that PEA achieves secure multi-party learning with privacy accuracy, efficiency, and balance."

—— Ruan Wenqiang / Ph.D candidate, School of Computer Science, Fudan University

picture

PART 03

Show me the code!

More than just code!

**Voice of the community at the selected event site: **Looking forward to bringing together the most authentic community voices and cherishing every face-to-face discussion and exchange is the reason why the Yinyu open source community Meetup has always insisted on holding offline activities. In addition to hard-core speech sharing, more forms of communication are also prepared on the site: there is content that traces back to the source of the code itself: code snippets recommended by community developers and users; there are academic cutting-edge tracking content: from major Poster display of field achievement papers in international top conferences; and hands-on experience: by dragging and dropping on daily computer equipment, you can experience the functions of Lingyu products.

picture

More offline meeting plans are under preparation. Welcome to get the latest news through "Argent Language's Small Theater". The live code snippets and thesis results of this event will also be launched on Yin Yu GitHub one after another. We look forward to growing together and making progress together!

Guess you like

Origin blog.csdn.net/m0_69580723/article/details/131940651