Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private information retrieval method in environment of a plurality of servers

A server and server-side technology, applied in the field of private information retrieval, can solve the problem of not considering the potential threat to private information of a single server, and achieve the effect of reducing the threat

Inactive Publication Date: 2012-08-08
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it does not take into account the potential threat of a single server to private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private information retrieval method in environment of a plurality of servers
  • Private information retrieval method in environment of a plurality of servers
  • Private information retrieval method in environment of a plurality of servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a method for establishing a secret communication between a client and a server, and the user can use this method to establish a secret channel with the server. Such as figure 1 As shown, this embodiment includes the following steps:

[0057] Step 1, the user applies to establish a connection to the server. The user sends a Client-Hello message to the server, and transmits information such as the encryption type that the machine can handle to the server;

[0058] Step 2: The server responds to the user with a Server-Hello message and sends its own X.509 certificate so that the user can authenticate itself;

[0059] Step 3: After the user authenticates the server, the master key will be generated, and then encrypted with the public key of the server using the RSA encryption algorithm and then transmitted;

[0060] Step 4: The server uses its own private key to decrypt the information sent by the user. The user sends the session ID to the serve...

Embodiment 2

[0063] This embodiment provides a method for an interaction process between a client and a server, and the user can use this method to interact with the server. Such as figure 2 As shown, this embodiment includes the following steps:

[0064] Step 1: On the client side, the query statement sent to the server side needs to be processed. Here, it is assumed that the user's query sentence is "high blood pressure". Then, a certain encoding method is used to encode it, and it will be sent in the form of a digital stream, and then it needs to be processed using the secret sharing protocol and the ElGamal encryption algorithm. ,Specifically:

[0065] ①. Given a finite field Z and a secret σ∈Z, a (3+1)-private 6-way secret sharing scheme needs to be established. Here, l is taken as 6, and t is taken as 3, that is, there are 6 servers in total, and 3 of them conspire with each other, which are malicious servers. Select 6 pairwise different non-zero elements a from Z 1 , a 2 ,......

Embodiment 3

[0074] This embodiment provides a solution for the client to process the information fed back by the server. The user can use this solution to process the received information and obtain required data. Such as image 3 As shown, this embodiment includes the following steps:

[0075] Step 1: Because l (here are 6) servers may not all be able to respond to the client's request, assuming that there are k=4 servers that have responded, then let γ 1 , gamma 2 ,…, γ 4 For these 4 servers, the response vector [R j1 , R j2 ,...,R js ] is set to ⊥. Then G={γ 1 , gamma 2 ,…, γ 4}, and H={(G,ε)}.

[0076] Step 2: For the case of k≤t, that is, the number of responding servers has not reached the number of colluding servers, then the program is terminated and an error "not enough servers respond" is thrown. Therefore, let k be the number of the minimum number of trusted servers, then the range of the number of trusted servers h is In this example, k=4>t=3, so this problem does...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private information retrieval method in the environment of a plurality of serves, which includes achieving confidential correspondence between a client and a server through a security socket layer (SSL) protocol; supporting mutual information retrieval between the client and the server through a secret sharing protocol and EIGamaI homomorphic encryption algorithm; and processing feedback information of the server with the Lagrange interpolation theory support through the client. According to the private information retrieval method, a virtual data matrix is presented for solving malicious saving and snooping of database servers to inquiring information of users, the retrieval of the client to the server can actually be performed on the virtual data matrix, thus, information on the virtual data matrix can be automatically cleared after the inquiring ends every time; the homomorphic encryption technology is applied in the search scheme of privacy information protection, and second encryption is performed to the secrete sharing vector of the inquiring information, accordingly, the threaten of a single server to the inquiring information is greatly reduced.

Description

technical field [0001] The present invention relates to the technical field of network communication data protection, in particular to a private information retrieval method in a multi-server environment, which can be used in patent databases, medical databases, online censuses, real-time stock quotes, address location services, etc. demanding occasions. Background technique [0002] In recent years, the development of computer network technology has driven the vigorous development of information retrieval technology, and at the same time, users' needs for information retrieval have become more and more diverse. Some network users not only need to retrieve the information they need in the open network environment, but also need to protect the privacy of their query information. Information privacy retrieval is one of the important topics in information security research, which needs to be realized through secret sharing, homomorphic encryption and other technologies. With ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
Inventor 陈杨杨黄征
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products