Check patentability & draft patents in minutes with Patsnap Eureka AI!

Safe data aggregation method

A data aggregation and security technology, applied in the field of secure data aggregation privacy protection, can solve problems such as inability to use, and achieve the effect of security advantages and resource consumption advantages

Inactive Publication Date: 2014-02-12
北京智融时代信息技术有限公司
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this type of technology cannot be used in applications without a trusted aggregation point (such as cloud computing services)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data aggregation method
  • Safe data aggregation method
  • Safe data aggregation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Such as figure 1 As shown, the security data aggregation model based on the present invention includes an aggregation node and multiple participating nodes, and the participating nodes send data to the aggregation node to implement aggregation.

[0024] Such as figure 2 As shown, the aggregation process is:

[0025] The administrator determines the relevant parameters of the elliptic curve E and the base point G, and broadcasts the parameters and G of the elliptic curve. The aggregation node generates the private key k, calculates the public key K according to the formula K=kG and the base point G, and broadcasts K.

[0026] The manager also generates a set of keys k 0 ,k 1 ,k 2 ,...,k n , and make k 0 =k 1 +k 2 +...+k n , put k 0 Securely transmitted to the aggregation node, k 1 ,k 2 ,...,k n Securely transmit to each participating node respectively.

[0027] Participating nodes use public key K and key k respectively 1 ,k 2 ,...,k n Encrypt plaintex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe data aggregation method. The safe data aggregation method is based on a data aggregation model including an aggregation node, a plurality of participating nodes and a trusty manager. The safe data aggregation method is based on an elliptic curve homomorphic encryption method, and safe addition polymerization operation can be achieved. According to the safe data aggregation method, the trusty aggregation node is not needed, and the aggregation node only can decrypt the results after aggregation and can not decrypt data of each participating node. Compared with a homomorphic encryption method based on public key systems like RSA and ELGamal, the safe data aggregation method based on the elliptic curve method has outstanding advantages in aspects like safety and resource consumption.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a safe data aggregation privacy protection method. Background technique [0002] Using data aggregation technology, information from different users or observation points can be analyzed and processed, so as to obtain the information required by the task. Common data aggregation applications include sensor network aggregation, data mining, and cloud computing services. In these applications of data aggregation, it is generally necessary to protect the privacy information of different users, participants or observation points in the aggregation. It should be ensured that the private information of each participant in the data aggregation process cannot be leaked to other participants or illegal users, and even in some cases, the aggregation point cannot obtain the private information of each participant but can only obtain the aggregated results. [0003] Existing technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 钱萍刘镇刘澎
Owner 北京智融时代信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More