A Verifiable Intersection Operation Method and System for Outsourced Encrypted Data
An operation method and technology for encrypting data, applied in digital transmission system, transmission system, user identity/authority verification, etc., can solve the problem of no method that can meet the verifiable intersection operation of outsourced encrypted data, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0072] The present invention will be further described in detail below with reference to the drawings and specific embodiments.
[0073] The verifiable intersection calculation method for outsourced encrypted data of this embodiment, such as figure 1 As shown, it is performed between a trusted third-party entity, TTP, at least two client entities, Alice and Bob, and an outsourced server-side entity, Server.
[0074] Trusted third party (Trusted Third Party, TTP): The producer of public parameters. Among all entities, the third-party entity TTP is trusted and is responsible for the initialization of the public parameters of all entities in the entire method. After initializing the public parameters, The public parameters are sent to the outsourcing server and two client entities.
[0075] Client Alice and Bob: The holder of the data set and the requester of the intersection operation of the data set. Alice and Bob are semi-trusted. They both want to know the plaintext data of the oth...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


