Unlock instant, AI-driven research and patent intelligence for your innovation.

A Verifiable Intersection Operation Method and System for Outsourced Encrypted Data

An operation method and technology for encrypting data, applied in digital transmission system, transmission system, user identity/authority verification, etc., can solve the problem of no method that can meet the verifiable intersection operation of outsourced encrypted data, etc.

Active Publication Date: 2018-11-27
NORTHEASTERN UNIV LIAONING
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In addition, currently outsourced computing based on verifiable computing has not been able to satisfy the verifiable intersection operation method for outsourced encrypted data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Verifiable Intersection Operation Method and System for Outsourced Encrypted Data
  • A Verifiable Intersection Operation Method and System for Outsourced Encrypted Data
  • A Verifiable Intersection Operation Method and System for Outsourced Encrypted Data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The present invention will be further described in detail below with reference to the drawings and specific embodiments.

[0073] The verifiable intersection calculation method for outsourced encrypted data of this embodiment, such as figure 1 As shown, it is performed between a trusted third-party entity, TTP, at least two client entities, Alice and Bob, and an outsourced server-side entity, Server.

[0074] Trusted third party (Trusted Third Party, TTP): The producer of public parameters. Among all entities, the third-party entity TTP is trusted and is responsible for the initialization of the public parameters of all entities in the entire method. After initializing the public parameters, The public parameters are sent to the outsourcing server and two client entities.

[0075] Client Alice and Bob: The holder of the data set and the requester of the intersection operation of the data set. Alice and Bob are semi-trusted. They both want to know the plaintext data of the oth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A verifiable intersection operation method and system for outsourced encrypted data, belonging to the field of verifiable outsourced computing. It is performed between a trusted third-party entity, at least two client entities, and an outsourced server. The client entity is the holder of the data collection and the requester of the intersection operation of the data collection. The third-party entity is mainly responsible for the initialization of public parameters and the distribution of public parameters; the two client entities are mainly responsible for generating keys, encrypting data sets, calculating authentication information, verifying the results and evidence returned by the outsourcing server, and decrypting the keys returned by the outsourcing server. Document data collection; the outsourcing server is mainly responsible for executing the data collection intersection operation. The outsourced server does not need to decrypt the plaintext data set during the intersection operation. The outsourced server operates on the ciphertext, which can ensure the privacy of user data. The number of interactions between entities is small, the communication cost is small, and the correctness of the operation results is verified efficiently.

Description

Technical field [0001] The invention belongs to the field of verifiable outsourced computing, and particularly relates to a verifiable intersection calculation method and system for outsourced encrypted data. Background technique [0002] With the rapid development of computer technology and cloud computing, a new type of data management model has emerged: outsourcing data. The outsourcing data model mainly has three entities: data owner, data service provider, namely outsourcing server, and data query requester. Data owners outsource data to data service providers. Since data service providers can use technologies such as cluster applications, grid technology, or distributed file systems, they can provide efficient data query services for data query requesters. However, data owners store data on untrusted third-party outsourced servers, which increases the insecurity of data resources. [0003] After outsourcing data, due to the imbalance of computing resources in the real world...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3249H04L63/123H04L63/126
Inventor 周福才李福祥徐紫枫陈春雨王爽
Owner NORTHEASTERN UNIV LIAONING