Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection K-NN (Kth Nearest Neighbor) classification method based on vector homomorphic encryption

A homomorphic encryption and privacy protection technology, applied in the field of vector classification, can solve the problems of estimated density diffusion, heavy calculation burden, etc., and achieve the effect of accurate classification

Active Publication Date: 2017-05-31
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the K-nearest neighbor rule for probability estimation density, there are two disadvantages. One is that the integral of the estimated density must be diffused to infinity, and the other is that there is a heavy burden on the calculation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection K-NN (Kth Nearest Neighbor) classification method based on vector homomorphic encryption
  • Privacy protection K-NN (Kth Nearest Neighbor) classification method based on vector homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Such as figure 1 The privacy protection K-NN classification method of the present invention based on vector homomorphic encryption includes the steps:

[0041] A. Receive query vector group (x 1 , X 2 ,...X n ) And the standard vector group (p 1 , P 2 ,...P m ), where the standard vector group (p 1 , P 2 ,...P m ) Corresponds to the standard classification label (t 1 , T 2 ,...T m );

[0042] B. Since there is a formula Sc=ωx+e, S is the key, c is the ciphertext, ω is a large integer, x is the query vector, e is the error term, and the value of each element of e is not greater than At the same time |S| (n represents the number of rows of the query matrix G, which is the number of vectors in the query vector group, w represents the number of columns of the query matrix G, which is the dimension of each query vector), then: (GS)c=ωGx+Ge, It can be seen that Gx is encrypted into ciphertext c under the secret key GS. Therefore, through the query vector group (x 1 , X 2 ,...X...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a privacy protection K-NN (Kth Nearest Neighbor) classification method based on vector homomorphic encryption, which comprises the steps of: A, receiving an inquiry vector set and a standard vector set; B, generating a matrix G by the inquiry vector set, and enabling the standard vector set to use a secret key S to generate a ciphertext group and a new secret key GS by vector homomorphic encryption; C, carrying out secret key conversion on the new secret key GS to form a converted secret key S' so as to obtain a converted matrix M and a converted ciphertext group at the moment; D, carrying out decryption on the converted ciphertext group by using the converted secret key S' so as to obtain a decrypted vector set; and E, according to components of decrypted vectors of k minimum values, attaching a classification tag to each corresponding inquiry vector. According to the privacy protection K-NN classification method disclosed by the invention, privacy data of a user can be excellent protected; and moreover, in a case that the privacy data is protected, the inquiry vectors of the user are efficiently and accurately classified by a K-NN algorithm, so that efficiency of judging a vector type is improved, and an application range of judgment on the vector type is enlarged.

Description

Technical field [0001] The present invention relates to a vector classification method of K-NN algorithm under privacy protection, and specifically is a privacy protection K-NN classification method based on vector homomorphic encryption. Background technique [0002] K-Nearest Algorithm (K-NN) is widely used in pattern recognition, and it also has a good performance in data classification. In the era of big data, complex calculations are often outsourced to third-party clouds. However, in this process, the outsourced data may include some sensitive data of sensitive users. Outsourcing the user's information directly to a third-party cloud may cause some of the user's private information to leak out and cause losses to the user. A direct solution is to encrypt the data before uploading it to the cloud, but this also brings some new challenges to the efficiency of the K-NN algorithm. Homomorphic encryption technology can operate under ciphertext, and the result after decryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/00G06F17/30G06K9/62
CPCH04L9/008H04L9/088H04L63/0407G06F16/35G06F18/24147
Inventor 杨浩淼何伟超黄云帆冉鹏姚铭轩金保隆
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products