A cloud outsourcing privacy set comparison method and device

A privacy and collection technology, applied in the field of cloud outsourcing privacy collection comparison, can solve the problems of low practicability and scalability, and the security of outsourced computing cannot be guaranteed, and achieve strong practical value, improved security, and improved efficiency. Effect

Inactive Publication Date: 2020-04-14
HENAN NORMAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a cloud outsourcing privacy set comparison method and device to solve the problems of existing outsourcing computing that the security cannot be guaranteed, and the practicability and scalability are not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud outsourcing privacy set comparison method and device
  • A cloud outsourcing privacy set comparison method and device
  • A cloud outsourcing privacy set comparison method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] Professional content involved in the embodiment of the present invention:

[0019] 1. Key homomorphic pseudo-random function

[0020] Definition: F: κ×χ→y represents a secure pseudo-random function (PRF), and All are groups. If given F(k 1 , x) and F(k 2 , x), there exists an efficient algorithm that outputs then we remember is fully homomorphic for the key. That is:

[0021] Recently, Boneh et al. proposed the first provably secure key hom...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud outsourcing privacy set comparison method and a cloud outsourcing privacy set comparison device, which relate to the field of communication technologies, and are used for solving the problems that security cannot be guaranteed, and the practicality and extendibility are not high existing in the existing outsourcing privacy set comparison protocol. The cloud outsourcing privacy set comparison method comprises the steps that: a first server receives a random number ri and a first ciphertext sent by a terminal, converts the first ciphertext into a second ciphertext and sends the second ciphertext and the random number ri to a second server; and the first server receives a second server random number r<S2> and a third ciphertext fed back by the second server, converts the third ciphertext into a fourth ciphertext and sends the fourth ciphertext and the second server random number r<S2> to the terminal, wherein the second server adopts a second server secret key K<S2> to obtain a pseudo-random permutation of a terminal set and calculates an intersection set of the pseudo-random permutation, the third ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of the second server secret key K<S2>, and the fourth ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of a terminal secret key Ki.

Description

technical field [0001] The present invention relates to the field of communication technology, and more specifically to a method and device for comparing cloud outsourcing privacy sets. Background technique [0002] Private set comparison is an important research content of secure multi-party computation. The idea of ​​private set comparison is that participants can protect their private input information while computing the intersection of input sets. Privacy set comparison allows participants to calculate the intersection of input sets under the premise of protecting their own data privacy. It has important and extensive applications in data mining, homeland security, human genome research, social networks, and privacy protection. Although we can use general methods of secure multi-party computation to solve the problem of private set comparison, these methods are computationally inefficient. To further improve computational efficiency, many previous works focus on the de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L67/10
Inventor 张恩段新涛李名裴瑶瑶金刚刚范海博张汉卿
Owner HENAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products