Privacy protection hierarchical clustering method based on vector homomorphic encryption

A technology of homomorphic encryption and privacy protection, applied in the field of vector clustering, it can solve problems such as data privacy leakage, and achieve the effect of expanding the scope of application, ensuring the reliability of data privacy, and efficiently and accurately clustering

Active Publication Date: 2017-10-10
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is the technical problem in the prior art that th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection hierarchical clustering method based on vector homomorphic encryption
  • Privacy protection hierarchical clustering method based on vector homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0037] Example 1

[0038] This embodiment provides a privacy-preserving hierarchical clustering method based on vector homomorphic encryption, such as figure 1 , the method includes:

[0039] (1) The clustering analysis starts, and the client receives the vector group to be clustered (x 1 , x 2 ,...x n ), the vector group to be clustered (x 1 , x 2 ,...x n ) consists of N samples to be clustered;

[0040] (2) Use the vector homomorphic encryption method to treat the clustering vector group (x 1 , x 2 ,...x n ) for encryption, the key exchange matrix N and the bit expansion matrix W are retained during the encryption process, and the ciphertext vector group (c 1 ,c 2 ,...,c n );

[0041] (3) According to key exchange matrix N and bit extension matrix W, calculate matrix A, make AN=W, define intermediate matrix H=A T A;

[0042] (4) Combine the intermediate matrix H with the ciphertext vector group (c 1 ,c 2 ,...,c n ) to the clustering server for clustering an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a privacy protection hierarchical clustering method based on vector homomorphic encryption and solves the technical problem of a disclosure risk of data privacy after hierarchical cluster analysis is migrated to the cloud. With adoption of the method which comprises the following steps of: (1) starting clustering analysis and receiving a to-be-clustered vector unit by the client; (2) encrypting the to-be-clustered vector unit by means of a vector homomorphic encryption method to obtain a ciphertext vector unit; (3) defining an intermediate matrix H according to a key exchange matrix N and a ciphertext expanding matrix W; (4) performing clustering analysis according to the intermediate matrix H and the ciphertext vector unit; and (5) sending the ciphertext vector unit after clustering analysis to the client by a clustering server, and performing decryption by the client by employing a key matrix S to obtain a clustering result according to label combinations of the vectors, the problem is better solved and the method can be used for vector type judgment.

Description

technical field [0001] The invention relates to a vector clustering method of a hierarchical clustering algorithm under privacy protection, in particular to a privacy-protected hierarchical clustering method based on vector homomorphic encryption. Background technique [0002] Cluster analysis, also known as group analysis, is a statistical analysis method for studying classification problems, and it is also an important algorithm for data mining. Cluster analysis is composed of several patterns, and the pattern is a vector of measures, or a point in a multidimensional space. Cluster analysis is based on similarity, with more similarities between patterns within a cluster than patterns not within the same cluster. Cluster analysis adopts hierarchical method, and hierarchical method decomposes a given data set hierarchically until a certain condition is met. Specifically, it can be divided into two schemes: "bottom-up" and "top-down". In the "bottom-up" scheme, initially e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/008H04L9/0861H04L9/0869
Inventor 杨浩淼綦伟良何伟超黄云帆冉鹏姚铭轩金保隆汪小芬
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products