Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy-protection graph data intersection computing method

A technology of privacy protection and calculation method, which is applied in the field of graph data intersection calculation, and can solve problems such as the inability to guarantee user data privacy in cloud computing

Active Publication Date: 2018-05-18
NORTHEASTERN UNIV LIAONING
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, there are many problems in security and privacy protection in the related research based on graph data intersection computing, and the data privacy of users in cloud computing cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-protection graph data intersection computing method
  • Privacy-protection graph data intersection computing method
  • Privacy-protection graph data intersection computing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Specific embodiments of the present invention will be described in detail below in conjunction with technical solutions and accompanying drawings.

[0049] A privacy-protected graph data intersection calculation method, the steps are as follows:

[0050] Step 1: System initialization, performed by Alice. Alice generates a key pair for encryption and decryption by using the Paillier key generation algorithm, and makes the public key public. The specific steps are as follows:

[0051] Step 1.1: Alice selects the security parameter k, and executes the Paillier key generation algorithm (pk,sk)←KeyGen(1 k ). After the algorithm is executed, Alice obtains the public key pk and private key sk of the Paillier encryption system.

[0052] Step 1.2: Alice keeps the private key sk secretly and sends the public key pk to Bob.

[0053] Step 2: Alice represents all the points in the graph she holds as a polynomial, encrypts the coefficients of the polynomial, and finally sends the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of graph data intersection computing and provides a privacy-protection graph data intersection computing method. Graph data interaction computing is completed between entities of two parties, and privacy of graph data of both parties is protected in a computing process; a Paillier encryption system is used in a protocol so as to realize homomorphic addition and homomorphic multiplication on a ciphertext; and the protocol has the characteristics of efficient computation, less information leakage, and so on. The method can safely outsource an encrypted graph structure thereof to an untrusted cloud server and simultaneously keeps capability of querying the encrypted graph structure. Storage services provided by the cloud server can be used fully, meanwhile,query operations are trustingly assigned to be executed by the server, thus, the server can be guaranteed to be unable to obtain effective information during an interaction process as much as possible.

Description

technical field [0001] The invention belongs to the field of graph data intersection calculation, and in particular relates to a privacy-protected graph data intersection calculation method. Background technique [0002] Graph structured data and graph data processing have continuously received more and more research and attention in recent years. In recent years, many application fields have begun to convert traditional data into a graph structure for storage, and use graph operations to help solve many computing problems, including social networks, bioinformatics, communication networks, and transportation networks. For example, webpage data can be naturally represented and stored as graph-structured data, where static webpages are represented as points in the graph and links between webpages are represented as edges in the graph. Afterwards, by using a variety of different graph operations, it can help solve many web data calculation problems, including web search, web d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00G06F21/62G06F21/60
CPCG06F21/602G06F21/6227H04L9/008
Inventor 周福才徐紫枫李宇溪秦诗悦
Owner NORTHEASTERN UNIV LIAONING