A privacy-preserving method for solving the intersection of private attribute sets
A technology of private property and privacy protection, applied in the field of information security, it can solve the problems of high exponential calculation cost in homomorphic encryption operations, inability to solve the intersection problem between two sets, etc., so as to avoid the process of solving the intersection and avoid cumbersome and complicated , to meet the effect of privacy protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.
[0040] please see figure 1 , the present invention involves the following entities: user, gateway GW and control center CC. Suppose there are n users, 1 gateway and 1 control center. User U i The private attribute set of W i , i=1,2,...,n, each attribute in the attribute set is taken from the attribute dictionary Σ, namely Suppose M=|Σ|, Σ={w 1 ,w 2 ,...,w M}, where w j (j=1,2,...,M) represents the jth attribute in the attribute dictionary Σ; the user sends the ciphertext containing the information of his own private attribute set to the gateway GW; ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


