Unlock instant, AI-driven research and patent intelligence for your innovation.

A privacy-preserving method for solving the intersection of private attribute sets

A technology of private property and privacy protection, applied in the field of information security, it can solve the problems of high exponential calculation cost in homomorphic encryption operations, inability to solve the intersection problem between two sets, etc., so as to avoid the process of solving the intersection and avoid cumbersome and complicated , to meet the effect of privacy protection

Active Publication Date: 2020-12-18
HUBEI UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this protocol, the degree of polynomial is too high, which will lead to too much calculation cost of the index in the homomorphic encryption operation.
Some researchers use Gödel coding and homomorphic encryption algorithm to solve the intersection problem of privacy-preserving sets, but this solution intelligently solves the intersection problem between multiple sets, and cannot solve the intersection problem between two sets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy-preserving method for solving the intersection of private attribute sets
  • A privacy-preserving method for solving the intersection of private attribute sets
  • A privacy-preserving method for solving the intersection of private attribute sets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0040] please see figure 1 , the present invention involves the following entities: user, gateway GW and control center CC. Suppose there are n users, 1 gateway and 1 control center. User U i The private attribute set of W i , i=1,2,...,n, each attribute in the attribute set is taken from the attribute dictionary Σ, namely Suppose M=|Σ|, Σ={w 1 ,w 2 ,...,w M}, where w j (j=1,2,...,M) represents the jth attribute in the attribute dictionary Σ; the user sends the ciphertext containing the information of his own private attribute set to the gateway GW; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient private attribute set intersection solution method with a privacy protection function. The efficient private attribute set intersection solution method comprises the steps that it is assumed that a system has n users, a gateway and a control center; the users send ciphertext containing private attribute set information of the users to the gateway; the gateway calculates the user ciphertext and sends ciphertext obtained by calculating to the control center; and the control center obtains an intersection of the private attribute sets of the n users accordingto the received ciphertext. According to the efficient private attribute set intersection solution method, the private attribute sets of the users are represented to a polynomial of one indeterminatemeeting the Horner rule, and by combining a homomorphic encryption algorithm, the intersection of the private attribute sets of the users is obtained under the situation that the private attribute sets of the users are not disclosed; and the efficient private attribute set intersection solution method can be used for user feature analysis in the fields of social network, e-commerce, e-government,public opinion management and the like and has quite high practicability.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an efficient method for solving the intersection of private attribute sets with privacy protection, in particular to a method for solving privacy protection of user private attribute sets by combining homomorphic encryption algorithm and Horner's law. Protected Efficient Private Attribute Set Intersection Solving Method. Background technique [0002] As various applications of Internet big data penetrate into all aspects of people's lives, while these applications bring convenience to people's lives, they also pose an increasingly strong threat to people's privacy. Therefore, the issue of privacy protection in the era of big data is a problem worthy of research. Privacy-preserving data computing is a basic big data privacy-preserving technology. This technology can complete computing tasks between private data without leaking private data. Privacy-preserving set int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/00H04L29/06H04L9/30
CPCH04L9/008H04L9/3033H04L9/3073H04L9/3247H04L63/0442
Inventor 沈华张明武李兵兵陈效孙代杰张劭辰彭博杜林
Owner HUBEI UNIV OF TECH