Method and system for encrypted retrieval of verifiable database based on secret sharing
A secret sharing and database technology, applied in digital transmission systems, transmission systems, digital data protection, etc., can solve problems such as cumbersome methods, low efficiency, and troublesome inspections
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0193] Using secret sharing of n=3, t=2, process a student information table as shown in the following table:
[0194]
[0195] Then, the server randomly generates a table of raw allocation vectors:
[0196]
[0197] At the same time, for the data attr of the same attribute, if attr i >attr j , the coefficient a of the polynomial corresponding to the data must also have a i >a j ; then, the following polynomial is generated, as shown in the following table:
[0198]
[0199] After that, according to the original allocation vector table, data encryption on different servers is implemented. For example: the allocation vector of server 1 is (2, 3, 3), all, the following contents are mainly stored in server 1 (the same is true for other servers), as shown in the following table:
[0200]
[0201] The data owner uploads a list of user access rights, encrypts the original assignment, and uploads it to a different server.
[0202] Now there are mainly 3 users, and t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com