Privacy protection encryption method based on homomorphic encryption, information data processing terminal

A homomorphic encryption and privacy protection technology, applied in the field of data processing, can solve the problems of high user cost, server computing cost and communication cost, inability to ensure user privacy information security, poor confidentiality of mobile network payment services, etc., to reduce computing costs and communication costs, reduce computing and communication costs, and protect the effect of position

Inactive Publication Date: 2018-12-18
CHONGQING UNIV OF EDUCATION
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(3) In this scheme, without providing valid attributes and prices to the service provider, the user cannot decrypt the ciphertext CT, because the user does not satisfy the attribute information encryption attribute tree policy of the service provider, because the obtained from TA The SK attribute of the private key does not match the R attribute tree of the ser

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection encryption method based on homomorphic encryption, information data processing terminal
  • Privacy protection encryption method based on homomorphic encryption, information data processing terminal
  • Privacy protection encryption method based on homomorphic encryption, information data processing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] Aiming at the traditional threshold policy access control scheme, the user cost and the computing cost and communication cost of the server are high; the existing encryption scheme has poor confidentiality for mobile network payment services and cannot ensure the security of the user's private information; the invention can make Multiple mobile users collaborate and use pseudonymization to protect their own identities, while using homomorphic encryption to protect their own service requests and other information.

[0036] The application principle of the present invention will be described in detail below in conjunct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of data processing characterized by protocol, and discloses a privacy protection encryption method based on homomorphic encryption, and an information dataprocessing terminal. The method includes: selecting hash function and a secure symmetrical encryption algorithm such as AES as encryption, using public-private key pair to enhance privacy protection,and realizing the request service to multiple users. The invention enables multiple mobile subscribers to cooperate with each other and to use pseudonym techniques to protect their own identity information, at the same time, homomorphic encryption technology is used to protect their own service requests and other information, if the user can get the required information in the base station cache,he will not request the information from the server, which can reduce the risk of exposing the sensitive information of the user; Otherwise, the user sends the request to the server through the aggregation request to realize k anonymity and diversity, which makes it impossible for the service provider to locate the service to the requesting user, which can protect the user's location, query information and query preferences.

Description

technical field [0001] The invention belongs to the technical field of data processing characterized by protocols, and in particular relates to a homomorphic encryption-based privacy protection encryption method and an information data processing terminal. Background technique [0002] At present, the commonly used existing technologies in the industry are as follows: with the rapid development of computer technology and its wide application, people's life is increasingly inseparable from computer products. Not all networks are trustworthy, so information security has become a hot topic in all industries. When obtaining services, it can ensure that the sensitive data of mobile users is effectively protected, and users other than the requester cannot obtain the service information obtained by the requester, that is, they can access and control third parties. Attribute-based encryption is an important encryption method for data access control. So far, scholars have proposed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L29/06
CPCH04L63/0407H04L9/008H04L9/0631H04L9/0643H04L9/0825H04L9/0869H04L63/0884
Inventor 韦鹏程李莉颜蓓周震姜娇
Owner CHONGQING UNIV OF EDUCATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products