Method and system for computing intersection of privacy-preserving sets based on polynomial representation

A technology of privacy protection and calculation method, which is applied in the field of computer network communication data security and privacy protection, and can solve the problem of low security

Active Publication Date: 2020-09-22
HUBEI UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the present invention provides a privacy protection set intersection calculation method and system based on polynomial representation to solve or at least partially solve the technical problems of low security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for computing intersection of privacy-preserving sets based on polynomial representation
  • Method and system for computing intersection of privacy-preserving sets based on polynomial representation
  • Method and system for computing intersection of privacy-preserving sets based on polynomial representation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] The present invention provides a privacy protection set intersection calculation method based on polynomial representation, which is applied to both users A and B who participate in the request, and participant A holds the first set, and participant B holds the second set, please refer to figure 1 , the method includes the following steps:

[0060] First execute step S1: initial setting of parameters, parameters include the construction vector generated by participant B, the second set of polynomials constructed by participant B according to the second set, and the first set of polynomials constructed by participant A according to the first set.

[0061] Specifically, the construction vector is constructed by the session initiator. In this embodiment, participant B is used as the session initiator. Of course, in other implementation manners, participant A may be used as the session initiator.

[0062] Specifically, step S1 specifically includes the following sub-steps: ...

Embodiment 2

[0095] This embodiment provides a privacy-preserving set intersection calculation system based on polynomial representation. The polynomial-based privacy-preserving set intersection calculation system is applied to both users A and B participating in the request, and participant A holds the first set, Party B holds the second set, see image 3 , the system includes:

[0096] The parameter initialization module 301 is used for initializing and setting parameters, and the parameters include the construction vector generated by participant B, the second set of polynomials constructed by participant B according to the second set, and the first set of polynomials constructed by participant A according to the first set ;

[0097] The message data sending module 302 is used for participant B to send message data to participant A, wherein the message data includes a construction vector, a first message representation vector and a second message representation vector, wherein the firs...

Embodiment 3

[0124] Based on the same inventive concept, the present application also provides a computer-readable storage medium 400, please refer to Figure 4 , on which a computer program 411 is stored, and the method in Embodiment 1 is implemented when the program is executed.

[0125] Since the computer-readable storage medium introduced in the third embodiment of the present invention is the computer-readable storage medium used to implement the polynomial representation-based privacy-preserving set intersection calculation in the first embodiment of the present invention, it is based on the introduction in the first embodiment of the present invention Those skilled in the art can understand the specific structure and deformation of the computer-readable storage medium, so details will not be repeated here. All computer-readable storage media used in the method of Embodiment 1 of the present invention belong to the scope of protection of the present invention.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection set intersection calculation method and system based on polynomial representation. According to the intersection calculation method provided by the invention, two participants (a caller B and a responder A) contain the sets of the own attributes and are not acquired by the other party, and the two participants obtain a set intersection through secure multi-party calculation, so that the common attributes of the two parties are acquired. The method specifically comprises the following steps that firstly, a participant and a participant initialize; apolynomial formed by combining the calling party with the random number encrypts the attribute set of the calling party and sends the encrypted attribute set to the responder A; the responder A receives a polynomial formed by the data information and the random numbers, encrypts the data of the two parties of the participant again and sends the data to the responder A; and an intersection set is obtaind through the calculation of two secure parties. The privacy protection set intersection calculation method based on polynomial representation can be used for the multi-party data security communication by utilizing the properties of the polynomial, so that the technical effect of improving the cracking difficulty and safety is achieved.

Description

technical field [0001] The invention relates to the fields of computer network communication data security and privacy protection, in particular to a method and system for calculating the intersection of privacy protection sets based on polynomial representation. Background technique [0002] With the further development of mobile Internet and Internet of Things technology, our life is becoming more and more convenient and fast. Whether it is food, clothing, housing and transportation, we can obtain relevant information through mobile phones, but we also have some problems in our fast and convenient life. . For example, when we go on a trip, we all use our mobile phones to search for the location of nearby tourist attractions, hotel information, food information, and so on. But while we obtain information, our own location information and other data are obtained by others, which may cause the leakage of personal privacy data. In addition, on mobile phones, we can find near...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/06
Inventor 阮鸥毛浩周靖刘涛张俪潇
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products