Frequent item set mining method based on cloud outsourcing transaction data
A frequent item set mining and transaction data technology, applied in the fields of information security and data processing, can solve the problem of low security of data mining models
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0073] The following is attached figure 1 , the present invention will be described in further detail.
[0074] Step 1, send the encrypted system key.
[0075] The key generation center generates the strong private key and the public key of the encryption system according to the key generation algorithm Paillier.KeyGen.
[0076] The steps of the described key generation algorithm Paillier.KeyGen are as follows:
[0077] In the first step, the key generation center randomly selects two large prime numbers p and q, and the two large prime numbers satisfy gcd[p×q,(p-1)×(q-1)]=1, where gcd[· ] means the greatest common divisor.
[0078] Step 2, calculate the strong private key λ=lcm(p-1,q-1), where lcm(·) represents the least common multiple.
[0079] Step 3, the key generation center calculates the modulus N=p×q, from Randomly select an integer g in which satisfies ord(g)|N and gcd[L(g λ mod N 2 ), N]=1, the key generation center takes as the public key pk of the encrypt...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com