Ciphertext data set intersection calculation method, device, system, client, server and medium

A computing method and data set technology, applied in the field of data security, can solve problems such as the inability to prohibit set intersection operations, the inability to specify users, and the inability to achieve fine-grained authorization.

Active Publication Date: 2019-11-19
SOUTH CHINA AGRI UNIV
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authorization provided by the user in this method allows the cloud server to freely perform set intersection calculations on all the user's data, and fine-grained authorization cannot be achieved, that is, the cloud server cannot only operate on part of the data, nor can it be specified. Users of Set Intersection Computation
For example, the first user, the second user, and the third user all upload encrypted genetic data to the cloud server, and the first user wishes to conduct a paternity test with the second user (this technology requires the use of set intersection calculations), so authorization is required to the cloud server, but cannot prohibit the cloud server from performing set intersection operations on its own data and the data of a third user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext data set intersection calculation method, device, system, client, server and medium
  • Ciphertext data set intersection calculation method, device, system, client, server and medium
  • Ciphertext data set intersection calculation method, device, system, client, server and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0107] Such as figure 1 As shown, this embodiment provides a method for calculating the intersection of ciphertext data sets, which is applied to the client and includes the following steps:

[0108] S101. Generate a user's public key and private key.

[0109] Each user uses a client, for a certain user i, the public key and private key of the user i are generated by the client it uses, such as figure 2 shown, including:

[0110] S1011. After user i starts the client and chooses to register, the client generates a random number

[0111]S1012. The client calculates the public key of user i and the private key (x i ,y i ,z i ).

[0112] S102. Encrypt the plaintext data set according to the plaintext data set and the public key input by the user to obtain a ciphertext data set, and send the ciphertext data set to the server.

[0113] Such as image 3 As shown, the step S102 specifically includes the following steps:

[0114] S1021. User i inputs plaintext data set D...

Embodiment 2

[0149] Such as Figure 10 As shown, this embodiment provides a method for calculating the intersection of ciphertext data sets, which is applied to a server and includes the following steps:

[0150] S1001. Receive a ciphertext data set sent by a client, and store the ciphertext data set in a ciphertext database.

[0151] According to the plaintext data set and public key input by the user, the client encrypts the plaintext data set to obtain the ciphertext data set, and sends the ciphertext data set to the server. After the server receives the ciphertext data set sent by the client, Store the ciphertext dataset in the ciphertext database.

[0152] S1002. Receive authorization information sent by the client.

[0153] After the user sends a ciphertext data set intersection calculation request to the server through the client, as described in Embodiment 1, four authorization levels can be selected (the first authorization level, the second authorization level, the third author...

Embodiment 3

[0188] Such as Figure 13 As shown, this embodiment provides a ciphertext data set intersection calculation system, the system includes n clients 1301 and a server 1302, n clients 1301 have the same function, but are used by different users, that is, a shared There are n users, and each user uses a client 1301 , and the n clients 1301 cannot communicate with each other, but are respectively connected and communicated with the server 1302 .

[0189] The client 1301 is used to generate the user's public key and private key; according to the plaintext data set and public key input by the user, the plaintext data set is encrypted to obtain the ciphertext data set, and the ciphertext data set is sent to the server 1302: According to the authorization level selected by the user, generate the authorization information of the authorization level; send the authorization information to the server 1302; receive the intersection of the ciphertext data set sent by the server 1302; accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext data set intersection calculation method, a device, a system, a client, a server and a medium, and the method comprises the steps: encrypting a plaintext data setaccording to a public key of a user, obtaining a ciphertext data set, and transmitting the ciphertext data set to the server; generating authorization information of the authorization level accordingto the authorization level selected by the user; sending the authorization information to a server, sending the ciphertext data set and the authorization information to a server, so that the server performs calculation according to the ciphertext data set and the authorization information to obtain an intermediate value set, performing intersection calculation on the ciphertext data sets of the two users according to the intermediate value set of the two users conforming to the authorization level to generate a ciphertext data set intersection, and sending the ciphertext data set intersectionto clients of the corresponding users; receiving a ciphertext data set intersection sent by the server; and decrypting the ciphertext data set intersection according to the ciphertext data set intersection and the private key input by the user to obtain a plaintext data set intersection. On the premise of ensuring the safety, the flexibility is remarkably improved.

Description

technical field [0001] The invention relates to a method, device, system, client, server and medium for calculating the intersection of ciphertext data sets, belonging to the field of data security. Background technique [0002] Cloud storage is an important service in cloud computing. It not only facilitates data backup, data sharing, and prevents data loss, but also effectively reduces data storage costs. With the development of cloud storage technology and frequent data leakage accidents in recent years, users pay more attention to the security of data in cloud storage. [0003] The data uploaded by enterprises and users to the cloud may be confidential data, such as personnel files and medical records. Encrypting the data and uploading it can effectively improve the security of the data, but it also destroys the original structure and characteristics of the data. Therefore, it is difficult to perform calculations on ciphertext data. Since data mining, duplicate file i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L63/20H04L67/1097
Inventor 黄琼王元昊肖媚燕苗莹刘文博
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products