Multi-party privacy set intersection method for resisting malicious enemies

A multi-party privacy and malicious technology, applied in the intersection of privacy sets, can solve problems such as low efficiency and poor effect, and achieve the effects of saving time, improving operating efficiency, and reducing computing and communication overheads

Active Publication Date: 2020-01-21
HENAN NORMAL UNIV
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a multi-party privacy set intersection method against malicious adversaries, which is used to solve the problems of poor effect and low efficiency of existing methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party privacy set intersection method for resisting malicious enemies
  • Multi-party privacy set intersection method for resisting malicious enemies
  • Multi-party privacy set intersection method for resisting malicious enemies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0025] Such as figure 1 , 2 As shown, the network includes P 0 ,P 1 ,P 2 ,P 3 ,P t Multiple participants, that is, the participants in the network are P 0 with P i , i=1, 2...t, namely P i (i∈[t]).

[0026] In this embodiment, the privacy set intersection method is mainly divided into an offline stage and an online stage, which will be described in detail below.

[0027] Offline phase:

[0028] 1. Initialization phase

[0029] Parameter setting: participant P i has its own set of inputs Φ i is the participant P i The number of elements in the collection. N BF and N OT respectively represent the length of the Bloom filter and the input length of the receiver in the oblivious transfer protocol OT; k is the number of hash functions in the Bloom filter; H represents the random oracle whose output length is k; 0 The proportion o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-party privacy set intersection method for resisting malicious enemies. The method comprises an offline stage and an online stage. In the offline stage, appointment commitment, careless transmission and the like are carried out, and operation is carried out in the online stage; a threshold homomorphic encryption scheme, a non-interactive zero knowledge proof, an improved Bloom filter and the like are mainly used for constructing a protocol. Even if malicious enemies can obtain the Bloom filters and the operation results of all honest parties, the malicious enemies and the operation results cannot leak extra information of all honest participants except the intersection under the condition of aiming at multiple parties. The bulletin board function is achieved, the commitment values of all participants are disclosed together while all the participants send corresponding information to the bulletin board so that the published information can be convenientlyverified in the later period, and malicious behaviors of part of the participants are prevented.

Description

technical field [0001] The invention belongs to the technical field of privacy set intersection, in particular to a multi-party privacy set intersection method against malicious opponents. Background technique [0002] As an important branch of secure multi-party computing, private set intersection can perform intersection calculation without revealing the private set information of the participants, and has extremely wide applications in real life. Privacy set intersection can be used in social networks, botnet detection, human genome testing and proximity detection, etc. [0003] Freedman et al. proposed a privacy set intersection protocol based on homomorphic encryption and balanced hashing under the semi-honest model, and used the cut-and-choose method to implement a two-party privacy set intersection protocol under the malicious model. Kissner and Song introduced a polynomial-based privacy set intersection protocol. Huang et al. implemented a two-party private set int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08
CPCH04L9/008H04L9/0643H04L9/0869Y02D30/50
Inventor 张恩常键李钰侯缨盈杨刃林李会敏
Owner HENAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products