Safety two-direction vector advantage comparison method based on block chain

A blockchain and vector technology, applied in the field of cryptography and information security, can solve problems such as resistance, lack of feasibility, user privacy leakage, etc.

Active Publication Date: 2020-06-12
SUN YAT SEN UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the above methods can solve the two-way vector comparison problem, they are only applicable to the semi-honest model, that is, participants must perform each step honestly, and cannot resist malicious behavior
At the same time, the method proposed by Atallah uses a trusted third party, which lacks feasibility in practical use
Ibrahim's method lacks the case of equal vector nodes, which may cause user privacy leakage without preprocessing
At the same time, users of the above methods have to do a lot of calculation and communication operations, which brings more overhead to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] A method for comparing the advantages of secure two-way vectors based on blockchain, comprising the following steps:

[0036] S1. Suppose Alice holds vector A=[a 1 ...a n ], Bob holds vector B=[b 1 ...b n ], each element can be expressed as a K-bit integer;

[0037] S2. Key negotiation: Alice and Bob communicate and negotiate the parameters p and q required for ELGamal encryption, each in group Z q Select a random element S from A , S B , and calculate get in G q Select element f in , use h, f and group G q The generator g constructs the encryption key (g, h, f); among them, p and q are two large prime numbers, satisfying the condition p=2q+1, G q group The q factorial subgroup of , whose generator is g;

[0038] S3. Alice secretly shares her own data bit by bit, and sets the matrix A=[a 1 ...a n ] for each element a i It is divided into K shares, where 1≤i≤n, and each share contains the element a i A bit of can be expressed as [a i ] p =[[a i1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of cryptology and information security, and particularly relates to a security two-direction vector advantage comparison method based on a block chain. According tothe method, block chain and cloud outsourcing calculation is used as a basic framework, a block chain is used as a driving tool to replace a trusted third party to manage and supervise the whole calculation process, and normal operation of a vector is ensured. By means of cloud outsourcing computing, heavy computing tasks are transferred from a user to an outsourcing server with enough computing power, the burden of the user is relieved, and extra computing resources are fully utilized. According to the method, cloud outsourcing calculation and the block chain are combined, a reliable reward punishment mechanism is provided, the attack cost of a malicious server is greatly increased while the calculation overhead of a user is reduced, and therefore a semi-honest model protocol which is seriously limited in actual operation originally is guaranteed.

Description

technical field [0001] The invention belongs to the field of cryptography and information security, and more specifically, relates to a method for comparing the advantages of secure two-way vectors based on blockchain. Background technique [0002] With the rapid development of information technology, the Internet has become more and more important in people's daily life. In recent years, Internet applications and services have sprung up like mushrooms after rain. Although these Internet applications have brought great convenience to people's lives, many applications have also collected a large amount of user data in the process, so this has also aroused people's attention to the leakage of private information. As an effective privacy protection technology, multi-party secure computing is one of the directions that researchers focus on. It focuses on how to use the private information of participants to complete related computing tasks in distributed scenarios. Comparing t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30G06Q30/02
CPCH04L9/085H04L9/3013G06Q30/0207H04L9/50
Inventor 钟汉锐桑应朋
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products