Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection set intersection solving method based on DH encryption and Hash table

A technology of privacy protection and encryption, applied in the field of intersection of privacy protection sets based on DH encryption and Hash table, to achieve the effect of improving intersection efficiency and reducing server costs

Active Publication Date: 2020-08-18
HANGZHOU QULIAN TECH CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, Baidu's MesaTEE platform is based on the Trusted Execution Environment (TEE) technology to realize the intersection of privacy-protected sets, and the calculation of the set intersection is performed through Intel's SGX server. The multi-party set needs to encrypt its own data and send it to the server Medium; but an additional SGX server is required as an intermediary to coordinate and calculate the intersection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection set intersection solving method based on DH encryption and Hash table
  • Privacy protection set intersection solving method based on DH encryption and Hash table
  • Privacy protection set intersection solving method based on DH encryption and Hash table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] A method for finding the intersection of privacy-preserving sets based on DH encryption and Hash tables, the execution process is as follows figure 1 , which is used to initiate this intersection set request and the participants participating in this intersection set request, including the following steps:

[0033] (1) The initiator randomly generates a 2048-bit (decimal) prime number n as the encrypted modulus, and sends a PSI execution request for the privacy protection set intersection containing the prime number n to the participant; at the same time, a 2048-bit prime number p is randomly generated as the encrypted key Key, according to the one-way encryption method for the initiator data set M 1 The elements in are encrypted sequentially to obtain the data K encrypted by the initiator for the first time p ,Specifically:

[0034]

[0035] Among them, mod n Indicates the remainder of division by n, ie K p for The remainder of dividing by n; after the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection set intersection solving method based on DH encryption and a Hash table, and the method comprises the steps: firstly an initiator initiates an intersectionsolving request to a participant, two parties employ the same module and different secret keys to encrypt own data sets, and then send the data sets to the opposite parties; and then the initiator and the participant encrypt data sent by each other by using their own keys respectively, generate two hash tables for comparison, find out the same elements, and finally obtain an intersection. According to the method, the thought of a DH key agreement protocol is used for encrypting data to ensure the safety of the data of the two parties, and the Hash table is used for improving the intersectionsolving efficiency. The set elements of the two parties are encrypted unidirectionally and are difficult to crack, and the two parties need to encrypt in sequence, so that the set security with a small definition domain can be ensured, and one party is prevented from carrying out comparison attack by acquiring a universal set; moreover, the method does not need the assistance of an SGX server, only needs the interaction of the two sides, and reduces the server cost.

Description

technical field [0001] The invention belongs to the field of computer network communication data security and privacy protection, in particular to a privacy protection set intersection method based on DH encryption and Hash table. Background technique [0002] Protecting the privacy of data collections is a natural or even necessary requirement in many scenarios. For example, when the collection is a user's address book or a genetic diagnosis service user's genome, such input must be done through cryptography. Protect. The Private Set Intersection (PSI) calculation technology allows two parties holding their own sets to jointly calculate the intersection operation of the two sets. At the end of the protocol interaction, one or both parties should get the correct intersection, and will not get any information in the other party's set outside the intersection. [0003] PSI has many practical application scenarios, such as looking for contacts. When a user registers to use a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 李伟蔡亮邱炜伟张帅匡立中
Owner HANGZHOU QULIAN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products