Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for sharing confidential statistical data based on set operation

A technology of statistical data and set operation, applied in the field of information security, can solve problems such as leaking intersection elements, and achieve the effect of traffic optimization and confidentiality of statistical information

Active Publication Date: 2022-06-28
SHANDONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventors found that in business scenarios such as insurance, medical care, and credit reporting with high privacy requirements, it is not allowed to disclose intersection elements in many cases, and the two parties in the communication may calculate the union of sets and statistics based on the union

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for sharing confidential statistical data based on set operation
  • Method and system for sharing confidential statistical data based on set operation
  • Method and system for sharing confidential statistical data based on set operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] like image 3 As shown, this embodiment provides a method for sharing confidential statistical data based on set operations, which includes:

[0071] Step 1: The communicating party of confidential statistical data sharing uses cuckoo hash to map the input set X to the hash table, and the other communicating party of confidential statistical data sharing uses ordinary hashing to place each element in the input set Y into the hash table. all possible positions in the hash table;

[0072] Step 2: use the shared member test method to determine whether the elements in the input set of one party of communication belong to the input set of the other party of communication, and obtain the shared calculation result;

[0073] Step 3: Calculate statistical information about the operations of sets X and Y based on the shared calculation results, and transmit the corresponding set statistical information between the two communicating parties sharing confidential statistical data b...

Embodiment 2

[0106] This embodiment provides a system for sharing confidential statistical data based on set operations, which includes:

[0107] The communication party of the confidential statistical data sharing uses the cuckoo hash to map the input set X to the hash table;

[0108] The other party of the communication for the sharing of confidential statistical data, uses ordinary hashing to place each element in the input set Y to all possible positions in the hash table;

[0109] The communicating parties for confidential statistics sharing are configured to:

[0110] Using the shared membership test method, determine whether the elements in the input set belong to the input set of the other party of the communication, obtain the shared calculation result, and then calculate the statistical information about the set X and Y operations;

[0111] Use a dazed pseudorandom function to transmit aggregate statistics.

[0112] Among them, the protocol communication complexity of set X and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security and provides a confidential statistical data sharing method and system based on set operation. Among them, the confidential statistical data sharing method based on the set operation includes that the communication party of the confidential statistical data sharing uses cuckoo hash to map its input set X to the hash table, and the other communication party of the confidential statistical data sharing uses ordinary hash to input it Each element in the set Y is placed in all possible positions in the hash table; use the shared membership test method to judge whether the elements in the input set of the communication party belong to the input set of the other party in the communication, and obtain the shared calculation result; based on the shared calculation result , calculate statistical information about the set X and Y operations, and use the dazed random function to transmit the corresponding set statistical information between the communication parties sharing the confidential statistical data.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method and system for sharing confidential statistical data based on set operation. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] At present, it has become an objective demand to serve government decision-making and improve service quality by sharing isolated data scattered in multiple institutions and mining the potential value contained in it. However, in many scenarios, data holders often have privacy requirements, and the data to be shared usually contains a certain commercial value, so data holders do not want to reveal the plaintext information of the held data. Moreover, domestic and foreign laws and regulations on data security, such as the European GDPR and the entry into force of the domestic cryptography law, have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/606
Inventor 蒋瀚徐秋亮宋祥福蔺国强汪达安许继月
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products