Method and system for sharing confidential statistical data based on set operation
A technology of statistical data and set operation, applied in the field of information security, can solve problems such as leaking intersection elements, and achieve the effect of traffic optimization and confidentiality of statistical information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] like image 3 As shown, this embodiment provides a method for sharing confidential statistical data based on set operations, which includes:
[0071] Step 1: The communicating party of confidential statistical data sharing uses cuckoo hash to map the input set X to the hash table, and the other communicating party of confidential statistical data sharing uses ordinary hashing to place each element in the input set Y into the hash table. all possible positions in the hash table;
[0072] Step 2: use the shared member test method to determine whether the elements in the input set of one party of communication belong to the input set of the other party of communication, and obtain the shared calculation result;
[0073] Step 3: Calculate statistical information about the operations of sets X and Y based on the shared calculation results, and transmit the corresponding set statistical information between the two communicating parties sharing confidential statistical data b...
Embodiment 2
[0106] This embodiment provides a system for sharing confidential statistical data based on set operations, which includes:
[0107] The communication party of the confidential statistical data sharing uses the cuckoo hash to map the input set X to the hash table;
[0108] The other party of the communication for the sharing of confidential statistical data, uses ordinary hashing to place each element in the input set Y to all possible positions in the hash table;
[0109] The communicating parties for confidential statistics sharing are configured to:
[0110] Using the shared membership test method, determine whether the elements in the input set belong to the input set of the other party of the communication, obtain the shared calculation result, and then calculate the statistical information about the set X and Y operations;
[0111] Use a dazed pseudorandom function to transmit aggregate statistics.
[0112] Among them, the protocol communication complexity of set X and...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com