Data hiding query security sharing system and method based on multi-party security computing

A security and data technology, applied in the field of big data technology and cryptography

Active Publication Date: 2021-02-12
SICHUAN XW BANK CO LTD
View PDF11 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the deficiencies in the above-mentioned prior art, the purpose of the present invention is to provide a data hidden query security sharing system and method based on multi-party secure computing, aiming to solve the problem of security of key user information and user attribute information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data hiding query security sharing system and method based on multi-party security computing
  • Data hiding query security sharing system and method based on multi-party security computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] Assume that institution A is the main institution, institution B is the data asset institution, the main institution is the data query initiator, and the data asset institution is the data provider.

[0058] Step 1: Through two-two handshakes between system institutions, the sharing of public key information between institutions and the two-two privacy interaction of private keys are realized. The detailed steps are as follows:

[0059] Step 1.1: Subject institution A generates a dynamic public key. The public key information of one inter-organization is randomly and dynamically generated by the main institution A. In order to improve the security of the data sharing system, the public key meets the requirement of 256 bytes, and the public key information changes dynamically. The change period is generated by a random number, such as 5 minutes Change once. Assume that the public key information between the main institution A and the data asset institution B is p.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of big data technologies and cryptology, in particular to a data hiding query security sharing system and method based on multi-party security computing. The invention provides a data hiding query security sharing system and method based on multi-party security computing. The system comprises a DH key interaction module, a user key information hiding interaction module, a user core data hiding interaction module and a user core data security sharing module. A new thought is provided for breaking a current inter-institution data barrier, a new schemeis provided for inter-institution data safety sharing, it is ensured that user identity information cannot be decrypted by other third parties through a key dynamic dual encryption technology and a secret sharing algorithm, and information safety sharing that institution core data cannot be delivered out of a database is achieved. Not only is safety of user information ensured, but also safety ofdata assets of a financial institution is ensured.

Description

technical field [0001] The present invention relates to the fields of big data technology and cryptography technology, in particular to a data hidden query security sharing system and method based on multi-party secure computing. Background technique [0002] With the popularity of Internet applications and people's dependence on the Internet, Internet security issues have become increasingly prominent. At present, the Internet finance industry mainly carries out information sharing through the API interface. Generally, the three elements of the user's ID card number, mobile phone number, and name are used as the primary key of the user's identity information to query and interact with user attribute information. Usually, the three-element information of the user's primary key is transmitted in the form of plain text or MD5 encryption, and the user attribute information is directly interacted in plain text. This kind of information sharing has great security risks. MD5 enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0841H04L9/085
Inventor 贾坤王萍徐志华
Owner SICHUAN XW BANK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products