Privacy protection association rule mining method based on sparse data set
A privacy protection, sparse data technology, applied in the computer field, can solve problems such as privacy leakage, and achieve the effect of reducing the risk of privacy leakage, high security, and improving computing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The present invention will be further described below in conjunction with the accompanying drawings.
[0049] Refer to attached figure 1 , a kind of privacy-preserving association rule mining method based on the sparse data set that the present invention proposes, comprises the following steps:
[0050] Step 1, system initialization:
[0051] (1.1) The key generation center generates system parameters, integer N and strong private key SK according to the distributed double trapdoor cipher DT-PKC; first, the key generation center generates two large prime numbers p and q, and satisfies in, and Be respectively the binary bit length of prime number p and q; Then according to prime number p and q, calculate integer N=p×q; SK=lcm(p-1,q-1) / 2, wherein, lcm(p-1,q -1) is the least common multiple of p-1 and q-1.
[0052] (1.2) The key generation center provides each data owner DO with system parameters i Generate an owner key pair Generate a miner key pair (pk M ,sk ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com