Unlock instant, AI-driven research and patent intelligence for your innovation.

A Proxy Privacy Set Intersection Method with Searchable Function

A search function and collection technology, applied in the field of proxy privacy collection intersection, can solve problems such as poor performance, and achieve the effect of ensuring security, low communication complexity and computational complexity

Active Publication Date: 2022-07-26
BEIHANG UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] For this reason, an object of the present invention is to propose a method for intersecting proxy privacy sets with a searchable function. In this method, only when both users agree, the cloud server can calculate the relevant data through the calculation license jointly generated by both parties. The intersection of sets; there is no need to re-prepare data every time PSI is calculated, which solves the problem of poor performance of existing protocols in new scenarios, and is safe and efficient under the semi-honest adversary model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Proxy Privacy Set Intersection Method with Searchable Function
  • A Proxy Privacy Set Intersection Method with Searchable Function
  • A Proxy Privacy Set Intersection Method with Searchable Function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following describes in detail the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary, and are intended to explain the present invention and should not be construed as limiting the present invention.

[0034] The following describes a method for intersecting proxy privacy sets with a searchable function according to an embodiment of the present invention with reference to the accompanying drawings.

[0035] like figure 1 shown, the overall flow of the present invention is shown. In the present invention, different processing can be performed according to the size of the data set, and two specific protocols FS-PSI and SS-PSI are respectively proposed in two scenarios of small data set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy privacy set intersection method with a searchable function. On the premise of protecting data privacy, the searchable encrypted storage and proxy privacy set intersection calculation can be simultaneously performed after outsourcing data. According to the specific requirements of different database sizes, two specific protocols are designed to realize the combination of searchable encryption and privacy set intersection. The first scheme, FS‑PSI, combines stream ciphers, is suitable for smaller datasets, is simple to use, and is user-friendly. The second scheme, SS‑PSI, combines the SSE scheme based on index construction and is suitable for larger databases, with additional requirements for users. Compared with other proxy privacy set intersection protocols, it has the optimal interaction and computational complexity.

Description

technical field [0001] The invention relates to the technical field of proxy privacy set intersection, in particular to a proxy privacy set intersection method with searchable function. Background technique [0002] With the development of cloud computing, data outsourcing storage has gradually become popular. The rise of cloud storage platforms has provided many conveniences for both individuals and businesses, such as reducing data storage costs and data management overhead. However, user data can easily be leaked if stored without any encryption. Also, we always have to consider the untrustworthiness of cloud servers i.e. we don't want the server to be able to monitor our data. However, data encrypted by traditional encryption methods (such as 3-DES or AES) cannot meet the searchable requirements, which is a very important function in the use of databases. Searchable encryption is a special encryption scheme used to solve this problem. Symmetric Searchable Encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1097G06F21/60
CPCH04L63/0457H04L63/045H04L63/0281H04L67/1097G06F21/602
Inventor 高莹刘翔刘文心
Owner BEIHANG UNIV