A post-quantum secure outsourcing privacy data release method and system

A technology for outsourcing privacy and data release, applied in the fields of data encryption and data privacy protection, it can solve the problem that attackers cannot obtain personal information, and achieve the effect of efficient and flexible data release, privacy protection, and reduction of communication and computing overhead.

Active Publication Date: 2021-10-29
苏州区盟链数字科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the risk of privacy leakage caused by adding a record to the data set is controlled within a very small and acceptable range, and attackers cannot obtain accurate individual information by observing the calculation results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A post-quantum secure outsourcing privacy data release method and system
  • A post-quantum secure outsourcing privacy data release method and system
  • A post-quantum secure outsourcing privacy data release method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention will be further illustrated below in conjunction with the accompanying drawings and specific embodiments. This embodiment is implemented on the premise of the technical solution of the present invention. It should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0068] Such as figure 1 and 2 As shown, the embodiment of the present invention provides a post-quantum secure outsourcing privacy data publishing method, including the following steps:

[0069] Step A, key generation ( KeyGen ): Generate public key PK and private key SK, public key PK includes data owner public key PK O and data consumer public key PK U , the private key SK includes the private key SK of the data owner O and data user private key SK U .

[0070] Specifically, step A includes:

[0071] Step A1, select the ring ,in, Represents the residual class ring with mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a post-quantum secure outsourcing privacy data publishing method and system. The method includes the following steps: generating a public key PK and a private key SK; using the data owner's private key SK O and data consumer public key PK U Generate re-encryption key RK; use data owner public key PK O Encrypt plaintext m to generate original ciphertext CT; add privacy noise N to ciphertext CT to generate noise-encrypted ciphertext NCT; use re-encryption key RK to perform proxy re-encryption on noise-encrypted ciphertext NCT to generate re-encryption encryption Text CT´; ​​using the data consumer private key SK U Decrypt the re-encrypted ciphertext CT´ to obtain the noisy plaintext m´. The invention combines post-quantum secure proxy re-encryption algorithm, privacy noise addition mechanism and outsourcing computing technology, can achieve the security of choosing plaintext attack, directly add noise to ciphertext without decryption, protect the privacy of data, and Reduce communication and computing overhead for users.

Description

technical field [0001] The invention relates to the technical fields of data encryption and data privacy protection, and in particular to a post-quantum secure outsourcing privacy data publishing method and system. Background technique [0002] Massive data usually contains certain potential information and patterns, and data analysis and mining are conducive to its full utilization. For example, analyzing patients' diagnosis and treatment information can better monitor patients' health status, analyzing census information released by relevant departments can provide decision support for social and economic development, and analyzing smart grid reports can facilitate calculation of future electricity demand and regulation electricity price. Despite the importance of using such data, publishing the data directly in clear text raises serious privacy concerns. Take electricity consumption data as an example, which contains a large amount of customer sensitive information. By ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G16H10/60
CPCG06F21/602G06F21/6245G16H10/60
Inventor 曹鹤阳李发强周安澄
Owner 苏州区盟链数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products