Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy-safe data set intersection method, device, device and storage medium

A data collection, privacy and security technology, applied in the field of privacy and security computing, can solve the problem of low efficiency of data collection intersection, achieve the effect of reducing the amount of data and improving the efficiency of intersection

Active Publication Date: 2021-12-14
上海钐昆网络科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present application provide a privacy-safe data set intersection method, device, device, and storage medium, which can solve the problem of low efficiency of data set intersection in existing privacy-safe data set intersection methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-safe data set intersection method, device, device and storage medium
  • Privacy-safe data set intersection method, device, device and storage medium
  • Privacy-safe data set intersection method, device, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The characteristics and exemplary embodiments of various aspects of the application will be described in detail below. In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only configured to explain the application, not to limit the application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present application by showing examples of the present application.

[0054] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a privacy-safe data set intersection method, device, device, and storage medium. The method includes: finding the intersection of the first hash data table and the second hash data table to obtain the intersection hash data table; determine the third original data; encrypt the third original data with the private key to obtain the first ciphertext data; send the public key to the second terminal; receive the second ciphertext data; encrypt the second ciphertext data with the private key, Obtain the third ciphertext data; send the third ciphertext data and the first ciphertext data to the second terminal; use it for the second terminal to intersect the first ciphertext data and the third ciphertext data, and obtain the ciphertext intersecting result , use the preset mapping table between ciphertext and original data to convert the ciphertext intersection result into original data, and obtain the data intersection of the second original data and the first original data; the embodiment of this application can solve the problem of existing privacy and security data The data set intersection efficiency of the set intersection method is low.

Description

technical field [0001] The present application belongs to the technical field of privacy and security computing, and in particular relates to a privacy and security data set intersection method, device, equipment and storage medium. Background technique [0002] With the development of computer and Internet technology, user information is widely collected and used, and privacy security issues are challenged. In order to deal with privacy leakage issues, privacy security computing technology has recently attracted attention. Private Set Intersection (PSI) is the pre-step of all privacy-safe computing modeling. The private set intersection protocol allows two parties holding their own sets to jointly calculate the intersection operation of the two sets. At the end of the protocol interaction, one or both parties should get the correct intersection, and will not get any information in the other party's set outside the intersection. [0003] In the scenario where there is a lar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245G06F21/6227
Inventor 雍若兰
Owner 上海钐昆网络科技有限公司