Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy-intersection-oriented data interaction method

A data interaction and privacy technology, applied in the field of data interaction, can solve the problems of complex encryption and decryption, low security, etc., and achieve the effect of avoiding security risks, high security, and narrowing the scope of comparison

Pending Publication Date: 2021-12-07
高语澈 +1
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a data interaction method oriented to privacy interrogation, so as to solve the technical problems of complex encryption and decryption and low security in the process of privacy interrogation existing in the above-mentioned prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-intersection-oriented data interaction method
  • Privacy-intersection-oriented data interaction method
  • Privacy-intersection-oriented data interaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] like figure 1As shown, the present embodiment includes a privacy-oriented data interaction method, including the following steps: obtaining a random number transmitted by the sending end, forming a first hash data set according to the random number; Calculate the remainder to obtain a first vector set; generate a first key set according to the first vector set; generate a random number set, transmit the random number set to the sender, encrypt the random number set to generate a first ciphertext and store it locally; Obtain the second ciphertext transmitted by the sender, and judge whether the first ciphertext and the second ciphertext are the same, and if not, repeat the remainder calculation of the first hash data set and subsequent steps.

[0059] Obtaining a random number transmitted by the sender, and forming a first hash data set according to the random number, specifically includes the following steps: obtaining a random number transmitted by the sender, using th...

Embodiment 2

[0095] A computer-readable storage medium. Computer instructions are stored on the computer-readable storage medium. When the computer instructions are executed by a processor, the steps of the method in Embodiment 1 are implemented.

[0096] Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, apparatuses, or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy-intersection-oriented data interaction method, which comprises the following steps of: acquiring a random number transmitted by a transmitting end, forming a first hash data set according to the random number, performing complementation calculation on the first hash data set to obtain a first vector set, generating a first key set according to the first vector set, generating a random number set, transmitting the random number set to a transmitting end, encrypting the random number set to generate a first ciphertext and storing the first ciphertext locally, acquiring a second ciphertext transmitted by the transmitting end, judging whether the first ciphertext is the same as the second ciphertext or not, and if not, repeating the remainder calculation on the first hash data set and the following steps. The method has the beneficial effects that the safety risk caused by directly transmitting the hash value between the two parties is avoided, the safety is high, rapid iteration can be carried out through a lightweight algorithm, the training efficiency can be directly improved, the computing power resource is saved, and the system performance is improved.

Description

technical field [0001] The invention belongs to the technical field of data interaction, and more specifically, the invention relates to a privacy-oriented data interaction method. Background technique [0002] Privacy set intersection (hereinafter referred to as privacy intersection) is an important step in federated learning. Privacy intersection refers to the technical solution for obtaining the intersection of both parties through privacy technology when the two parties do not know each other's complete set. At present, privacy is usually based on asymmetric keys such as RSA in the market. The above technical solutions have the following defects: [0003] First, there are a large number of RSA encryption and decryption operations in the process of interaction between the two parties. Due to the high complexity of RSA encryption calculations, if both parties have a large amount of data that needs to be intersected, then the complex encryption / decryption process of RSA wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F7/58G06F7/72
CPCG06F21/6245G06F21/602G06F7/588G06F7/72
Inventor 高语澈高丰
Owner 高语澈
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products