Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for determining number of common data for protecting private data

A privacy data and privacy protection technology, applied in the computer field, can solve problems such as leakage, achieve the effect of improving security and avoiding the leakage of additional information

Pending Publication Date: 2022-03-25
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, in the process of determining the above-mentioned number of shared data, some information about the private data of the party will be leaked, so that the other party can guess the possible value of the private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for determining number of common data for protecting private data
  • Method, device and system for determining number of common data for protecting private data
  • Method, device and system for determining number of common data for protecting private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0063] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. This implementation scenario involves the determination of the number of shared data that protects privacy data, and is used to determine the number of shared data between the first private data set owned by the first party and the second private data set owned by the second party. like figure 1 As shown, the scenario where both parties determine the amount of shared data involves participant A and participant B, or referred to as the first party and the second party, or referred to as party A and party B. Each participant can be implemented as any device, platform, server or device cluster with computing and processing capabilities. The two parties shall jointly determine the amount of shared data under the condition of protecting...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a shared data number determination method, device and system for protecting private data, and the method is realized by adopting secure multi-party computing, and comprises the following steps: a first party maps a private data set of the first party to a Bloom filter to obtain an m-bit first array; performing homomorphic encryption on each element in the first array, and sending a first ciphertext array obtained by encryption to a second party; the second party determines k target positions of any private data of the second party in the Bloom filter, and extracts encryption elements of the k target positions in the first ciphertext array to obtain k encryption values; performing homomorphic function operation on the k encryption values to obtain a corresponding result ciphertext; the homomorphic function operation is used for converging element values of k target positions and carrying out random number masking on a convergence result; sending each result ciphertext to the first party; and the first party decrypts each result ciphertext and determines the number of data shared by the two parties. And the safety can be improved.

Description

technical field [0001] One or more embodiments of this specification relate to the computer field, and in particular, to a method, device and system for determining the number of shared data for protecting private data. Background technique [0002] In many current scenarios, the determination of the amount of data shared by the two parties is involved, and the data of each party is private data and cannot be shared. For example, two parties each hold a set, and need to find the size of the intersection without exposing their respective sets. The above-mentioned number of shared data can be used to judge the matching degree of the data of the two parties, the number of common customers and other scenarios, and provide evaluation for the continued cooperation between the two parties. It can also be used for association analysis, such as the joint analysis of social security agencies and the Ministry of Education on the association between low-income families and school dropo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 李漓春尹栋
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD