Efficient searchable proxy privacy set intersection method and device

A collection and privacy technology, applied in the field of network security, can solve the problems of huge computing power and high communication complexity, and achieve the effect of ensuring security

Pending Publication Date: 2022-05-13
BEIHANG UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides an efficient and searchable proxy privacy set intersection method and device to solve the problem that the proxy privacy set intersection method i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient searchable proxy privacy set intersection method and device
  • Efficient searchable proxy privacy set intersection method and device
  • Efficient searchable proxy privacy set intersection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0032] In the related technology, the user first needs to submit a search request to the cloud server, and the cloud server returns the result to the user after searching, and then the user decrypts the result, and then calculates the proxy PSI. This method has high communication complexity, and each calculation requires the user to decrypt and process the data of the proxy PSI, which consumes huge computing power. If the data can be processed well at the beginning, so that the encrypted data can not only be used for ciphert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient searchable agent privacy set intersection method and device, and the method comprises the steps: grouping user data sets according to keywords, generating an index for each sub-set after grouping based on a pseudo-random function, encrypting the sub-set corresponding to each keyword, and generating an encrypted sub-set; the encrypted subset and the index are replaced and then uploaded to a cloud server; sending the to-be-searched keyword of the user initiating intersection calculation and the pseudo-random permutation key to other users, so that the other users find index values of the same keyword subsets of the two users through calculation, and generating an index-to-index mapping to be sent to a cloud server, and finding subsets corresponding to the keywords to be searched in the data of different users according to the mapping, carrying out intersection on the subsets corresponding to the keywords to be searched, and returning an intersection result to the user initiating intersection calculation. According to the embodiment of the invention, a searchable function is added in agent privacy set intersection, and meanwhile, the security and the efficiency are ensured.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an efficient searchable proxy privacy set intersection method and device. Background technique [0002] Private Set Intersection (PSI) is a specific problem in the field of secure multi-party computation. For the two-party PSI protocol, it can find the intersection elements of two participant sets without leaking any information except the intersection. A typical application scenario of PSI is to calculate the effect of advertising: merchants and advertising platforms calculate the intersection of users who purchased related products and users who saw advertisements and users who did not see advertisements, so as to know the impact of advertisements on user decisions, and at the same time Do not disclose user information. With the development of cloud services, in order to reduce the computing overhead of users and bring better experience to users, the concep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L9/08H04L67/10
CPCG06F21/6245G06F21/6227H04L9/0861H04L67/10
Inventor 高莹刘翔
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products