Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private data hiding and sharing method

A technology of private data and data, applied in the field of private data hiding and sharing, it can solve the problems of leaking and intersecting feature data, and achieve the effect of protecting the privacy and security of private data

Active Publication Date: 2022-06-24
蓝象智联(杭州)科技有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, if the two parties want to perform some statistical calculations on the data of the intersection users or perform joint modeling with the data of the intersection users, they first need to conduct a private set intersection of the ID data of the two parties, without leaking the ID data information other than the intersection. In this case, the intersection results of both parties are obtained, and then the plaintext feature data corresponding to the ID data of the intersection is shared, but this will leak the ID data of the intersection and the feature data corresponding to the ID data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private data hiding and sharing method
  • Private data hiding and sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0058] Embodiment: a private data privacy sharing method of this embodiment, such as figure 1 shown, including the following steps:

[0059] S1: The initiator client reads the ID data set A in the initiator database to be intersected, and the initiator client uses the cuckoo hash algorithm to assign each ID data in the ID data set A to the corresponding ID data in the cuckoo hash The storage location in the hash bucket is stored. Cuckoo Hash has K hash buckets, each hash bucket has only one storage location, and the storage location that is not assigned to the ID data is stored in the random number a;

[0060] The participant client reads the ID data set B to be intersected in the participant database, and the participant client uses a simple hash algorithm to assign each ID data in the ID data set B to the corresponding hash bucket of the simple hash The corresponding storage location is stored, the simple hash has K hash buckets, each hash bucket has d storage locations, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private data hiding and sharing method. The method comprises the following steps: an initiator distributes each data in an ID data set A to a storage position in a corresponding Hash bucket for storage by adopting a cuckoo Hash algorithm, and a participant distributes each data in an ID data set B to a storage position in a corresponding Hash bucket for storage by adopting a simple Hash algorithm; the initiator and the participant cooperatively use a secret sharing algorithm to compare data stored in each hash bucket of the cuckoo hash with all data stored in the hash bucket with the same serial number of the simple hash, and the initiator and the participant obtain comparison results respectively; the initiator calculates a shared value fragment G1 corresponding to each hash bucket, and the participant calculates a shared value fragment G2 corresponding to each hash bucket; according to the invention, the participant can share one part of the feature data corresponding to the intersection ID data of the initiator to the initiator, and the ID data of both parties are not leaked, so that the privacy and security of private data of both parties are protected.

Description

technical field [0001] The invention relates to the technical field of data sharing, in particular to a private data hiding sharing method. Background technique [0002] The Personal Information Protection Law clearly proposes to de-identify and anonymize enterprise data interaction. De-identification refers to the process in which personal information is processed so that it cannot identify a specific natural person without additional information. Refers to the process of processing personal information that cannot identify a specific natural person and cannot be recovered. [0003] At present, if the two parties want to perform some statistical calculations on the data of the intersection users or use the data of the intersection users for joint modeling, they first need to perform a privacy set intersection on the ID data of the two parties, without leaking the ID data information outside the intersection. In this case, the intersection results of both parties are obtain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/176G06F16/172G06F21/62
CPCG06F16/176G06F16/172G06F21/6227G06F21/6245G06F2221/2107
Inventor 邢冰马煜翔刘洋刘文博
Owner 蓝象智联(杭州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products