Hidden trace data verification method and system based on homomorphic encryption

A homomorphic encryption and data technology, applied in the fields of privacy protection and data security technology, can solve the problems of large number of communication rounds, high communication overhead, and harsh network environment requirements, so as to improve query efficiency, reduce communication overhead, and protect data privacy. Effect

Active Publication Date: 2022-07-15
深圳市洞见智慧科技有限公司
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The disadvantage of this method: without any privacy protection measures, the three-element information of the inquiring party will be exposed to the inquired party
[0009] Disadvantages of this method: the number of communication rounds is large, the communication overhead is large, and the requirements for the network environment are harsh. For the case of massive data, it is difficult to meet the requirements for query performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden trace data verification method and system based on homomorphic encryption
  • Hidden trace data verification method and system based on homomorphic encryption
  • Hidden trace data verification method and system based on homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art based on the present application fall within the protection scope of the present application.

[0047] In order to solve the technical problem that it is difficult to process massive data due to the lack of privacy protection measures or the large number of communication rounds and communication overhead in the existing data verification method, the embodiment of the present application provides an anonymous data verification method based on homomorphic encryption and system.

[0048] see figure 1 , figure 1 A schematic flowcha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a hidden tracing data verification method and system based on homomorphic encryption, and relates to the technical field of data security and privacy protection. A homomorphic encryption technology is introduced, to-be-verified data is encoded into a computable integer value after being subjected to characteristic value operation, encryption calculation is carried out through the homomorphic encryption technology, a query function in a ciphertext state is constructed to calculate a data verification result, the data privacy of a query party is not exposed in the whole query process, and meanwhile, the data verification result is more accurate. And the query party can only obtain the final verification result of the to-be-verified data and cannot obtain other additional information of the queried party, so that the data privacy of the two parties is protected. In addition, communication overhead is greatly reduced, and good query performance can also be ensured in a scene of mass data.

Description

technical field [0001] The present application relates to the fields of data security technology and privacy protection technology, and in particular, to a method and system for verifying anonymity data based on homomorphic encryption. Background technique [0002] Three-factor verification refers to verifying the authenticity of user identity information by comparing names, ID numbers, and mobile phone numbers. It is mainly used by the network platform to verify the identity of users who have entered or used product permissions. , name, mobile phone number) query information, initiate query verification to the operator, compare it with the operator's database, and return the verification result, so as to determine whether the three elements to be checked are consistent with the data stored by the operator, and then help the query party to conduct business. Decision-making at the level to avoid fraud at the source. [0003] The existing three-factor verification methods inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/64
CPCG06F21/6254G06F21/602G06F21/64
Inventor 冯新宇王湾湾何浩姚明
Owner 深圳市洞见智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products