CN107749865B - A kind of location privacy querying method based on homomorphic cryptography - Google Patents
A kind of location privacy querying method based on homomorphic cryptography Download PDFInfo
- Publication number
- CN107749865B CN107749865B CN201711282361.XA CN201711282361A CN107749865B CN 107749865 B CN107749865 B CN 107749865B CN 201711282361 A CN201711282361 A CN 201711282361A CN 107749865 B CN107749865 B CN 107749865B
- Authority
- CN
- China
- Prior art keywords
- data service
- ciphertext
- service provider
- piecemeal
- query object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of location privacy querying method based on homomorphic cryptography, including a Cloud Server, a data service provider, several mobile subscribers;Data service provider SP carries out piecemeal according to the region in the concentration to map of query object, then the query object in each piecemeal is encrypted with symmetric encipherment algorithm, and each symmetric key is encrypted with homomorphic encryption algorithm, finally by all ciphertext storages to Cloud Server, secret saves the private key of homomorphic cryptography;User, from the ciphertext and corresponding symmetric key ciphertext of Cloud Server download and inquiry object, then carries out symmetric key ciphertext to blind processing, and be transmitted to data service provider according to the position where oneself;Data service provider will blind plaintext transmission to user after decryption, and end user decrypts corresponding query object and obtains final query result.Whole process will not reveal the location information where user, and the protection of location privacy is realized with this.
Description
Technical field
The present invention relates to data encryptions and location privacy protection technical field, specifically a kind of to be suitable for mobile interchange
The querying method of location of mobile users privacy is protected in network.
Background technique
In the utilization of mobile Internet, location based service to people's lives and work bring it is huge just
Benefit, while the leakage of positional information of mobile subscriber may also be caused, to bring huge security risk.Therefore with LBS's
It is widely applied, the protection to mobile subscriber's privacy is essential.
Currently, common location privacy protection method has assumed name anonymity, position k anonymity, space anonymity etc..
(1) assumed name anonymity refers to through the position of an assumed name user actual position for hiding real user, the inquiry
Accuracy is determined that this will reduce the accuracy of inquiry, together by the distance of the position of assumed name user and the position of real user
When be also possible to cause the leakage of user information.
(2) k anonymity in position refers mainly to some band of position at least k user, and this k user can not pass through identity
It is distinguished, so also can not accurately be looked for from this k user even if attacker obtains the location information of some user
True user out.When k value is bigger, the information of user is less susceptible to be leaked, but will lead to communication overhead and become larger.
(3) space anonymity is mainly user when sending request, and the position for being sent to server becomes the point by some point
Some region at place.It is inaccurate due to location information, it will to reduce the accuracy of inquiry.
In conclusion there is also following disadvantages for existing location privacy protection:
1, the position that mobile subscriber is sent to data service quotient in existing location privacy protection is some region, so that logical
Letter expense becomes larger.
2, third party is introduced in existing location privacy protection and generates and manage key, may cause the part of mobile subscriber
Privacy leakage.
3, metadata provider needs to store a large amount of data in existing location privacy protection.
4, the exact value of oneself position can't be sent to data service quotient by mobile subscriber in existing location privacy, this
The accuracy of inquiry will be reduced.
Summary of the invention
The present invention is by Cloud Server, in conjunction with the thought of symmetric encipherment algorithm and homomorphic encryption algorithm, proposes that one kind is based on
The location privacy querying method of homomorphic cryptography, is asked to efficiently solve based on the location privacy protection in location-based service
Topic, while the storage cost and communication cost of data service provider SP is reduced, thus while guaranteeing user location privacy
Reduce overhead.
The present invention in order to solve the technical problem, adopts the following technical scheme that:
A kind of location privacy querying method based on homomorphic cryptography of the present invention is to be applied to several mobile subscribers, one
In the mobile internet environment that data service provider and a Cloud Server are constituted, the mobile internet environment is located at
In the same region, remember any one mobile subscriber be U, data service provider SP, Cloud Server CS;Its main feature is that
Location privacy querying method is to carry out in accordance with the following steps:
Step 1, the data service provider SP are generated and the public key pk and private key sk of public address system parameter;;
Step 2, the data service provider SP generate ciphertext corresponding to the query object in different piecemeals;
Step 2.1, the data service provider SP are carried out according to the region in the concentration to map of query object
Piecemeal, and each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is denoted as Di, and by i-th of piecemeal Di
Interior all query objects are denoted as Mi, i=1,2 ..., n;
Step 2.2, the data service provider SP generate i-th of subregion DiSymmetric key ki;
Step 2.3, the data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo the inquiry
Object MiAES encryption is carried out, ciphertext E (k is formedi,Mi) after send Cloud Server CS storage to, and the ciphertext E is disclosed
(ki,Mi);
Step 3, the data service provider SP utilize Paillier homomorphism according to the public key pk in the system parameter
Encryption Algorithm is to i-th of piecemeal DiSymmetric key kiImplement encryption, forms ciphertext Epk(ki) after send the Cloud Server CS to
Storage, and the ciphertext E is disclosedpk(ki);
Step 4, any one the described position of mobile subscriber U according to present position and each piecemeal on map
Confirm the piecemeal D where self-positionj, and place piecemeal D is obtained from the Cloud Server CSjInterior query object MjCiphertext E
(kj,Mj) and place piecemeal DjSymmetric key kjCiphertext Epk(kj);
A random number s is randomly generated in step 5, any one described mobile subscriber Uj, and it is same using the Paillier
State Encryption Algorithm is to the random number sjIt is encrypted, then by the random number sjEncrypted ciphertext Epk(sj) and it is described symmetrical
Key kjCiphertext Epk(kj) carry out homomorphism multiply processing, obtain blinding result cj=Epk(sj)·Epk(kj), to realize to described
Symmetric key kjBlind;The mobile subscriber U blinds result c for describedjIssue the data service provider SP;
Step 6, the data service provider SP blind result c to described using own private key skjIt is decrypted, obtains
Blind plaintext yj;Plaintext y is blinded by described againjSend the mobile subscriber U to;
Step 7, any mobile subscriber U are according to the random number sjAnd described blind plaintext yjBlind processing is carried out, is obtained
To symmetric key kj=yj-sj;And according to the symmetric key kj, using AES decipherment algorithm to the ciphertext E (kj,Mj) carry out
Decryption, subregion D where obtainingjInterior query object Mj, thus according to the query object MjIt obtains and self-position minimum distance
Query result.
Compared with the prior art, the beneficial effects of the present invention are embodied in:
1, the present invention encrypts the query object in each piecemeal with symmetric encipherment algorithm, to ensure that each piecemeal
The privacy of interior query object, and because symmetric cryptography compares public key cryptography faster, to improve enciphering rate;
2, present invention introduces Cloud Server, data service quotient stores encrypted ciphertext to Cloud Server, thus effectively
Ground reduces the storage cost of data service provider;
3, present invention introduces Cloud Server and homomorphic encryption algorithm, it is only necessary to implement homomorphic cryptography, one by user
Secondary homomorphism multiplies, and once subtracting operation can be obtained corresponding query result, on the one hand reduce the computing cost of user, another
Aspect is effectively protected the location privacy of user again;
4, the key in the present invention is generated is managed independently by data service provider completely with distribution, is not needed by other
Key Management Center or believable third party to reduce the cost of implementation of system also improve the safety of system.
Detailed description of the invention
Fig. 1 is system model figure of the invention;
Fig. 2 is zoning plan of the invention, each piecemeal D in figureiCorresponding query object is Mi;
Fig. 3 is that Cloud Server of the invention stores ciphertext graph.
Specific embodiment
Technical solution of the present invention is described in detail below, but protection scope of the present invention is not limited to the embodiment.
In the present embodiment, as shown in Figure 1, a kind of location privacy querying method based on homomorphic cryptography is to be applied to several
It is specific real in the mobile internet environment that mobile subscriber, a data service provider and a Cloud Server are constituted
Body Model 1. mobile subscriber U as shown in Figure 1:.Service request is proposed to data service quotient according to the location of oneself;2. data
Service provider SP.Data owner is responsible for receiving the service request of mobile subscriber U and making correspondingly responding, the mechanism half
It is credible.3. Cloud Server CS.Data service provider SP can be stored data on CS by way of paying, Cloud Server CS
The ciphertext of upper storage is full disclosure, and the mechanism half is credible.The location privacy querying method is to carry out in accordance with the following steps:
Step 1, data service provider SP are generated and the public key pk and private key sk of public address system parameter;;
1. data service provider SP will be divided into the group of equal length in plain text, every group of length is 128, and the key of selection is long
Degree is 128;
2. data service provider SP randomly selects two prime number ps and q, and meets gcd (pq, (p-1) (q-1))=1;
3. calculating N=pq and Edward Carmichael function lambda=λ (N)=lcm (p-1, q-1);
4. data service provider SP selects a random numberAnd meet u=(L (gλmodN2))-1ModN,
Wherein defined function L isPublic key pk=(N, g), private key sk=lcm (p-1, q-1);
5. disclosing the key length and block length of AES encryption algorithm, furthermore the public key of Paillier Encryption Algorithm is disclosed
{N,g}。
Step 2, data service provider SP generate ciphertext corresponding to the query object in different piecemeals;
Step 2.1, data service provider SP carry out piecemeal according to the region in the concentration to map of query object,
And each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is denoted as Di, and by i-th of piecemeal DiInterior institute
There is query object to be denoted as Mi, i=1,2 ..., n;
(2.1.1) as shown in Fig. 2, data service provider SP according to the region in the concentration to map of query object
Piecemeal is carried out, by the region division at the piecemeal to differ in size, query object is more concentrated, then the piecemeal is smaller, otherwise piecemeal is got over
Greatly, and by each piecemeal it is labeled as Di(i=1,2 ..., n), the query object in each piecemeal is not more than 10.
(2.1.2) data service provider SP is by each piecemeal DiCorresponding query object total abstract is labeled as Mi(i=1,
2,...,n)。
Step 2.2, data service provider SP generate i-th of subregion DiSymmetric key ki;
Step 2.3, data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo query object MiCarry out AES
Encryption forms ciphertext E (ki,Mi) after send Cloud Server CS storage, and open ciphertext E (k toi,Mi)。
(2.3.1) AES encryption process will be copied into a state array in plain text, carry out a wheel initial transformation.Then into
In nine capable wheel variations, each round is carried out according to the sequence of byte substitution, row displacement, column mixing and InvAddRoundKey, last
In one round transformation, byte substitution, row displacement, InvAddRoundKey are only carried out.
(2.3.2) is as shown in figure 3, Cloud Server CS stores ciphertext E (k for one piece of continuous region is distributedi,Mi), due to
Of different sizes, the institute ciphertext E (k for storage of each piecemeali,Mi) area size it is also variant.
Step 3, data service provider SP utilize Paillier homomorphic encryption algorithm according to the public key pk in system parameter
To i-th of piecemeal DiSymmetric key kiImplement encryption, forms ciphertext Epk(ki) after send Cloud Server CS storage to, and openly
Ciphertext Epk(ki);
Data service provider SP selects a random numberTo symmetric key kiIt is encrypted, it is specific to encrypt
Process is as follows:Data service provider SP is by ciphertext Epk(ki) store and arrive Cloud Server CS, this
So that data service provider SP does not have to save a large amount of symmetrical code key ki。
Step 4, any one location confirmation of mobile subscriber U according to present position and each piecemeal on map
Piecemeal D where self-positionj, and place piecemeal D is obtained from Cloud Server CSjInterior query object MjCiphertext E (kj,Mj) with
Place piecemeal DjSymmetric key kjCiphertext Epk(kj);
A random number s is randomly generated in step 5, any one mobile subscriber Uj, and calculated using Paillier homomorphic cryptography
Method is to random number sjIt is encrypted, then by random number sjEncrypted ciphertext Epk(sj) and symmetric key kjCiphertext Epk(kj) into
Row homomorphism multiplies processing, obtains blinding result cj=Epk(sj)·Epk(kj), to realize to symmetric key kjBlind;It is mobile to use
Family U will blind result cjIssue data service provider SP;
A random number is randomly generated in any mobile subscriber UAny mobile subscriber U is in system parameter
Public key pk encrypted random number sj, specific ciphering process is as follows:Again by encrypted random number
sjWith symmetric key kjIt carries out homomorphism and multiplies processing, homomorphism multiplies processing, and specific step is as follows:
Step 6, data service provider SP are using own private key sk to blinding result cjIt is decrypted, obtains blinding in plain text
yj;Plaintext y will be blinded againjSend mobile subscriber U to;
Data service provider SP is with the private key sk of itself to cjIt is decrypted, specifically decrypting process is as follows:The result after decryption is sent to any mobile subscriber U again.
Step 7, any mobile subscriber U are according to random number sjAnd blind plaintext yjBlind processing is carried out, symmetric key k is obtainedj
=yj-sj;And according to symmetric key kj, using AES decipherment algorithm to ciphertext E (kj,Mj) be decrypted, subregion D where obtainingjIt is interior
Query object Mj, thus according to query object MjObtain the query result with self-position minimum distance.
Ciphertext is copied into a state array, carries out initial transformation by AES decrypting process.Then the nine wheel variations carried out
In, the sequence that each round is replaced according to the displacement of reverse row, reverse byte, InvAddRoundKey and reverse column are mixed carries out, last
In one round transformation, reverse row displacement, the replacement of reverse byte and InvAddRoundKey are only carried out.
The present invention is stored in each piecemeal of Cloud Server with AES symmetric encipherment algorithm encrypted data service provider SP
Query object, to ensure that the safety of the query object of each piecemeal.Any mobile subscriber U is sent to data service provider
Blinding for SP contains k in ciphertextjAnd sjThe two unknown numbers obtain although data service provider SP can decrypt the ciphertext
Only blind in plain text, the specific location of any mobile subscriber U can not be obtained.
Claims (1)
1. a kind of location privacy querying method based on homomorphic cryptography is to be applied to several mobile subscribers, a data service
In the mobile internet environment that provider and a Cloud Server are constituted, the mobile internet environment is located at the same area
In domain, remember any one mobile subscriber be U, data service provider SP, Cloud Server CS;It is characterized in that location privacy
Querying method is to carry out in accordance with the following steps:
Step 1, the data service provider SP are generated and the public key pk and private key sk of public address system parameter;
Step 2, the data service provider SP generate ciphertext corresponding to the query object in different piecemeals;
Step 2.1, the data service provider SP carry out piecemeal according to the region in the concentration to map of query object,
And each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is denoted as Di, and by i-th of piecemeal DiInterior institute
There is query object to be denoted as Mi, i=1,2 ..., n;
Step 2.2, the data service provider SP generate i-th of subregion DiSymmetric key ki;
Step 2.3, the data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo the query object
MiAES encryption is carried out, ciphertext E (k is formedi,Mi) after send Cloud Server CS storage to, and the ciphertext E (k is disclosedi,
Mi);
Step 3, the data service provider SP utilize Paillier homomorphic cryptography according to the public key pk in the system parameter
Algorithm is to i-th of piecemeal DiSymmetric key kiImplement encryption, forms ciphertext Epk(ki) after send the Cloud Server CS to and deposit
Storage, and the ciphertext E is disclosedpk(ki);
Step 4, any one the described location confirmation of mobile subscriber U according to present position and each piecemeal on map
Piecemeal D where self-positionj, and place piecemeal D is obtained from the Cloud Server CSjInterior query object MjCiphertext E (kj,
Mj) and place piecemeal DjSymmetric key kjCiphertext Epk(kj);
A random number s is randomly generated in step 5, any one described mobile subscriber Uj, and utilize the Paillier homomorphic cryptography
Algorithm is to the random number sjIt is encrypted, then by the random number sjEncrypted ciphertext Epk(sj) and the symmetric key kj
Ciphertext Epk(kj) carry out homomorphism multiply processing, obtain blinding result cj=Epk(sj)·Epk(kj), to realize to described symmetrical
Key kjBlind;The mobile subscriber U blinds result c for describedjIssue the data service provider SP;
Step 6, the data service provider SP blind result c to described using own private key skjIt is decrypted, is blinded
Plaintext yj;Plaintext y is blinded by described againjSend the mobile subscriber U to;
Step 7, any mobile subscriber U are according to the random number sjAnd described blind plaintext yjBlind processing is carried out, is obtained pair
Claim key kj=yj-sj;And according to the symmetric key kj, using AES decipherment algorithm to the ciphertext E (kj,Mj) be decrypted,
Subregion D where obtainingjInterior query object Mj, thus according to the query object MjAcquisition is looked into self-position minimum distance
Ask result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711282361.XA CN107749865B (en) | 2017-12-07 | 2017-12-07 | A kind of location privacy querying method based on homomorphic cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711282361.XA CN107749865B (en) | 2017-12-07 | 2017-12-07 | A kind of location privacy querying method based on homomorphic cryptography |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107749865A CN107749865A (en) | 2018-03-02 |
CN107749865B true CN107749865B (en) | 2019-11-15 |
Family
ID=61250376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711282361.XA Active CN107749865B (en) | 2017-12-07 | 2017-12-07 | A kind of location privacy querying method based on homomorphic cryptography |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107749865B (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019204711A1 (en) * | 2018-04-19 | 2019-10-24 | Google Llc | Security measures for determination of private set intersections |
CN108650675A (en) * | 2018-04-23 | 2018-10-12 | 许昌学院 | A kind of location privacy protection system of the Homomorphic Encryption Scheme based on big data |
CN108769056B (en) * | 2018-06-15 | 2021-03-23 | 中国人民解放军战略支援部队信息工程大学 | Single sign-on method, device and system |
CN109151715B (en) * | 2018-09-05 | 2020-07-14 | 重庆理工大学 | Position proximity detection privacy protection method based on polygon range |
CN109284627B (en) * | 2018-09-10 | 2022-02-08 | 中山大学 | Credit credit method and device based on block chain intelligent contract |
CN109299149B (en) * | 2018-10-09 | 2020-07-14 | 北京腾云天下科技有限公司 | Data query method, computing device and system |
CN109985386B (en) * | 2019-03-08 | 2022-08-16 | 郑州阿帕斯科技有限公司 | Method and device for generating map |
CN110162999B (en) * | 2019-05-08 | 2022-06-07 | 湖北工业大学 | Income distribution difference kini coefficient measurement method based on privacy protection |
CN110895611B (en) * | 2019-11-26 | 2021-04-02 | 支付宝(杭州)信息技术有限公司 | Data query method, device, equipment and system based on privacy information protection |
CN111083631B (en) * | 2019-12-02 | 2020-11-03 | 兰州交通大学 | Efficient query processing method for protecting location privacy and query privacy |
CN111563267B (en) * | 2020-05-08 | 2024-04-05 | 京东科技控股股份有限公司 | Method and apparatus for federal feature engineering data processing |
CN111683071B (en) | 2020-05-29 | 2023-02-28 | 百度在线网络技术(北京)有限公司 | Private data processing method, device, equipment and storage medium of block chain |
CN111814076B (en) * | 2020-06-12 | 2023-04-07 | 西安热工研究院有限公司 | Power station position mark query method, system, equipment and readable storage medium |
CN113141246B (en) * | 2021-03-08 | 2022-11-18 | 江苏大学 | System design and implementation method for homomorphic encryption in student mental health investigation |
CN113505390A (en) * | 2021-07-12 | 2021-10-15 | 东莞理工学院 | Cross-service provider epidemic situation data comparison method based on homomorphic encryption |
CN116708040B (en) * | 2023-08-07 | 2023-10-24 | 成都墨甲信息科技有限公司 | Data security management and control method and system based on symmetric homomorphic encryption |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105848139A (en) * | 2016-03-17 | 2016-08-10 | 安徽大学 | Location-based privacy protection inquiring and processing method facing mobile cloud platform |
CN106792501A (en) * | 2016-11-17 | 2017-05-31 | 广东工业大学 | A kind of LBS customer locations and privacy of identities guard method |
CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | A kind of location privacy protection method based on Cloud Server |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8693689B2 (en) * | 2010-11-01 | 2014-04-08 | Microsoft Corporation | Location brokering for providing security, privacy and services |
US9043927B2 (en) * | 2012-09-27 | 2015-05-26 | Neo Mechanic Limited | Method and apparatus for authenticating location-based services without compromising location privacy |
-
2017
- 2017-12-07 CN CN201711282361.XA patent/CN107749865B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105848139A (en) * | 2016-03-17 | 2016-08-10 | 安徽大学 | Location-based privacy protection inquiring and processing method facing mobile cloud platform |
CN106792501A (en) * | 2016-11-17 | 2017-05-31 | 广东工业大学 | A kind of LBS customer locations and privacy of identities guard method |
CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | A kind of location privacy protection method based on Cloud Server |
Non-Patent Citations (2)
Title |
---|
面向云环境的高效匿名认证系统的设计与实现;王家礼 等;《电脑知识与技术》;20170605;第13卷(第16期);第41-43页 * |
面向位置服务的用户隐私保护;裴媛媛 等;《计算机工程》;20150107;第41卷(第10期);第20-25页 * |
Also Published As
Publication number | Publication date |
---|---|
CN107749865A (en) | 2018-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107749865B (en) | A kind of location privacy querying method based on homomorphic cryptography | |
JP7119040B2 (en) | Data transmission method, device and system | |
CN107347096B (en) | A kind of location privacy protection method based on Cloud Server | |
US9008312B2 (en) | System and method of creating and sending broadcast and multicast data | |
WO2010064666A1 (en) | Key distribution system | |
CN105610793A (en) | Outsourced data encrypted storage and cryptograph query system and application method therefor | |
CN108090370B (en) | Instant communication encryption method and system based on index | |
CN107154845B (en) | BGN type ciphertext decryption outsourcing scheme based on attributes | |
CN104821944A (en) | Hybrid encrypted network data security method and system | |
CN102624522A (en) | Key encryption method based on file attribution | |
CN104917759A (en) | Third-party-based safety file storage and sharing system and method | |
CN105743646A (en) | Encryption method and system based on identity | |
CN111277412B (en) | Data security sharing system and method based on block chain key distribution | |
US20230188325A1 (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
US20200374117A1 (en) | Method for creating or verifying input value by using asymmetric encryption algorithm and application method thereof | |
CN106878322B (en) | A kind of encryption and decryption method of fixed length ciphertext and key based on attribute | |
CN103036684A (en) | Identity-based encryption (IBE) data encryption system and method capable of lowering damages of master key crack and disclosure | |
Chatterjee et al. | Cryptography in cloud computing: a basic approach to ensure security in cloud | |
US11528127B2 (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
CN101710879A (en) | Novel identity-based privacy enhanced mail forwarding system | |
CN105721146B (en) | A kind of big data sharing method towards cloud storage based on SMC | |
Mishra et al. | A compendium over cloud computing cryptographic algorithms and security issues | |
CN110519226B (en) | Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate | |
CN104796411A (en) | Method for safely transmitting, storing and utilizing data in cloud and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200907 Address after: 230088 14th floor, building 1, Tianyuan dike science and Technology Park, 66 Yunfei Road, high tech Zone, Hefei City, Anhui Province Patentee after: Anhui Dike Digital Gold Technology Co.,Ltd. Address before: 230601 No. 111 Jiulong Road, Hefei, Anhui Patentee before: ANHUI University |