CN102611678B - Method for providing social network service by using privacy homomorphic encryption technology - Google Patents

Method for providing social network service by using privacy homomorphic encryption technology Download PDF

Info

Publication number
CN102611678B
CN102611678B CN201110045029.8A CN201110045029A CN102611678B CN 102611678 B CN102611678 B CN 102611678B CN 201110045029 A CN201110045029 A CN 201110045029A CN 102611678 B CN102611678 B CN 102611678B
Authority
CN
China
Prior art keywords
user
activity
ciphertext
server
private data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110045029.8A
Other languages
Chinese (zh)
Other versions
CN102611678A (en
Inventor
廖浩霆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Inc
Original Assignee
Acer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acer Inc filed Critical Acer Inc
Publication of CN102611678A publication Critical patent/CN102611678A/en
Application granted granted Critical
Publication of CN102611678B publication Critical patent/CN102611678B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption

Abstract

The invention discloses a method for providing social network service. The method comprises the steps of firstly carrying out specific encryption on original data by using a public key, then carrying out specific operation on encrypted data to obtain a corresponding ciphertext, and then transmitting the ciphertext to a user of the intelligent mobile phone, wherein the specific encryption and the specific operation accord with the characteristic of privacy homomorphic encryption. Only the legally authorized intelligent mobile phone user can perform privacy homomorphic decryption operation on the ciphertext according to the private key of the intelligent mobile phone user, and then the original data is obtained. Therefore, the invention can provide safe and reliable social network service between intelligent mobile devices.

Description

Utilize privacy homomorphic cryptography technology to provide the method for social networking service
Technical field
The present invention is relevant to a kind of method providing social networking service, and espespecially a kind of privacy homomorphic cryptography technology that utilizes is to provide the method for social networking service.
Background technology
Along with the development of science and technology, wireless network and Full Featured intelligent running gear also more and more universal.Intelligent running gear general reference is installed with the device of open operating system, comprises intelligent mobile phone, mobile computer, personal digital assistant (personal digitalassistance, PDS) etc.Intelligent running gear possesses the ability of wireless transmission mostly, allows user wireless network can not utilized whenever and wherever possible to access a large amount of data, information, audio and video information and knowledge by the restriction of Network transmission line.The operating system that intelligent running gear is conventional comprises Symbian, Windows Mobile, iOS, Linux (containing Android, Maemo and WebOS), Palm OS, BlackBerry OS and iPhone OS etc.Although the application software that all kinds of intelligent running gear is installed may be incompatible, provide by installation third party software and enrich function.
By wireless network and intelligent running gear, social networking service (social networkservice, SNS) also replaces traditional aspectant interpersonal interaction's relation gradually.At present the social networking service of hot topic comprises " puff wave " (plurk.com), " pushing away spy " (twitter.com) and face book (facebook.com) etc.The user of intelligent running gear can be reached the standard grade and interconnected by the invitation mechanism of the social networking service relatives and friends that introduce oneself at any time, or it is different movable to invite other user to participate in by the activity mechanism of inviting.
When event promoters wants to invite other user neighbouring to participate in a certain activity by its intelligent running gear, may not want to mention individual privacy information in the activity sent at first is invited, but just provide individual privacy information when other user determines participation activity.Also on the one hand, the radio communication between intelligent running gear may be carried out on unsafe network.Therefore, outflow easily in order to avoid individual money or astonishedly to be got by people's malice, needing between intelligent running gear to use the wireless network that safe and reliable social networking service can be provided.
Summary of the invention
The invention provides a kind of privacy homomorphic cryptography that utilizes to provide the method for social networking service, it comprises first user and utilizes the first running gear to send activity to invite to server, and wherein this activity is invited to comprise and is relevant to movable every terms of information; Receiving after this activity invites, this server by utilizing public-key cryptography carries out particular encryption to the every terms of information being relevant to this activity, then the first certain operations is carried out to obtain the first corresponding ciphertext to these the every data after encryption, then this first ciphertext is sent by base station; After receiving this first ciphertext, the second user utilizes the second running gear to send encrypting and authenticating and returns back to this server to show that accepting this activity invites; And after receiving the reply of this encrypting and authenticating, the private data of this second user of this server by utilizing the disclosure double secret key carries out this particular encryption, then this second certain operations is carried out to obtain the second corresponding ciphertext to the encryption private data of this second user, again this second ciphertext is sent to this first running gear by this base station, wherein this particular encryption, this first certain operations and this second certain operations are the characteristics meeting this privacy homomorphism.
Accompanying drawing explanation
Fig. 1 is for the privacy homomorphic cryptography technology that utilizes a kind of in the present invention is to the schematic diagram of the wireless network He its function mode that provide social networking service.
Wherein, description of reference numerals is as follows:
10 base stations
20 servers
100 wireless networks
The intelligent running gear of PHONE1-PHONEn
Embodiment
In general, can judge whether wireless network can provide safe and reliable social networking service by two conditions: data authentication (data authenticity) and modulator-demodulator close (dataconfidentiality).Data authentication can confirm that whether user is through legal authorization, and guarantees that message can not be altered arbitrarily by unwarranted assailant in transmission way.Modulator-demodulator is close only has legal user can obtain except service except ensureing, also can protect the individual privacy of user on unsafe Internet Transmission.The invention provides a kind of end-to-end encrypted/authenticated (end-to-end confidentiality/authentication), data has just utilized public-key cryptography (public key) encryption shared with base station in the group that event occurs, again computing is carried out to obtain corresponding ciphertext to enciphered data, and ciphertext needs be decrypted according to the private key of legal authorization just can solve raw information.Get even if ciphertext victim is astonished in transport process, or send the third party without legal authorization to, leakage be only the operation result of enciphered data, illegal use person also cannot obtain raw information.
Fig. 1 is that in the present invention, one utilizes privacy homomorphic cryptography (privacy homomorphismcryptography) technology between intelligent running gear, provide the wireless network 100 of social networking service and the schematic diagram of its function mode.Wireless network 100 comprises base station (basestation) 10, server 20, and intelligent running gear PHONE 1-PHONEn.Intelligent running gear PHONE 1-PHONEn and server 20 are positioned at the communication range of base station 10, server 20 carrys out wireless signal emission to intelligent running gear PHONE 1-PHONEn by base station 10, or receive wireless signal from intelligent running gear PHONE1-PHONEn, and then provide Internet resources and social networking service.In like manner, the user 1-user n holding intelligent running gear PHONE 1-PHONEn links upper server 20 by base station 10, and then uses Internet resources and social networking service.User 1-user n is all legitimate user, and such as each user all registers personal data on server 20, and obtains other private key (private key) by paying or other authorization.When user requires to use specific network service, server 20 can verify its private key with specific program, and just can provide this specific network service after being proved to be successful.
In wireless network 100 of the present invention, the operating system OS that server 20 is installed can perform the computing of privacy homomorphic cryptography.Privacy homomorphic cryptography system must meet E (m1) ⊙ E (m2)=E (m1 Θ m2), wherein m1 and m2 represent firsthand information m1, E (m1) represent encrypted data m1 after result, E (m2) represent encrypted data m2 after result, E (m1 Θ m2) representative the ciphertext after certain operations is carried out to enciphered data m1 and m2, and ⊙ and Θ represents operator.According to the difference of operator, server 20 can perform the computings such as addition privacy homomorphic cryptography, subtraction privacy homomorphic cryptography or multiplication privacy homomorphic cryptography.The details of privacy homomorphic cryptography technology is provided in by RL Rivest, L.Adleman and ML Dertouzos delivers " On data banks and privacy homomorphisms " (Academic Press, New York, 1978) " Fully homomorphicencryption using ideal lattices " (the Proceeding STOC ' 09Proceedings ofthe 41st annual ACM symposium on Theory of computing) and by Craig Gentry delivered, does not separately add at this and repeats.
Following explanation embodiments of the invention, the user 1 supposing to hold intelligent running gear PHONE 1 wants to call together base station 10 other user neighbouring to participate in specific activities, first intelligent running gear PHONE 1 can be utilized to send activity and to invite REQUEST to server 20, and the every terms of information providing and be relevant to this activity is provided in REQUEST in activity, such as activity description, activity venue, activity date/time, enterable number, or other specific demand/restriction etc.Meanwhile, activity is invited in REQUEST and also can be required that movable participant must provide specific private data, or informs that the private data of event promoters is supplied to movable participant by permission.
After REQUEST is invited in the activity of receiving, server 20 utilizes public-key cryptography to carry out particular encryption to produce every enciphered data to the every terms of information being relevant to this activity, then certain operations is carried out to obtain the first ciphertext EN1 to enciphered data, again the first ciphertext EN1 is sent by base station 20, such as, be sent to other the intelligent running gear PHONE2 ~ PHONEn in visits.Wherein, particular encryption and certain operations need meet the characteristic of privacy homomorphic cryptography.
After receiving the first ciphertext EN, the user 2-user n holding intelligent running gear PHONE2-PHONEn can learn that certain activity is about to hold, suppose that user 2 and user 3 are interested in further to understand details, now user 2 can carry out the computing of privacy homomorphic decryption to obtain operation result QUERRY1 according to its private key to the first ciphertext EN1, recycles intelligent running gear PHONE2 and transmits operation result QUERRY1 to server 20 to inquire about the every terms of information being relevant to this activity.In like manner, user 3 can carry out the computing of privacy homomorphic decryption to obtain operation result QUERRY2 according to its private key to the first ciphertext EN 1, recycles intelligent running gear PHONE3 and transmits operation result QUERRY2 to server 20 to inquire about the every terms of information being relevant to this activity.
After receiving the every terms of information of this activity, suppose the interesting participation of user 2 holding intelligent running gear PHONE2, and hold user 3 opt-out activity after understanding activity details of intelligent running gear PHONE3.Now, user 2 can utilize intelligent running gear PHONE2 to transmit encrypting and authenticating and reply REPLY to server 20.Encrypting and authenticating replys REPLY except showing that user 2 participates in except the wish of this activity, also can allow the personal information of event promoters user 1 access activity participant user 2.Also on the one hand, the user 3 of activity only can not learn the non-privacy information being relevant to activity details, and can not obtain further personal information.
After receiving encrypting and authenticating reply REPLY, server 20 utilizes public-key cryptography to carry out particular encryption to produce encryption personal information to the personal information of user 2, then certain operations is carried out to obtain the second ciphertext EN2 to encryption personal information, then the second ciphertext EN2 is sent to intelligent running gear PHONE1 by base station 20.For example, suppose that event producers will user 1 invites requirement activity participant in REQUEST in activity and need provide its mobile portable phone and address, server 20 can utilize public-key cryptography to carry out particular encryption to the number of intelligent running gear PHONE2 and current place longitude and latitude, then carries out certain operations to produce the second ciphertext EN2 to the number after encryption and longitude and latitude.
Also on the one hand, after receiving encrypting and authenticating reply REPLY, suppose that event producers will user 1 invites in REQUEST in activity to allow its mobile portable phone and address to be supplied to movable participant, server 20 can utilize public-key cryptography to carry out particular encryption to the number of intelligent running gear PHONE1 and current place longitude and latitude, then certain operations is carried out to produce the 3rd ciphertext EN3 to the number after encryption and longitude and latitude, then the 3rd ciphertext EN3 is sent to intelligent running gear PHONE2 by base station 20.
After receiving the second ciphertext EN2, event producers will user 1 can solve corresponding operation result according to the characteristic of privacy homomorphic cryptography, then carries out privacy homomorphic decryption to obtain the data of movable participant user 2 according to its private key to this operation result.After receiving the 3rd ciphertext EN3, movable participant user 2 can solve corresponding operation result according to the characteristic of privacy homomorphic cryptography, then carries out privacy homomorphic decryption to obtain the data of event producers will user 1 according to its private key.Therefore, the present invention can guarantee that event producers will user 1 and movable participant user 2 are by mutual consent time, just can learn specific private data each other.
The present invention is first encrypted before transmission data, then carries out computing to obtain corresponding ciphertext to enciphered data, and ciphertext needs be decrypted according to the private key of legal authorization just can solve raw information.Because the present invention transmits the operation result of enciphered data, even if by the astonished third party getting or send to without legal authorization in transport process, leakage be only to encryption after ciphertext carry out the result after certain operations, but not raw information.Therefore, the present invention can provide safe and reliable social networking service between intelligent running gear.
The foregoing is only the preferred embodiments of the present invention, all equalizations done according to the claims in the present invention change and modify, and all should belong to covering scope of the present invention.

Claims (12)

1. utilize privacy homomorphic cryptography to provide a method for social networking service, it comprises:
First user utilizes the first running gear to send activity to invite to server, and wherein this activity is invited to comprise and is relevant to movable every terms of information;
The method is characterized in that and also comprise:
Receiving after this activity invites, this server by utilizing public-key cryptography carries out particular encryption to the every terms of information being relevant to this activity, then the first certain operations is carried out to obtain the first corresponding ciphertext to the every data after encryption, then this first ciphertext is sent by base station;
After receiving this first ciphertext, the second user utilizes the second running gear to send encrypting and authenticating and returns back to this server to show that accepting this activity invites;
After receiving the reply of this encrypting and authenticating, the private data of this second user of this server by utilizing the disclosure double secret key carries out this particular encryption, then the second certain operations is carried out to obtain the second corresponding ciphertext to the encryption private data of this second user, again this second ciphertext is sent to this first running gear by this base station, wherein this particular encryption, this first certain operations and this second certain operations are the characteristics meeting this privacy homomorphic cryptography; And
After receiving this second ciphertext, this first user solves corresponding operation result according to the characteristic of this privacy homomorphic cryptography, recycles the first private key and carries out privacy homomorphic decryption to obtain the private data of this second user to this operation result.
2. the method for claim 1, is characterized in that, also comprises:
This first user uses the authority of this social networking service to this first private key of this server requirement to obtain.
3. the method for claim 1, is characterized in that, sending the reply of this encrypting and authenticating is the private data allowing this first user to read this second user.
4. the method for claim 1, is characterized in that, the participant that the participant also comprising this activity of requirement must provide specific private data or allow the specific private data of this first user to be supplied to this activity is invited in this activity.
5. utilize privacy homomorphic cryptography to provide a method for social networking service, it comprises:
First user utilizes the first running gear to send activity to invite to server, and wherein this activity is invited to comprise and is relevant to movable every terms of information;
The method is characterized in that and also comprise:
Receiving after this activity invites, this server by utilizing public-key cryptography carries out particular encryption to the every terms of information being relevant to this activity, then the first certain operations is carried out to obtain the first corresponding ciphertext to the every data after encryption, then this first ciphertext is sent by base station;
After receiving this first ciphertext, second user utilizes private key to carry out privacy homomorphic decryption to obtain operation result to this first ciphertext, recycle one second running gear to transmit this operation result and be relevant to the every terms of information of this activity to this server with inquiry, and after decision participates in this activity, send an encrypting and authenticating return back to this server; And
After receiving the reply of this encrypting and authenticating, the private data of this second user of this server by utilizing the disclosure double secret key carries out this particular encryption, then the second certain operations is carried out to obtain the second corresponding ciphertext to the encryption private data of this second user, again this second ciphertext is sent to this first running gear by this base station, wherein this particular encryption, this first certain operations and this second certain operations are the characteristics meeting this privacy homomorphic cryptography.
6. method as claimed in claim 5, is characterized in that, also comprise:
This second user uses the authority of this social networking service to this private key of this server requirement to obtain.
7. method as claimed in claim 5, is characterized in that, sending the reply of this encrypting and authenticating is the private data allowing this first user to read this second user.
8. method as claimed in claim 5, is characterized in that, the participant that the participant also comprising this activity of requirement must provide specific private data or allow the specific private data of this first user to be supplied to this activity is invited in this activity.
9. utilize privacy homomorphic cryptography to provide a method for social networking service, it comprises:
First user utilizes the first running gear to send activity to invite to server, and wherein this activity is invited to comprise and is relevant to movable every terms of information;
The method is characterized in that and also comprise:
Receiving after this activity invites, this server by utilizing public-key cryptography carries out particular encryption to the every terms of information being relevant to this activity, then the first certain operations is carried out to obtain the first corresponding ciphertext to the every data after encryption, then this first ciphertext is sent by base station;
After receiving this first ciphertext, the second user utilizes the second running gear to send encrypting and authenticating and returns back to this server to show that accepting this activity invites; And
After receiving the reply of this encrypting and authenticating, the private data of this second user of this server by utilizing the disclosure double secret key carries out this particular encryption, then the second certain operations is carried out to obtain the second corresponding ciphertext and to carry out the 3rd certain operations to obtain the 3rd corresponding ciphertext to the encryption private data of this first user to the encryption private data of this second user, again this second ciphertext is sent to this first running gear by this base station and the 3rd ciphertext is sent to this second running gear by this base station, wherein this particular encryption, this first certain operations, this second certain operations and the 3rd certain operations meet the characteristic of this privacy homomorphic cryptography.
10. method as claimed in claim 9, is characterized in that, also comprise:
After receiving the 3rd ciphertext, this second user solves corresponding operation result according to the characteristic of this privacy homomorphic cryptography, recycles the second private key and carries out privacy homomorphic decryption to obtain the private data of this first user to the 3rd ciphertext.
11. methods as claimed in claim 9, is characterized in that, sending that this encrypting and authenticating replys is the private data allowing this first user to read this this second user.
12. methods as claimed in claim 9, is characterized in that, the participant that the participant also comprising this activity of requirement must provide specific private data or allow the specific private data of this first user to be supplied to this activity is invited in this activity.
CN201110045029.8A 2011-01-20 2011-02-24 Method for providing social network service by using privacy homomorphic encryption technology Active CN102611678B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TW100102087A TWI456966B (en) 2011-01-20 2011-01-20 Method for providing social network service using privacy homomorphism cryptography
TW100102087 2011-01-20

Publications (2)

Publication Number Publication Date
CN102611678A CN102611678A (en) 2012-07-25
CN102611678B true CN102611678B (en) 2015-04-15

Family

ID=46528834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110045029.8A Active CN102611678B (en) 2011-01-20 2011-02-24 Method for providing social network service by using privacy homomorphic encryption technology

Country Status (2)

Country Link
CN (1) CN102611678B (en)
TW (1) TWI456966B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970143B (en) * 2012-12-13 2015-04-22 中国科学技术大学苏州研究院 Method for securely computing index of sum of held data of both parties by adopting addition homomorphic encryption
CN104796475B (en) * 2015-04-24 2018-10-26 苏州大学 A kind of socialization recommendation method based on homomorphic cryptography
CN110213219A (en) * 2018-12-06 2019-09-06 上海腾桥信息技术有限公司 A kind of data safety shared system and method
CN110348231B (en) * 2019-06-18 2020-08-14 阿里巴巴集团控股有限公司 Data homomorphic encryption and decryption method and device for realizing privacy protection
US10778410B2 (en) 2019-06-18 2020-09-15 Alibaba Group Holding Limited Homomorphic data encryption method and apparatus for implementing privacy protection

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574738A (en) * 2003-05-16 2005-02-02 三星电子株式会社 Method of distributing encryption keys in mobile ad hoc network and network device using the same

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212889A1 (en) * 2002-05-13 2003-11-13 Khieu Andrew K. Method and system for exchanging data over networks using public key encryption
US8200819B2 (en) * 2008-03-14 2012-06-12 Industrial Technology Research Institute Method and apparatuses for network society associating

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574738A (en) * 2003-05-16 2005-02-02 三星电子株式会社 Method of distributing encryption keys in mobile ad hoc network and network device using the same

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Privacy homomorphisms for social networks with private relationships;Josep Domingo-Ferrer et al;;《Computer Networks》;20081231;第3008-3015页 *
基于密态数据库操作的秘密同态算法研究;刘明坤;《中国优秀硕士学位论文全文数据库》;20061115;全文 *

Also Published As

Publication number Publication date
CN102611678A (en) 2012-07-25
TWI456966B (en) 2014-10-11
TW201233113A (en) 2012-08-01

Similar Documents

Publication Publication Date Title
US10237247B2 (en) User interface systems and methods for secure message oriented communications
US9465950B2 (en) Methods, apparatuses, and computer-readable storage media for securely accessing social networking data
US20160140548A1 (en) Method for performing non-repudiation, and payment managing server and user device therefor
US11568083B2 (en) User-controlled access to data in a communication network
CN102685749B (en) Wireless safety authentication method orienting to mobile terminal
US10944551B2 (en) Flexible security channel establishment in D2D communications
US9203610B2 (en) Systems and methods for secure peer-to-peer communications
CN102625294B (en) Method for managing mobile service by taking universal serial bus (USB) as virtual subscriber identity module (SIM) card
CN108011715A (en) A kind of distribution method of key, relevant device and system
US20150372813A1 (en) System and method for generating a random number
CN106576043A (en) Virally distributable trusted messaging
CN103686589A (en) Safe check-in method and system facing mobile terminal
CN102611678B (en) Method for providing social network service by using privacy homomorphic encryption technology
CN105554760A (en) Wireless access point authentication method, device and system
CN106031120A (en) Key management
CN113365264B (en) Block chain wireless network data transmission method, device and system
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN111247770B (en) Method and related system for protecting vehicle external communication by using IBC
CN106211146A (en) Safety communication record adding method, information communicating method and call method and system
CN101521571B (en) Method for authenticating safety unit and server side of mobile hardware
JP2013042266A (en) Encryption information utilization system
CN113328860A (en) Block chain-based user privacy data security providing method
Yazdanpanah et al. Secure SMS Method Based on Social Networks
TWI577145B (en) Method for encrypted data transmission of near field communication device and system thereof
US20230403142A1 (en) Ultra-wideband session key sharing scheme

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant