CN105848139A - Location-based privacy protection inquiring and processing method facing mobile cloud platform - Google Patents

Location-based privacy protection inquiring and processing method facing mobile cloud platform Download PDF

Info

Publication number
CN105848139A
CN105848139A CN201610153059.3A CN201610153059A CN105848139A CN 105848139 A CN105848139 A CN 105848139A CN 201610153059 A CN201610153059 A CN 201610153059A CN 105848139 A CN105848139 A CN 105848139A
Authority
CN
China
Prior art keywords
user
data
encryption
key
cloud platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610153059.3A
Other languages
Chinese (zh)
Other versions
CN105848139B (en
Inventor
谢晴晴
王良民
仲红
殷赵霞
崔杰
肖云
程珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN201610153059.3A priority Critical patent/CN105848139B/en
Priority claimed from CN201610153059.3A external-priority patent/CN105848139B/en
Publication of CN105848139A publication Critical patent/CN105848139A/en
Application granted granted Critical
Publication of CN105848139B publication Critical patent/CN105848139B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a location-based privacy protection inquiring and processing method facing a mobile cloud platform. The method sequentially comprises the following steps: system initialization, data main location encryption, user key generation, user key authentication, user location encryption, distance calculation, distance comparison and inquired result obtaining. In the method, based on a location inquiring processing process, under a condition that data main location information and data user location information are not exposed, a mobile cloud service provider handles operation requests of distance calculation and distance comparison to obtain a ciphertext result, and then sends the ciphertext result to a data user, and finally only a legal user can obtain a plaintext result, so that in the process, the method provided by the invention fully utilizes cloud computing resources, and the data user can obtain a service only by a few of the computing resources.

Description

A kind of towards mobile cloud platform location-based secret protection inquiry processing method
Technical field
The present invention relates to privacy protection processing technology based on position enquiring in mobile cloud platform, be specifically related to one Towards mobile cloud platform location-based secret protection inquiry processing method.
Background technology
Along with social networks and smart mobile phone end move the fast development of cloud, increasing user is had to use intelligence Mobile phone records life, and these record data are saved in mobile high in the clouds.It is noted here that these The record the most embedded positional information of data, because the built-in GPS module of smart mobile phone, has the most powerful position Put information obtaining ability.Camera function such as smart mobile phone.So commonly using along with mobile cloud, interior in a large number The data of seated position information are collected beyond the clouds, and this is just for bring abundant basic data based on position enquiring service Storehouse, brings facility to the life of people., mobile cloud service provider is incredible, and position is originally Body contains bulk information, it is easy to expose the individual privacy of user.For the angle of data master, he is by this After a little positional informationes upload to high in the clouds, it is desirable to position is maintained secrecy, and only specific user just can get Positional information and proposition location-based inquiry service.For the angle of user, he wishes do not sticking one's chin out In the case of positional information, just can enjoy the location-based inquiry service that mobile cloud service provider provides, And oneself need not spend too many calculation cost.Therefore, current problem demanding prompt solution is summarized as follows:
(1) fine-grained access privilege control: data storage of mainly seeking survival is that maintain secrecy can not to the positional information in high in the clouds Seeing, only main those users specified of data just can get clear and definite positional information;
(2) efficiently and the distance of secret protection calculates and compares: in location-based inquiry, distance calculate and It is relatively two most basic functions.Advocate peace the position of data user except requiring not expose during calculating data Outside information, it is also contemplated that to the calculation cost problem of user.Because the communication that the user in mobile high in the clouds commonly uses Instrument is mobile phone, and computing capability ratio is relatively low, and communication cost is higher.
The secret protection serviced based on position enquiring about mobile high in the clouds processes problem, and industry has carried out exerting in a large number Power, gives attribute base encryption technology, homomorphic encryption algorithm and location-based secret protection vlan query protocol VLAN, but It is that these methods existing all exist defect more or less, such as: (1) decryption time is the highest and cannot solve Actual application problem, and in most of the cases, some application only need several addition or multiplication operation to solve Certainly;(2) it is not suitable for solving based on the Privacy Protection in position enquiring;(3) only non-when user density When often height and user behavior pattern are unpredictable, this technology could protect privacy of user;(4) data are advocated peace data Need mutual frequently between user, cause their calculation cost and communication cost the highest ...
In sum, and for mobile cloud platform, most of users use smart mobile phone to access social networks, Its computing capability and communication capacity are all limited.
Summary of the invention
Goal of the invention: it is an object of the invention to solve the deficiencies in the prior art, it is provided that a kind of towards shifting Dynamic cloud platform location-based secret protection inquiry processing method, i.e. a kind of advocates peace data user position letter in data The method for safely carrying out that distance on breath calculates and distance compares.
Technical scheme: the one of the present invention is towards mobile cloud platform location-based secret protection query processing side Method, comprises the following steps successively:
(1) system initialization;
(2) data master site encryption;
(3) user key generates;
(4) user key checking;
(5) customer location encryption;
(6) distance calculates;
(7) distance compares;
(8) Query Result obtains.
Further, in described step (1), the detailed process of system initialization is:
Believable authoritative institution TA selects and announces an exponent number is p, and producing unit is g0Bilinear Groups G0, secret Thickly produce a random number v0 ∈ Zp, based on above parameter, master key and PKI at authoritative institution's TA calculating, Master keyAnd PKI
Further, in described step (2), the detailed process of data master site encryption is:
(21) first data master produces encryption key K for encrypting its positional information y=(y1,y2), data master is random And produce two Big prime ρ in confidence1And ρ2, calculate n=ρ1·ρ2, φ (n)=(ρ1-1)(ρ2-1);
(22) select a positive number g relatively prime with n, and two secret positive number m, x < n is denoted as K 'y=<m, x>, The encryption key of data master is Ky, it is calculated as Ky=gen (K 'y)=mg(x modφ(n))modn;
(23) positional information after data main encryption is designated as ye=(ye1,ye2), it is calculated as follows:
y e i = y i &CenterDot; K y - 1 mod n , i = 1 , 2 , 3
(24) data main definition access rights tree is Tp, and to each node x in tree, all define a multinomial qx, its exponent number dx=tx-1, txBeing the threshold value of node x, if node x is and door, then tx is node x Child nodes number, if or door, then tx is 1, the total number of general 1≤tx≤child nodes;
From the beginning of root node R, the raw random number s ∈ Z of data main productp, and q is setR(0)=s, then selects it His numerical value makes, for any other node x, have qx(0)=qparent(x)(index (x)), wherein parent (x) It it is the father node of x;Then, calculating auxiliary ciphertext AC is
Wherein
KAC=< m Ys,x+Ys>;
AC is auxiliary ciphertext, is used for realizing the access privilege control of positional information;KACIt is stored in assisting close Key form in literary composition, C, CiAnd Ci' represent some ciphertext parameters of attribute, AttTIt is authority tree TpIn Attribute node set, att (i) represents the property value that attribute node i is stored, and H () is hash function;
(25) last, data chief commander (ye, AC) upload to mobile high in the clouds together and store.
Further, the specific operation process that in described step (3), user key generates is:
When there being new user to ask addition system, this user is by its property set AQIt is sent to TA, TA and uses step (1) PKI and the master key that produce in calculate and this user property collection AQClosely-related private key SKQ, so After by this private key SKQIt is sent to this user;
Wherein,
d0,ri∈ZpIt is random number, AQIt it is the property set of user.
Further, in described step (4), the specific operation process of user key checking is:
User obtains the private key SK produced by step (3)Q, the then PKI PK of joint step (1) and step Suddenly auxiliary ciphertext AC of (2), is calculated secret parameter Ys
Wherein, user defines iteration function DecryptNode (AC, a SKQ, x), x is the node in tree;
If the property set of user meets the authority tree of the main definition of data, then start to call from root node R DecryptNode(AC,SKQ, R), this iteration function will provide an effective outputOtherwise it is output as sky;By calculatingObtain secret parameter Ys
Further, in described step (5), the detailed process of customer location encryption is as follows:
The positional information assuming user is x=(x1,x2), user utilizes calculated secret ginseng in step (4) Number YsEncrypting its positional information, this secret parameter is designated as △=Ys, position computations is as follows:
xe=(xe1,xe2)
=(x1,x2)·△·g
=(x1·△·g,x2·△·g)
If whether user inquires about both distances less than τ, then also need to be encrypted comparing parameter τ.
Further, the concrete steps that in described step (6), distance calculates:
First cloud service provider obtains the key of encryption from the auxiliary ciphertext that data Your Majesty passes KAC=< m ', x ' >, utilizes KAC to calculate K 'AC=m ' gx′Modn, then obtains data and advocates peace the encryption of user Distance between positional information, calculation is
Further, the concrete steps that in described step (7), distance compares:
The range information that cloud service provider is encrypted according to step (6) gained, directly with the standard of comparison encrypted Parameter τe=τ △ gCarry out the comparison of size, i.e. diseeWhether≤0 set up, and directly exports comparative result.
Further, the concrete steps that in described step (8), Query Result obtains:
If user's request is distance comparison query, directly Query Result can be obtained from step (7);If request Be that distance calculates inquiry, use step (4) secret parameter Y that producessStep (6) is produced encryption Distance results is decrypted calculating, available distance value i.e. dis=dis in plain texte·(△·g)-1
Beneficial effect: compared with prior art, the invention have the advantages that
(1) present invention propose one very useful towards mobile cloud platform service based on position enquiring mould Type, and extract the primary demand of system user.
(2) present invention is on the basis of RSA Algorithm, the key group of two parameters of the employing position to data master Information is encrypted, and the secret parameter then utilizing CPABE technology to produce is encrypted camouflage to this key group, Make the most legal user could obtain decruption key.
(3) RSA Algorithm is transformed by the present invention so that new AES can be supported to add well Distance on close positional information calculates and distance compares operation, thus takes full advantage of the calculating in mobile high in the clouds Resource, greatly reduces calculation cost and the communication cost of user mobile phone end, and significantly improves query processing Efficiency.
Shown on Zong, in the present invention handling process based on position enquiring can not expose data advocate peace data use In the case of the positional information of family, mobile cloud service provider process distance calculating and distance compares operation and asks Asking, obtain ciphertext result, be subsequently transmitted to data user, the most legal data user could obtain To result in plain text.
Accompanying drawing explanation
Fig. 1 is the disposed of in its entirety flow chart of the present invention;
Fig. 2 is the service model schematic diagram of the present invention;
Fig. 3 is access rights tree schematic diagram in implementing.
Detailed description of the invention
Below technical solution of the present invention is described in detail, but protection scope of the present invention is not limited to described Embodiment.
As shown in Figure 1 to Figure 3, the one of the present invention is towards mobile cloud platform location-based secret protection Directory Enquiries Reason method, includes eight steps: the encryption of system initialization, data master site, key generate, Yong Humi successively Key checking, customer location encryption, distance calculating, distance compare and Query Result acquisition, are embodied as step such as Shown in lower:
Step one, system initialization:
One believable authoritative institution TA selects and announces an exponent number to be p, and producing unit is g0Bilinear Groups G0, produce a random number v the most in confidence0∈Zp.Based on these parameters, TA calculates master key And PKI
Step 2, data master site are encrypted:
The positional information randomly generating data master is y=(18308031,46804031), specifically comprises the following steps that
(21) data master produces two Big prime ρ at random and in confidence1=9857 and ρ2=4783, calculate N=ρ1·ρ2=47146031, φ (n)=(ρ1-1)(ρ2-1)=47131392.
(22) select a positive number g=5599 relatively prime with n, and two secret positive number m, x < n is denoted as K′y=< m, x >=< 69,3401 >.The encryption key K of data masteryIt is calculated as Ky=gen (K 'y)=mg(x modφ(n))Modn=2519503053.
(23) positional information after data main encryption is designated as ye=(ye1,ye2)=(30214506,7328596).
(24) data main definition access rights tree is TpAs it is shown on figure 3, then, calculating auxiliary ciphertext AC is
Wherein, KAC=< m Ys,x+Ys>=< 19825887,6440215 >, Ys=6436814.
(25) last, data chief commander (ye, AC) upload to mobile high in the clouds together and store.
Step 3, user key generate:
One American friend request of data master accesses the positional information of data master, and by its property set AQ={ American, Friend} are sent to TA, TA and use PKI and master key to calculate and this user property Collect closely-related private key SKQ, such as following formula:
SK Q = { D = g 0 v 0 &CenterDot; g 0 d 0 , &ForAll; i &Element; A Q : D i = H ( a t t ( i ) ) r i &CenterDot; g 0 d 0 , D i &prime; = g 0 r i }
Wherein, d0,ri∈ZpIt is random number, AQIt it is the property set of user.Last TA is by this private key SKQSend To this user;
Step 4, user key are verified:
(41) user defines iteration function DecryptNode (AC, SKQ, x), wherein x is authority tree TpIn one Individual node.If the property set of user meets the authority tree of the main definition of data, then call from root node DecryptNode(AC,SKQ, R), available
(42) by calculatingObtain secret parameter Ys=6436814.
Step 5, (customer location encryption):
The positional information randomly generating user is x=(42232704,32788893), and user utilizes gained secret to join Number YsEncrypting its positional information, this secret parameter is designated as △=Ys, position computations is as follows:
xe=(3573600,1434994)
If whether both user's requesting queries distance is less than τ=56500, then also need to be encrypted as τ τe=544183253000.
Step 6, distance calculate:
First cloud service provider obtains the key K of encryption from the auxiliary ciphertext that data Your Majesty passesAC, utilize KAC Calculate data advocate peace user encryption position information between distance, for dise=325920875836518.
Step 7, distance compare:
Cloud service provider compares diseWith τeSize, for disee, both distances can be obtained 56500 In unit distance.
Step 8, Query Result obtain:
If user's request is distance comparison query, Query Result directly can be obtained from step 7;If request Being that distance calculates inquiry, the ciphertext result that step 6 is obtained by the secret parameter using step 4 to produce is decrypted Calculate, available distance value in plain text, i.e. dis=dise·(△·g)-1=33838839.
In said process, distance calculates, and distance compares the time cost spent with Query Result acquisition and is respectively 1.1074ms, 1.1752ms and 0.13171ms.

Claims (9)

1. one kind towards mobile cloud platform location-based secret protection inquiry processing method, it is characterised in that: Comprise the following steps successively:
(1) system initialization;
(2) data master site encryption;
(3) user key generates;
(4) user key checking;
(5) customer location encryption;
(6) distance calculates;
(7) distance compares;
(8) Query Result obtains.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: in described step (1), the detailed process of system initialization is:
Believable authoritative institution TA selects and announces an exponent number is p, and producing unit is g0Bilinear Groups G0, secret Thickly produce a random number v0 ∈ Zp, based on above parameter, master key and PKI at authoritative institution's TA calculating, Master keyAnd PKI
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: in described step (2), the detailed process of data master site encryption is:
(21) first data master produces encryption key K for encrypting its positional information y=(y1,y2), data master with Machine and in confidence two Big prime ρ of generation1And ρ2, calculate n=ρ1·ρ2, φ (n)=(ρ1-1)(ρ2-1); Wherein, y1Represent longitude, y2Represent latitude;
(22) a positive number g relatively prime with n and two secret positive number m and x is selected, and m, x < n, note It is K 'y=< m, x >, the encryption key of data master is Ky, it is calculated as Ky=gen (K 'y)=mg(xmodφ(n))modn;
(23) positional information after data main encryption is designated as ye=(ye1,ye2), it is calculated as follows:
y e i = y i &CenterDot; K y - 1 mod n , i = 1 , 2
(24) data main definition access rights tree is Tp, and to tree in each node x, all define one multinomial Formula qx, its exponent number dx=tx-1, txIt it is the threshold value of node x;From the beginning of root node R, data main product is raw Random number s ∈ Zp, and q is setR(0)=s, then selects other numerical value to make for any other node x, There is qx(0)=qparent(x)(index (x)), wherein parent (x) is the father node of x;Then, auxiliary is calculated close
Literary composition AC isWherein
KAC=< m Ys,x+Ys〉;
In above-mentioned, AC is the access privilege control that auxiliary ciphertext realizes positional information, KACIt is stored in auxiliary Key form in ciphertext, C, CiAnd Ci' represent some ciphertext parameters of attribute, AttTIt is authority tree TpIn Attribute node set, att (i) represents the property value that attribute node i is stored, and H () is hash function;
(25) last, data chief commander (ye, AC) upload to mobile high in the clouds together and store.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: the specific operation process that in described step (3), user key generates is:
When there being new user to ask addition system, this user is by its property set AQIt is sent to TA, TA and uses step (1) PKI and the master key that produce in calculate and this user property collection AQClosely-related private key SKQ, so After by this private key SKQIt is sent to this user;
Wherein,
d0,ri∈ZpIt is random number, AQIt it is the property set of user.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: in described step (4), the specific operation process of user key checking is:
User obtains the private key SK produced by step (3)Q, the then PKI PK of joint step (1) and step Suddenly auxiliary ciphertext AC of (2), is calculated secret parameter Ys
Wherein, user defines iteration function DecryptNode (AC, a SKQ, x), x is the node in tree;
If the property set of user meets the authority tree of the main definition of data, then start to call from root node R DecryptNode(AC,SKQ, R), this iteration function will provide an effective outputOtherwise it is output as sky;By calculatingObtain secret parameter Ys
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: in described step (5), the detailed process of customer location encryption is as follows:
The positional information assuming user is x=(x1,x2), user utilizes calculated secret ginseng in step (4) Number YsEncrypting its positional information, this secret parameter is designated as Δ=Ys, position computations is as follows:
xe=(xe1,xe2)
=(x1,x2)·Δ·gΔ
=(x1·Δ·gΔ,x2·Δ·gΔ)
If whether user inquires about both distances less than τ, then also need to be encrypted comparing parameter τ.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: the concrete steps that in described step (6), distance calculates:
First cloud service provider obtains the key of encryption from the auxiliary ciphertext that data Your Majesty passes KAC=< m ', x ' >, utilizes KACCalculate K 'AC=m ' gx′Modn, then obtains data and advocates peace the encryption of user Distance between positional information, calculation is
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: the concrete steps that in described step (7), distance compares:
The range information that cloud service provider is encrypted according to step (6) gained, directly with the standard of comparison encrypted Parameter τe=τ Δ gΔCarry out the comparison of size, i.e. diseeWhether≤0 set up, and directly exports comparative result.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side Method, it is characterised in that: the concrete steps that in described step (8), Query Result obtains:
If user's request is distance comparison query, directly Query Result can be obtained from step (7);If request Be that distance calculates inquiry, use step (4) secret parameter Y that producessStep (6) is produced encryption Distance results is decrypted calculating, available distance value i.e. dis=dis in plain texte·(Δ·gΔ)-1
CN201610153059.3A 2016-03-17 One kind is towards the mobile location-based secret protection inquiry processing method of cloud platform Active CN105848139B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610153059.3A CN105848139B (en) 2016-03-17 One kind is towards the mobile location-based secret protection inquiry processing method of cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610153059.3A CN105848139B (en) 2016-03-17 One kind is towards the mobile location-based secret protection inquiry processing method of cloud platform

Publications (2)

Publication Number Publication Date
CN105848139A true CN105848139A (en) 2016-08-10
CN105848139B CN105848139B (en) 2019-07-16

Family

ID=

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107749865A (en) * 2017-12-07 2018-03-02 安徽大学 A kind of location privacy querying method based on homomorphic cryptography
CN111010273A (en) * 2019-12-23 2020-04-14 山东师范大学 Attribute-based encryption and decryption method and system based on position decryption
CN112929153A (en) * 2021-02-23 2021-06-08 上海麟羿信息科技有限公司 Data multi-stage encryption system and method based on complete homomorphic encryption
CN113468440A (en) * 2021-07-01 2021-10-01 陕西科技大学 Anonymous query method for protecting location privacy based on SF-blind filtering protocol
CN114302321A (en) * 2021-12-07 2022-04-08 同济大学 Privacy protection positioning method for hiding anchor node position information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012160760A1 (en) * 2011-05-25 2012-11-29 パナソニック株式会社 Information processing device and information processing method
CN103957109A (en) * 2014-05-22 2014-07-30 武汉大学 Cloud data privacy protection security re-encryption method
CN104363215A (en) * 2014-11-04 2015-02-18 河海大学 Encryption method and system based on attributes
CN104902027A (en) * 2015-06-12 2015-09-09 电子科技大学 Cloud storage service-oriented dynamic data integrity auditing program
CN105100083A (en) * 2015-07-06 2015-11-25 河海大学 Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012160760A1 (en) * 2011-05-25 2012-11-29 パナソニック株式会社 Information processing device and information processing method
CN103957109A (en) * 2014-05-22 2014-07-30 武汉大学 Cloud data privacy protection security re-encryption method
CN104363215A (en) * 2014-11-04 2015-02-18 河海大学 Encryption method and system based on attributes
CN104902027A (en) * 2015-06-12 2015-09-09 电子科技大学 Cloud storage service-oriented dynamic data integrity auditing program
CN105100083A (en) * 2015-07-06 2015-11-25 河海大学 Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107749865A (en) * 2017-12-07 2018-03-02 安徽大学 A kind of location privacy querying method based on homomorphic cryptography
CN107749865B (en) * 2017-12-07 2019-11-15 安徽大学 A kind of location privacy querying method based on homomorphic cryptography
CN111010273A (en) * 2019-12-23 2020-04-14 山东师范大学 Attribute-based encryption and decryption method and system based on position decryption
CN111010273B (en) * 2019-12-23 2022-04-15 山东师范大学 Attribute-based encryption and decryption method and system based on position decryption
CN112929153A (en) * 2021-02-23 2021-06-08 上海麟羿信息科技有限公司 Data multi-stage encryption system and method based on complete homomorphic encryption
CN112929153B (en) * 2021-02-23 2022-07-22 上海麟羿信息科技有限公司 Data multi-stage encryption system and method based on complete homomorphic encryption
CN113468440A (en) * 2021-07-01 2021-10-01 陕西科技大学 Anonymous query method for protecting location privacy based on SF-blind filtering protocol
CN114302321A (en) * 2021-12-07 2022-04-08 同济大学 Privacy protection positioning method for hiding anchor node position information
CN114302321B (en) * 2021-12-07 2022-10-14 同济大学 Privacy protection positioning method for hiding anchor node position information

Similar Documents

Publication Publication Date Title
CN111835500B (en) Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN109246096B (en) Multifunctional fine-grained access control method suitable for cloud storage
CN112765650A (en) Attribute-based searchable encryption block chain medical data sharing method
CN105871543A (en) Attribute-based multi-keyword ciphertext retrieval method under background of multiple data owners
CN108092972B (en) Multi-authorization-center attribute-based searchable encryption method
CN105007161B (en) A kind of fuzzy keyword public key search encryption method of trapdoor None- identified
CN108156138A (en) A kind of fine granularity calculated for mist can search for encryption method
CN110022309B (en) Safe and efficient data sharing method in mobile cloud computing system
CN105049196A (en) Searchable encryption method of multiple keywords at specified location in cloud storage
CN110390203B (en) Strategy hidden attribute-based encryption method capable of verifying decryption authority
CN105024802A (en) Bilinear pairing-based multi-user multi-keyword searchable encryption method in cloud storage
CN112543099B (en) Certificateless searchable encryption method based on edge calculation
CN108092766A (en) A kind of cipher text searching method for verifying authority and its system
CN104135473A (en) A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
CN115987592A (en) Block chain-based mobile medical internet of things fine-grained access control method and system
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
WO2018070932A1 (en) System and method for querying an encrypted database for documents satisfying an expressive keyword access structure
CN110443069B (en) Method, system and equipment for protecting privacy of mobile social network
CN114338025A (en) Ciphertext equivalence testing method in cloud environment
CN109740383B (en) Privacy protection control method for fog computing-oriented medical system
CN107294701A (en) The multidimensional ciphertext interval query device and querying method managed with efficient key
CN114567465A (en) Searchable encryption method for classified medical data based on block chain
CN106301776A (en) Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system
Ruan et al. A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management
CN109412809B (en) SDN information access control method based on authenticatable hierarchical attribute encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant