CN107347061A - Left side servomechanism 1 and right side power-assisted - Google Patents

Left side servomechanism 1 and right side power-assisted Download PDF

Info

Publication number
CN107347061A
CN107347061A CN201710458154.9A CN201710458154A CN107347061A CN 107347061 A CN107347061 A CN 107347061A CN 201710458154 A CN201710458154 A CN 201710458154A CN 107347061 A CN107347061 A CN 107347061A
Authority
CN
China
Prior art keywords
mrow
msub
server
rsqb
lsqb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710458154.9A
Other languages
Chinese (zh)
Other versions
CN107347061B (en
Inventor
张春慨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Graduate School Harbin Institute of Technology
Original Assignee
Shenzhen Graduate School Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Graduate School Harbin Institute of Technology filed Critical Shenzhen Graduate School Harbin Institute of Technology
Priority to CN201710458154.9A priority Critical patent/CN107347061B/en
Publication of CN107347061A publication Critical patent/CN107347061A/en
Priority to PCT/CN2017/115846 priority patent/WO2018227907A1/en
Application granted granted Critical
Publication of CN107347061B publication Critical patent/CN107347061B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Other Investigation Or Analysis Of Materials By Electrical Means (AREA)

Abstract

The present invention proposes a kind of time series abnormality detection system and method based under Secure, and the system includes service end and user terminal, wherein, service end at least two servers:Server C and server S;The service end distributed storage the time series for forming a complete data set;Server C is the server that service is provided for user terminal, carries out the multi-party shared of time series based on BCP encryption systems between server S and server C, server S is half honest, possesses the master key available for decryptionmk, disturbance is all added in the computing that all S are participated in, prevents S from obtaining the relevant information of relevant user;Server C and server S initialization BCP encryption systems;Server C is supplied to server S after the time series being stored thereon is encrypted;Server S carries out the abnormality detection of time series under security protocol.Time series abnormality detection proposed by the present invention based under Secure has great practical value.

Description

Based on the time series method for detecting abnormality and system under Secure
Technical field
The present invention relates to abnormality detection technical field, more particularly to a kind of time series based under Secure is examined extremely Survey method and system.
Background technology
In real life, every field all includes substantial amounts of time series data, such as the ECG data of patient, brain Supplemental characteristic and network flow data of the big quantity sensor in electromyographic data, power plant etc..And the abnormal subsequence of time series (pattern) detection is a highly important field, and the time series major part Data Representation containing abnormal patterns is normal morphology, The abnormal patterns frequency of occurrences is few, but the abnormal patterns seldom occurred include considerable information.Abnormal electrocardiogram (ECG) data Mean that patient may suffer from certain type of heart disease, abnormal eeg data is probably to be drawn by epilepsy Deng Nao sections disease Rise, find that the abnormal electrocardiogram of patient or eeg data can play directive function to follow-up treatment in time;And factory senses Device data exception might mean that failure occurs in some part of system, notes abnormalities in time and carries out maintenance energy to the system failure Reduce loss.Therefore, great realistic meaning is studied in the abnormal subsequence detection of time series data.
Related scholar had done substantial amounts of work both at home and abroad for research on time series abnormality detection.Dasgupta It is proposed to apply to the thought in immunology among the detection of time series abnormal patterns.This method can using self immune system The characteristics of distinguishing own cells, molecule and external cellular, molecule, negative itemsets original is utilized after time series is carried out into coded treatment Reason difference itself and external cellular or molecule, so as to carry out time series abnormal patterns detection.Junshui Ma propose to utilize One-Class SVM carry out the abnormal patterns detection of time series, and its thought, which comes from One-Class SVM, can detect vectorial number According to the abnormity point of concentration, after time series data is transformed into phase space, model is trained using positive class training data, The model finally come using training carries out detection to time series and sees whether deviate model, can thus carry out time series Abnormal patterns detect.Keogh proposes the abnormal subsequence that HOT SAX methods are come in discovery time sequence, and this method is by the time The Sequence Transformed detection ordering for being SAX method for expressing, time series subsequence being improved using heuristic, so as to greatly carry High time series exception subsequence detection efficiency.Izakian proposes to carry out time sequence using the method for fuzzy C-means clustering Abnormal subsequence detection is arranged, its thought is is clustered time series subsequence using fuzzy C-means clustering method, clustering cluster Center reflects the mode configuration of time series, and original sub-sequence is rebuild with cluster centre, normal sub- sequence Row mode configuration can preferably be reconstructed by clustering cluster center, and abnormal subsequence is difficult to reconstruct by cluster centre, passes through The subsequence being compared with after clustering cluster center reconstructs and atomic series otherness, to find abnormal subsequence.Sivaraks It is proposed to detect the abnormal heartbeats in electrocardiogram (ECG) data using the method for motif discovery, when such a thought can also apply to other Between sequence abnormal subsequence detection among.This method by analyzing electrocardiogram (ECG) data feature and extracting the pattern repeated, And by the similitude in comparative sequences between candidate's subsequence mode and theme, to determine whether pattern is abnormal electrocardiogram mould Formula, this method need not set abnormal sub-sequence length compared to remaining abnormal subsequence detection algorithm, and combine electrocardiogram (ECG) data neck Domain knowledge, Detection accuracy are very high.The country has also carried out the research of correlation.That studied at first is Xiao of Fudan University in Shanghai Brightness, it is that time series is converted into multiple line segment patterns using line segment as pattern, the general principle of detection, and by based on mould The abnormality degree that formula density defines weighs the intensity of anomaly of pattern, and using the high pattern of intensity of anomaly as abnormal.Zhan Yanyan Propose on the basis of time series linear expression pattern carry out abnormal patterns detection method, the thought of the algorithm be if Pattern is abnormal patterns, then the frequency that the pattern occurs is inevitable very low, so being assigned for the low pattern of the frequency of occurrences higher Exceptional value, and relatively low exceptional value is assigned for the higher pattern of the frequency of occurrences, the high pattern of exceptional value is then abnormal patterns. Du Hongbo proposes using locally linear embedding that come abnormal patterns in detection time sequence its thought is for each in time series Pattern, it is reconstructed by the pattern in neighborhood, compares the otherness between pattern and proterotype after reconstruct, reconstruct misses The bigger subsequence of difference is more probably abnormal patterns.Time series exception subsequence detection method HOTSAX is used for online by Wang Fei Among the abnormality detection of time series data, so as to realize the dynamic increment formula abnormality detection of time series data.Li Guiling is carried The PAA changing patteries for going out time series represent, and utilize cluster result using its cluster result come hunting time sequence variation The search order of sequence is inspired, so as to detection time sequence variation subsequence.
In cloud computing technology growing today, increasing people can select the data of oneself to be put into cloud to deposit up Storage or computing, the efficiency that can make time series abnormality detection with cloud computing technology can greatly improve, but cloud computing Security is troubling always.How data security (including the security of storage and computing at the end of Cloud Server is ensured Security) an and important field of research.Research in the research of existing time series to high in the clouds security is also It is relatively deficient.
The content of the invention
For overcome the deficiencies in the prior art, it is an object of the invention to provide a kind of time sequence based under Secure Row method for detecting abnormality and system.
The purpose of the present invention is achieved through the following technical solutions:A kind of time series abnormality detection based under Secure System, the system include service end and user terminal, wherein, service end at least two servers:Server C and server S; The service end distributed storage the time series for forming a complete data set;Server C is to provide clothes for user terminal The server of business, the multi-party shared of time series, server S are carried out based on BCP encryption systems between server S and server C It is half honest, possesses the master key mk available for decryption, disturbance is all added in the computing that all S are participated in, prevents S from being had Close the relevant information of user;Server S runs BCP initialization programs, and the common parameter of generation is broadcasted, and client receives Public key and private key are generated after to common parameter, each client broadcasts public key, retains private key;Client again by itself when Between sequence data by being stored on the C that uploaded onto the server after public key encryption;When having computing request, server C and service Device S calculates result according to protocol requirement collaboration and returns to requesting client.
On the other hand, a kind of time series method for detecting abnormality based under Secure, methods described are based on the present invention Abnormality detection system, specifically comprise the following steps:
Step 1, server C and server S initialization BCP encryption systems;
Step 2, server C are supplied to server S after the time series being stored thereon is encrypted;
Step 3, server S carry out the abnormality detection of time series under security protocol.
Compared with prior art, the present invention has advantages below and technique effect:The invention enables examined extremely under folk prescription Survey produced problem is all resolved well in multi-party, and the security protocol of the invention designed solves in many ways again under Privacy concern.Therefore, the time series abnormality detection proposed by the present invention based under Secure is that have very big practicality Value.
Brief description of the drawings
Fig. 1 is electrocardiogram (ECG) data for the same patient for belonging to A and B Liang Jia hospitals;
Fig. 2 is the present invention based on the time series abnormality detection system schematic diagram under Secure;
Fig. 3 is performance of three kinds of safe computings in data length N=1024;
Fig. 4 is performance of three kinds of safe computings under different data lengths.
Specific embodiment
The present invention is described in further detail below by embodiment combination accompanying drawing, but the embodiment party of the present invention Formula not limited to this.
It is to concentrate all to think time series data in the prior art, and the algorithm taken also all is to think current number It is complete according to collection.And in actual applications, what data distribution was often disperseed, such as the electrocardiogram (ECG) data of patient, may be at certain One regional tri- hospital of A, B, C all preserves the electrocardiogram (ECG) data of some patient.Therefore when the electrocardiogram (ECG) data for analyzing the patient When, it is necessary to A, B, C Data Integration of tri- are formed into a complete data set together, in complete data and upper progress Data mining.
As shown in Figure 1, time series A and time series B is the heart for the same patient for being belonging respectively to A and B Liang Jia hospitals Electrograph (ECG) data.B hospitals want to note abnormalities on time series B now, if B hospitals only consider time series B feelings Condition, then be the sequence for having maximum abnormality degree according to the abnormal definition subsequence x1 of time series, x1 can be judged for abnormal sub- sequence Row, data that can be later x1 in actually time series B be all it is abnormal, on the contrary x1 as normal data abnormal Seem among data " abnormal ".But when considering time series A, because the data in A are all normal, and x1 patterns All much like, with reference to finding that x2 possesses the abnormality degree of maximum afterwards, therefore, algorithm judges that x2 is abnormal subsequence.So introduce After multi-party participation, can solve the insurmountable problem under folk prescription.
But simultaneously it will be noted that the data resource important as one, often has valency very much for owner It is worth, especially the information of patient in hospital, is a kind of typical height private data.A, B, C tri- data are needed to do number According to excavation, but any one in A, B, C be it is not desirable that other two private datas for knowing oneself, at such a Under part, still expect from complete data and concentrate the result that draws of analysis, therefore this is related to multi-party computations Problem.
In the case that the present invention expands to the abnormal definition of time series suitable for multi-party participate in, safety detection is devised Algorithm detection time sequence variation, the secure cryptographic algorithm taken allow the data of input in different public key encryptions, and can be right The data of different public key encryptions carry out computing.In addition, algorithm proposed by the present invention either in multinuclear and can all divide parallel Can parallel processing in cloth system.
Reference documents below of the present invention:
Non-patent literature 1:Bresson E, Catalano D, Pointcheval D.A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications [C] //Advances in Cryptology-ASIACRYPT 2003, International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30-December 4,2003, Proceedings.DBLP, 2003:37-54.
Non-patent literature 2:Peter A, Tews E, Katzenbeisser S.Efficiently Outsourcing Multiparty Computation Under Multiple Keys[J].IEEE Transactions on Information Forensics&Security, 2013,8 (12):2046-2058.
Non-patent literature 3:Liu X, Deng R H, Choo K K R, et al.An Efficient Privacy- Preserving Outsourced Calculation Toolkit With Multiple Keys[J].IEEE Transactions on Information Forensics&Security, 2016,11 (11):2401-2414.
The AES that the present invention uses is the BCP encryption systems (referring to non-patent literature 1-3) based on homomorphic cryptography, together State encryption just refers to that AES has isomorphism.Data Jing Guo homomorphic cryptography are handled to obtain an output, by this One output is decrypted, and its result is the same with handling the output result that the initial data of unencryption obtains with Same Way. It is formulated as:
Dsk([m1]pk·[m2]pk)=m1+m2
Wherein, pk represents public key, and sk represents private key, [m1]pkRepresent m1Encrypted with pk, Dsk([m1]pk) represent to be decrypted with sk.
And BCP encryption systems are a kind of special homomorphic encryption algorithms, BCP have one it is critically important the characteristics of be exactly that it has two Set decryption service.In description above, decryption is private key sk, but also has a kind of ginseng for being referred to as master key in BCP Number can decrypt encryption data, and master key is represented with mk.
The system model of the present invention as shown in Figure 2, first, two servers is used in server end:Server C kimonos Be engaged in device S, and wherein server S is half honest, possesses the master key mk that can be decrypted.Mean that server S can be according to agreement Regulation performs each step, but may attempt to analyze by the average information obtained in protocol implementation and infer it The correlated inputs output information of his participant.Therefore, in the computing that all S are participated in, disturbance will be added, prevents S from being had Close the relevant information of user.
Collaboration calculating processes of the server C and S for addition is summarized as follows:
Due to homomorphism plus algorithm require two ciphertexts must be in the case of same public key encryption could computing, i.e.,:
([m1]pk·[m2]pk)=[m1+m2]pk
If two ciphertexts are different public key encryptions, then then can not direct computing, [m1]pk1·[m2]pk2Can not be direct Computing.But the public key of each side is all different in multi-party calculate, therefore the computing for being related to multi-party lower ciphertext just needs to take Business device C and server S collaboration computing.The public key of client each first is that all participants are both known about, therefore server C will The two ciphertexts all add disturbance, pass through calculating:
[m1]pk1·[r1]pk1=[m1+r1]pk1
[m2]pk2·[r2]pk2=[m2+r2]pk2
By [m1+r1]pk1[m2+r2]pk2Server S is all sent to, S has master key to decrypt the two ciphertexts, obtained The two clear datas are added again after plaintext, obtain m1+r1+m2+r2, by m1+r1+m2+r2With the public key encryption of some client After be sent to server C, server C knows disturbance r1, and r2In the present embodiment, step S2 specifically includes following steps1+m2]pk.At this moment by this Ciphertext data are sent to client, and client decrypts to obtain plaintext result using the private key of oneself.
The system of the present invention is mainly the exception of detection time sequence, and uses the phase that most computings is exactly time series Like the calculating of property, the similarity measurement of use is Euclidean distance, and the definition of Euclidean distance is subsequence A=(a1, a2..., an) and subsequence B=(b1, b2..., bn) between Euclidean distanceEuclidean distance Computing mainly used addition and multiplication, extracting operation can omit because extracting operation simply have impact on the final of result Value, do not change relative size, i.e., most greatly counted before evolution also certain maximum after evolutions.In addition in the process of abnormality detection In, the comparison of abnormality degree is also used, the maximum subsequence of abnormality degree is abnormal subsequence, and the definition of abnormality degree is subsequence To the distance of its arest neighbors, therefore it is related to the computing compared.So to sum up consider, the time sequence under Secure of the invention The computing that row abnormality detection relates generally to has addition, multiplication and comparison operation.
Addition, multiplication and comparison operation required for for more than, the present invention devise three kinds of agreements and go to realize in safety Addition (SAP), multiplication (SMP) and comparison operation (SMIN) are realized under multi-party.
SAP:Give two ciphertexts encrypted under different public keysServer C wants to know the two In the present embodiment, step S2 specifically includes following stepsProd.pk.Prod.pk is the product of all public keys, can equally in BCP To be gone to decrypt the ciphertext encrypted under Prod.pk with mk.
1st, two random number r are selected firsta,Server C is calculated:
2nd, X and Y are sent to server S, S is decrypted with master key mk, then calculates Z=x+ra+y+rb, Z is encrypted to [Z]Prod.pkRe-send to server C
3rd, server C have received [Z]Prod.pk, calculate R=ra+rb, R is encrypted to [R]Prod.pkCalculate again
[Z]Prod.pk·[R]Prod.pk N-1=[Z-R]Prod.pk=[x+y] Prod.pk
So SAP algorithms just complete, and whole process meets being required of being previously discussed as, therefore can be assumed that and be Safety.(in BCP AESs, [m]pk N-1=[- m]pk, detailed proof procedure is referring to reference to non-patent literature 1,2.)
SMP:Give two ciphertexts encrypted under different public keysServer C wants to know the two Several products, the target of SMP algorithms are exactly to obtain [x*y]Prod.pk
1st, two random number r are selected firsta,Server C is calculated:
2nd, X and Y are sent to server S, S is decrypted with master key mk, then calculates Z=(x+ra)*(y+rb), Z is encrypted Into [Z]Prod.pkRe-send to server C;
3rd, server C have received [Z]Prod.pk, calculate
[Z-rb·x-ra·y-ra·rb]Prod.pk=[xy]Prod.pk
Before SMIN is introduced, a leading agreement is first introduced --- safety is less than agreement SLT, i.e., given two in difference The ciphertext encrypted under public keySLT agreements are exactly it is expected to obtain [u*]Prod.pk, wherein u*Be expression x and y it Between magnitude relationship.
1st, server C first is calculated
One piece of coin of server C throwings, if positive, calculate (l here is an intermediate variable)
If reverse side, calculate
2nd, server C selects a random number r,WhereinRepresent u binary length. Calculate [l1]Prod.pk=([l]Prod.pk)r, by [l1]Prod.pkIt is sent to server S;
3rd, server S decryption [l1]Prod.pkObtain l1, make u*=1 works asOtherwise u*Then=0. will u*It is encrypted to [u*]Prod.pkIt is sent to server C;
4th, server C receives [u*]Prod.pkIf the coin of just throwing is face-up, do not handle, otherwise count Calculate
[u*]Prod.pk=[1]Prod.pk·([u*]Prod.pk)N-1=[1-u*]Prod.pk
If the 5th, u*=0, x >=y is represented, if u*=1, represent x < y.
SMIN:Give two ciphertexts encrypted under different public keysSMIN agreements are exactly to obtain [min (x, y)]Prod.pk·
1st, server C and server S calculate below equation jointly:
Once the 2nd, obtain [u*]Prod.pk, server C calculating
First, the present invention tests the efficiency of three kinds of security protocols, as shown in Figure 2, in the BCP AESs of use, N Size be 1024 bits, all time, which employs the method that 1,000 computings are averaged, in accompanying drawing 2 prevents other reasonses Influence result.
The performance of 1 three kinds of safe computings of table
In BCP AESs, N length is critically important, public key, private key, the generation of master key and plaintext length all There is close association with N.The scene when length that N is only considered in table 1 is 1024 bit, what has after changing N value The situation of sampleAs shown in Figure 3, it is same for each data, all it is 1000 average values for asking it of computing.
From accompanying drawing 3 as can be seen that being continuously increased with N length, algorithm expense has obvious growth, this is just meaned That N is bigger, it is necessary to which the time of computing is more.
What the length of the plaintext employed in experiment above was just as, in BCP AESs, the requirement to plaintext isThe change of so plaintext size can influence the efficiency of BCP AESs
From accompanying drawing 4 as can be seen that with the change of length of the plaintext, the time spent by each agreement is almost unchanged, and this is just Illustrate the size of plaintext does not influence for BCP AESs.This is also to explain, because in BCP AESs In, no matter plaintext size it is much, as long as in plain text meetBCP AESs all can by be encrypted to N in plain text this is big It is small, so in the computing based on ciphertext, as long as N keeps constant, no matter plaintext size it is much, the spent time be difference not More.
The invention enables under folk prescription abnormality detection produced problem be all resolved well in multi-party, Er Qieben Invent the privacy concern security protocol designed solves in many ways again under.Therefore, it is proposed by the present invention based under Secure Time series abnormality detection has great practical value.
Above content is to combine specific preferred embodiment further description made for the present invention, it is impossible to is assert The specific implementation of the present invention is confined to these explanations.For general technical staff of the technical field of the invention, On the premise of not departing from present inventive concept, some simple deduction or replace can also be made, should all be considered as belonging to the present invention's Protection domain.

Claims (7)

  1. 310013 Hangzhou, Zhejiang province city Xihu District Yuhang Tang Lu 866 And client, wherein, service end at least two servers:Server C and server S;The service end distributed storage Form the time series of a complete data set;Server C is the server that service is provided for client, server S and clothes The multi-party shared of time series is carried out based on BCP encryption systems between business device C, server S is half honest, possesses and can be used for solving Close master key mk, disturbance is all added in the computing that all S are participated in, prevent S from obtaining the relevant information of relevant user;Server C and server S initialization BCP encryption systems;The common parameter of generation is broadcasted by server S;Client receives public Public key and private key are generated after parameter, each client broadcasts public key, retains private key;Client is again by the time series of itself Data on the C that uploaded onto the server after private key encryption by storing;When having computing request, server C and during server S pair Between sequence carry out collaboration and calculate the results of unusual sequences, and result is returned into requesting client, client utilizes the private of oneself Key is decrypted to obtain plaintext result.
  2. 2. system according to claim 1, it is characterised in that:The BCP encryption systems are based on homomorphic cryptography:To by same The data of state encryption are handled to obtain an output, and this output is decrypted, and its result with Same Way with being handled not The output result that the initial data of encryption obtains is the same.
  3. 3. system according to claim 1, it is characterised in that:The abnormality detection of the time series is entered using Euclidean distance Row similarity measurements, the computing related generally to have addition, multiplication and comparison operation.
  4. 4. system according to claim 3, it is characterised in that:The add operation uses Secure addition agreement SAP Realize, be specially:Give two ciphertexts encrypted under different public keysServer C want to know this two Number and [x+y]Prod.pk, Prod.pk is the product of all public keys, can be gone to decrypt under Prod.pk with mk equally in BCP The ciphertext of encryption,
    (1) two random number r are selected firsta,Server C is calculated:
    <mrow> <mtable> <mtr> <mtd> <mrow> <mi>X</mi> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>&amp;CenterDot;</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>r</mi> <mi>a</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>+</mo> <msub> <mi>r</mi> <mi>a</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> </mrow> </mtd> <mtd> <mrow> <mi>Y</mi> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>&amp;CenterDot;</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>r</mi> <mi>b</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>+</mo> <msub> <mi>r</mi> <mi>b</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> </mrow> </mtd> </mtr> </mtable> <mo>;</mo> </mrow>
    (2) X and Y are sent to server S, S is decrypted with master key mk, then calculates Z=x+ra+y+rb, Z is encrypted to [Z]Prod.pkRe-send to server C;
    (3) server C have received [Z]Prod.pk, calculate R=ra+rb, R is encrypted to [R]Prod.pkCalculate again
    [Z]Prod.pk·[R]Prod.pk N-1=[Z-R]Prod.pk=[x+y]Prod.pk
  5. 5. system according to claim 3, it is characterised in that:The multiplying uses Secure multiplication agreement SMP Realize, be specially:Give two ciphertexts encrypted under different public keysServer C want to know this two The product [x*y] of numberProd.pk,
    (1) two random number r are selected firsta,Server C is calculated:
    <mfenced open = "" close = ""> <mtable> <mtr> <mtd> <mrow> <mi>X</mi> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>&amp;CenterDot;</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>r</mi> <mi>a</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>+</mo> <msub> <mi>r</mi> <mi>a</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> </mrow> </mtd> <mtd> <mrow> <mi>Y</mi> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>&amp;CenterDot;</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>r</mi> <mi>b</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>+</mo> <msub> <mi>r</mi> <mi>b</mi> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced>
    (2) X and Y are sent to server S, S is decrypted with master key mk, then calculates Z=(x+ra)*(y+rb), Z is encrypted to [Z]Prod.pkRe-send to server C;
    (3) server C have received [Z]Prod.pk, calculate
    [Z-rb·x-ra·y-ra·rb]Prod.pk=[xy]Prod.pk
  6. 6. system according to claim 3, it is characterised in that:The comparison operation compares agreement SMIN using Secure Realize, be specially:Give two ciphertexts encrypted under different public keysServer C want to know this two The size [min (x, y)] of numberProd.pk,
    (1) server C and server S calculate below equation jointly:
    <mfenced open = "" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <mi>S</mi> <mi>A</mi> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> <mo>,</mo> </mrow> </msub> <msub> <mrow> <mo>&amp;lsqb;</mo> <mn>0</mn> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </mtd> <mtd> <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <mi>S</mi> <mi>A</mi> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mn>0</mn> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> <mo>,</mo> </mrow> </msub> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> </mtable> </mfenced>
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <msup> <mi>u</mi> <mo>*</mo> </msup> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <mi>S</mi> <mi>L</mi> <mi>T</mi> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>,</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> </mrow>
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>X</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <mi>S</mi> <mi>M</mi> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msup> <mi>u</mi> <mo>*</mo> </msup> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>,</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> </mrow>
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>Y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <mi>S</mi> <mi>M</mi> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msup> <mi>u</mi> <mo>*</mo> </msup> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>,</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> </mrow>
    (2) once obtaining [u*]Prod.pk, server C calculating
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mi>x</mi> <mo>,</mo> <mi>y</mi> <mo>)</mo> </mrow> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>&amp;CenterDot;</mo> <msubsup> <mrow> <mo>&amp;lsqb;</mo> <mi>Y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> <mrow> <mi>N</mi> <mo>-</mo> <mn>1</mn> </mrow> </msubsup> <mo>&amp;CenterDot;</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>X</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msup> <mi>u</mi> <mo>*</mo> </msup> <mo>)</mo> </mrow> <mi>y</mi> <mo>+</mo> <msup> <mi>u</mi> <mo>*</mo> </msup> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>,</mo> </mrow>
    Wherein, safety is less than i.e. given two ciphertexts encrypted under different public keys of agreement SLTIt is expected to obtain Obtain [u*]Prod.pk, u*It is to express the magnitude relationship between x and y,
    (1) server C first is calculated
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>=</mo> <msup> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>x</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mo>&amp;CenterDot;</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mn>1</mn> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mn>2</mn> <mi>x</mi> <mo>+</mo> <mn>1</mn> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> </mrow>
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>=</mo> <msup> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mo>=</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <mn>2</mn> <mi>y</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> </mrow>
    One piece of coin of server C throwings, if positive, calculate
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>l</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <mi>S</mi> <mi>A</mi> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>,</mo> <msup> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> <mrow> <mi>N</mi> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mo>)</mo> </mrow> </mrow>
    If reverse side, calculate
    <mrow> <msub> <mrow> <mo>&amp;lsqb;</mo> <mi>l</mi> <mo>&amp;rsqb;</mo> </mrow> <mrow> <mi>Pr</mi> <mi>o</mi> <mi>d</mi> <mo>.</mo> <mi>p</mi> <mi>k</mi> </mrow> </msub> <mo>=</mo> <mi>S</mi> <mi>A</mi> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>b</mi> </msub> </mrow> </msub> <mo>,</mo> <msup> <mrow> <mo>(</mo> <msub> <mrow> <mo>&amp;lsqb;</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>&amp;rsqb;</mo> </mrow> <mrow> <msub> <mi>pk</mi> <mi>a</mi> </msub> </mrow> </msub> <mo>)</mo> </mrow> <mrow> <mi>N</mi> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mo>)</mo> </mrow> <mo>;</mo> </mrow>
    (2) server C selects a random number r,WhereinRepresent u binary length.Calculate [l1]Prod.pk=([l]Prod.pk)r, by [l1]Prod.pkIt is sent to server S;
    (3) server S decryption [l1]Prod.pkObtain l1, u*=1 works asOtherwise u*=0. then by u*Encryption Into [u*]Prod.pkIt is sent to server C;
    (4) server C receives [u*]Prod.pkIf the coin of just throwing is face-up, do not handle, otherwise calculate
    [u*]Prod.pk=[1]Prod.pk·([u*]Prod.pk)N-1=[1-u*]Prod.pk
    (5) if u*=0, x >=y is represented, if u*=1, represent x<y.
  7. 7. a kind of time series method for detecting abnormality based under Secure, methods described is based on being appointed according to claim 1-6 Detecting system described in one, it is characterised in that methods described specifically comprises the following steps:
    The common parameter of generation is broadcasted by step 1, server C and server S initialization BCP encryption systems, server S;
    Step 2, client generate public key and private key after receiving common parameter, and each client broadcasts public key, retain private Key;Client on the C that uploaded onto the server after public key encryption again by the time series data of itself by storing;
    Step 3, when having computing request, server C and server S carry out collaboration fortune according to protocol requirement to time series The result of unusual sequences is calculated, and result is returned into requesting client, client is decrypted to obtain and tied in plain text using the private key of oneself Fruit.
CN201710458154.9A 2017-06-16 2017-06-16 Based on the time series method for detecting abnormality and system under Secure Active CN107347061B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710458154.9A CN107347061B (en) 2017-06-16 2017-06-16 Based on the time series method for detecting abnormality and system under Secure
PCT/CN2017/115846 WO2018227907A1 (en) 2017-06-16 2017-12-13 Method and system based on secure multi-party time sequence abnormality detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710458154.9A CN107347061B (en) 2017-06-16 2017-06-16 Based on the time series method for detecting abnormality and system under Secure

Publications (2)

Publication Number Publication Date
CN107347061A true CN107347061A (en) 2017-11-14
CN107347061B CN107347061B (en) 2019-09-03

Family

ID=60254499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710458154.9A Active CN107347061B (en) 2017-06-16 2017-06-16 Based on the time series method for detecting abnormality and system under Secure

Country Status (2)

Country Link
CN (1) CN107347061B (en)
WO (1) WO2018227907A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809628A (en) * 2018-06-13 2018-11-13 哈尔滨工业大学深圳研究生院 Based on the time series method for detecting abnormality and system under Secure
WO2018227907A1 (en) * 2017-06-16 2018-12-20 哈尔滨工业大学深圳研究生院 Method and system based on secure multi-party time sequence abnormality detection
CN110321722A (en) * 2019-07-08 2019-10-11 济南大学 The safe calculation method of DNA sequence dna likelihood and system
CN110570292A (en) * 2019-08-02 2019-12-13 阿里巴巴集团控股有限公司 method and device for calibrating cold start condition threshold of new station
CN111291406A (en) * 2020-01-19 2020-06-16 山东师范大学 Facility site selection method and system based on encrypted position data
CN111339539A (en) * 2020-02-14 2020-06-26 西安电子科技大学 Efficient encrypted image retrieval method under multi-user environment
CN111371545A (en) * 2020-05-27 2020-07-03 支付宝(杭州)信息技术有限公司 Encryption method and system based on privacy protection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680072A (en) * 2015-03-16 2015-06-03 福建师范大学 Personalized track data privacy protection method based on semantics
CN105138923A (en) * 2015-08-11 2015-12-09 苏州大学 Privacy protection time sequence similarity calculation method
CN106022360A (en) * 2016-05-11 2016-10-12 蒋林智 Cipher text-based data binary classification method in statistical learning

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964034B (en) * 2010-09-30 2012-08-15 浙江大学 Privacy protection method for mode information loss minimized sequence data
CN107347061B (en) * 2017-06-16 2019-09-03 哈尔滨工业大学深圳研究生院 Based on the time series method for detecting abnormality and system under Secure

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680072A (en) * 2015-03-16 2015-06-03 福建师范大学 Personalized track data privacy protection method based on semantics
CN105138923A (en) * 2015-08-11 2015-12-09 苏州大学 Privacy protection time sequence similarity calculation method
CN106022360A (en) * 2016-05-11 2016-10-12 蒋林智 Cipher text-based data binary classification method in statistical learning

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LIU, AN 等: "Efficient Secure Similarity Computation on Encrypted Trajectory Data", 《2015 IEEE 31ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018227907A1 (en) * 2017-06-16 2018-12-20 哈尔滨工业大学深圳研究生院 Method and system based on secure multi-party time sequence abnormality detection
CN108809628A (en) * 2018-06-13 2018-11-13 哈尔滨工业大学深圳研究生院 Based on the time series method for detecting abnormality and system under Secure
CN108809628B (en) * 2018-06-13 2021-07-13 哈尔滨工业大学深圳研究生院 Time series abnormity detection method and system based on safety multiple parties
CN110321722A (en) * 2019-07-08 2019-10-11 济南大学 The safe calculation method of DNA sequence dna likelihood and system
CN110321722B (en) * 2019-07-08 2021-11-09 济南大学 DNA sequence similarity safe calculation method and system
CN110570292A (en) * 2019-08-02 2019-12-13 阿里巴巴集团控股有限公司 method and device for calibrating cold start condition threshold of new station
CN110570292B (en) * 2019-08-02 2023-08-08 创新先进技术有限公司 New site cold start condition threshold calibration method and device
CN111291406A (en) * 2020-01-19 2020-06-16 山东师范大学 Facility site selection method and system based on encrypted position data
CN111291406B (en) * 2020-01-19 2022-07-26 山东师范大学 Facility site selection method and system based on encrypted position data
CN111339539A (en) * 2020-02-14 2020-06-26 西安电子科技大学 Efficient encrypted image retrieval method under multi-user environment
CN111371545A (en) * 2020-05-27 2020-07-03 支付宝(杭州)信息技术有限公司 Encryption method and system based on privacy protection
WO2021239008A1 (en) * 2020-05-27 2021-12-02 支付宝(杭州)信息技术有限公司 Privacy protection-based encryption method and system

Also Published As

Publication number Publication date
CN107347061B (en) 2019-09-03
WO2018227907A1 (en) 2018-12-20

Similar Documents

Publication Publication Date Title
CN107347061A (en) Left side servomechanism 1 and right side power-assisted
Zhang et al. PPO-CPQ: a privacy-preserving optimization of clinical pathway query for e-healthcare systems
Zhao et al. Lightweight backup and efficient recovery scheme for health blockchain keys
Lu A new communication-efficient privacy-preserving range query scheme in fog-enhanced IoT
Xing et al. Mutual privacy preserving $ k $-means clustering in social participatory sensing
Chen et al. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement
Zhang et al. High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom
WO2018184407A1 (en) K-means clustering method and system having privacy protection
CN108809628B (en) Time series abnormity detection method and system based on safety multiple parties
Zhou et al. Efficient and traceable patient health data search system for hospital management in smart cities
Ibrahem et al. Privacy-preserving and efficient decentralized federated learning-based energy theft detector
CN111406380A (en) Method and system for key agreement with half-groups
Zheng et al. Towards private similarity query based healthcare monitoring over digital twin cloud platform
CN102857339A (en) Secret distribution sharing and recovery recombining method based on sequences
CN108183791A (en) Applied to the Intelligent terminal data safe processing method and system under cloud environment
CN116523074A (en) Dynamic fairness privacy protection federal deep learning method
CN102710417A (en) Fuzzy vault method based on fingerprint features and Internet key exchange protocol
Zhao et al. ACCEL: An efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data
Drosatos et al. Privacy-preserving statistical analysis on ubiquitous health data
Bai et al. Fair quantum secret sharing based on symmetric bivariate polynomial
CN103957101A (en) Group key establishing method in group communication
Alhija et al. DNA cryptographic approaches: state of art, opportunities, and cutting edge perspectives
Gu et al. Protocol and quantum circuits for realizing deterministic entanglement concentration
CN115879151B (en) Astronomical line query method and system for privacy protection of sensitive data
Li et al. Efficient biometric identity-based encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant