CN107749865A - Location privacy query method based on homomorphic encryption - Google Patents
Location privacy query method based on homomorphic encryption Download PDFInfo
- Publication number
- CN107749865A CN107749865A CN201711282361.XA CN201711282361A CN107749865A CN 107749865 A CN107749865 A CN 107749865A CN 201711282361 A CN201711282361 A CN 201711282361A CN 107749865 A CN107749865 A CN 107749865A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- service provider
- data service
- piecemeal
- query object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000003860 storage Methods 0.000 claims description 10
- 230000009897 systematic effect Effects 0.000 claims description 4
- 238000012790 confirmation Methods 0.000 claims description 2
- 238000006073 displacement reaction Methods 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 238000013316 zoning Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a location privacy query method based on homomorphic encryption, which comprises a cloud server, a data service provider and a plurality of mobile users; the data service provider SP divides the area on the map into blocks according to the density of the query object, then encrypts the query object in each block by using a symmetric encryption algorithm, encrypts each symmetric key by using a homomorphic encryption algorithm, finally stores all ciphertext into a cloud server, and secretly stores a homomorphic encrypted private key; the user downloads the ciphertext of the query object and the corresponding symmetric key ciphertext from the cloud server according to the position of the user, and then performs blinding processing on the symmetric key ciphertext and transmits the symmetric key ciphertext to a data service provider; and the data service provider transmits the decrypted blinded plaintext to the user, and the final user decrypts the corresponding query object to obtain a final query result. The position information of the user can not be revealed in the whole process, so that the position privacy is protected.
Description
Technical field
It is specifically a kind of to be applied to mobile interchange the present invention relates to data encryption and location privacy protection technical field
The querying method of location of mobile users privacy is protected in network.
Background technology
In the utilization of mobile Internet, location Based service to life and the work of people bring it is huge just
Profit, while the leakage of positional information of mobile subscriber may also be caused, so as to bring huge potential safety hazard.Therefore with LBS's
Extensive use, the protection to mobile subscriber's privacy are essential.
At present, conventional location privacy protection method has assumed name anonymity, position k anonymities, space anonymity etc..
(1) assumed name anonymity refers to by the position of an assumed name user to hide the actual position of real user, the inquiry
The degree of accuracy determines that this will reduce the degree of accuracy of inquiry, together by the position of assumed name user and the distance of position of real user
When be also possible to cause the leakage of user profile.
(2) k anonymities in position refer mainly to some band of position at least k user, and this k user can not pass through identity
Distinguished, so even if attacker obtains the positional information of some user, also can not accurately be looked for from this k user
Go out real user.When k values are bigger, the information of user is less susceptible to compromised, but communication overhead can be caused to become big.
(3) for the anonymous mainly user in space when sending request, the position for being sent to server becomes the point by some point
Some region at place.It is inaccurate due to positional information, it will to reduce the degree of accuracy of inquiry.
In summary, existing location privacy protection also has the following disadvantages:
1st, the position that mobile subscriber is sent to data, services business in existing location privacy protection is some region so that logical
Believe that expense becomes big.
2nd, third party's generation and management key are introduced in existing location privacy protection, the part of mobile subscriber may be caused
Privacy leakage.
3rd, metadata provider needs to store substantial amounts of data in existing location privacy protection.
4th, the exact value of oneself position can't be sent to data, services business by mobile subscriber in existing location privacy, this
The degree of accuracy of inquiry will be reduced.
The content of the invention
The present invention, with reference to symmetric encipherment algorithm and the thought of homomorphic encryption algorithm, proposes that one kind is based on by Cloud Server
The location privacy querying method of homomorphic cryptography, is asked to efficiently solve based on the location privacy protection in location-based service
Topic, while data service provider SP storage cost and communication cost are reduced, so as to while customer location privacy is ensured
Reduce overhead.
The present invention adopts the following technical scheme that to solve technical problem:
A kind of location privacy querying method based on homomorphic cryptography of the present invention, be applied to several mobile subscribers, one
In the mobile internet environment that data service provider and a Cloud Server are formed, the mobile internet environment is located at
In same region, remember any one mobile subscriber be U, data service provider SP, Cloud Server CS;It is characterized in,
The location privacy protection method is to carry out in accordance with the following steps:
Step 1, data service provider SP generations and public address system parameter;
Step 2, the data service provider SP generate the ciphertext corresponding to the query object in different piecemeals;
Step 2.1, the data service provider SP are carried out according to the dense degree of query object to the region on map
Piecemeal, and each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is designated as Di, and by i-th of piecemeal Di
Interior all query objects are designated as Mi, i=1,2 ..., n;
Step 2.2, the data service provider SP generate i-th of subregion DiSymmetric key ki;
Step 2.3, the data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo the inquiry
Object MiAES encryption is carried out, forms ciphertext E (ki,Mi) after send Cloud Server CS storage to, and the ciphertext E is disclosed
(ki,Mi);
The public key pk of step 3, the data service provider SP in the systematic parameter, utilizes Paillier homomorphisms
AES is to i-th of piecemeal DiSymmetric key kiImplement encryption, form ciphertext Epk(ki) after send the Cloud Server CS to
Storage, and the ciphertext E is disclosedpk(ki);
Step 4, any one the described positions of mobile subscriber U according to present position and each piecemeal on map
Confirm the piecemeal D where self-positionj, and place piecemeal D is obtained at the Cloud Server CSjInterior query object MiCiphertext E
(kj,Mj) and place piecemeal DjSymmetric key kjCiphertext Epk(kj);
Step 5, any one described mobile subscriber U randomly generate a random number sj, and it is same using the Paillier
State AES is to the random number sjIt is encrypted, then by the random number sjCiphertext E after encryptionpk(sj) and it is described symmetrical
Key kjCiphertext Epk(kj) carry out homomorphism multiply processing, obtain blinding result cj=Epk(sj)·Epk(kj), so as to realize to described
Symmetric key kjBlind;The mobile subscriber U blinds result c by describedjIssue the data service provider SP;
Step 6, the data service provider SP blind result c using own private key sk to describedjIt is decrypted, obtains
Blind plaintext yj;Again plaintext y is blinded by describedjSend the mobile subscriber U to;
Step 7, any mobile subscriber U are according to the random number sjAnd described blind plaintext yjBlind processing is carried out, is obtained
To symmetric key kj=yj-sj;And according to the symmetric key kj, using AES decipherment algorithms to the ciphertext E (kj,Mj) carry out
Decryption, subregion D where obtainingjInterior query object Mj, so as to according to the query object MjObtain and self-position minimum distance
Query Result.
Compared with the prior art, beneficial effects of the present invention are embodied in:
1st, the query object in each piecemeal is encrypted with symmetric encipherment algorithm by the present invention, so as to ensure that each piecemeal
The privacy of interior query object, and because symmetric cryptography compares public key cryptography faster, so as to improve enciphering rate;
2nd, present invention introduces Cloud Server, the ciphertext storage after encryption is arrived Cloud Server by data, services business, so as to effectively
Ground reduces the storage cost of data service provider;
3rd, present invention introduces Cloud Server and homomorphic encryption algorithm, user needs only to implement homomorphic cryptography, one
Secondary homomorphism multiplies, and once subtracts computing and can obtain corresponding Query Result, on the one hand reduces the computing cost of user, another
Side is effectively protected the location privacy of user again;
4th, the key generation in the present invention is managed independently by data service provider completely with distribution, it is not necessary to by other
KMC or believable third party, so as to reduce the cost of implementation of system, also improve the security of system.
Brief description of the drawings
Fig. 1 is the system model figure of the present invention;
Fig. 2 is the zoning plan of the present invention, each piecemeal D in figureiCorresponding query object is Mi;
The Cloud Server that Fig. 3 is the present invention stores ciphertext graph.
Embodiment
Technical solution of the present invention is described in detail below, but protection scope of the present invention is not limited to embodiment.
In the present embodiment, as shown in figure 1, a kind of location privacy querying method based on homomorphic cryptography is to be applied to several
In the mobile internet environment that mobile subscriber, a data service provider and a Cloud Server are formed, it is specific real
Body Model is as shown in Figure 1:1. mobile subscriber U.Service request is proposed to data, services business according to the location of oneself;2. data
Service provider SP.Data owner, it is responsible for receiving mobile subscriber U service request and making correspondingly responding, the mechanism half
It is credible.3. Cloud Server CS.Data service provider SP can be stored data on CS by way of paying, Cloud Server CS
The ciphertext of upper storage is full disclosure, and the mechanism half is credible.The location privacy protection method is to carry out in accordance with the following steps:
Step 1, data service provider SP generations and public address system parameter;
1. data service provider SP will be divided into the group of equal length in plain text, every group of length is 128, and the key of selection is grown
Spend for 128;
2. data service provider SP randomly selects two prime number ps and q, and meets gcd (pq, (p-1) (q-1))=1;
3. calculate N=pq and Edward Carmichael function lambda=λ (N)=lcm (p-1, q-1);
4. data service provider SP selects a random numberAnd meet u=(L (gλmodN2))-1ModN,
Wherein defined function L isPublic key pk=(N, g), private key sk=lcm (p-1, q-1);
5. disclosing the key length and block length of AES encryption algorithm, the public key of Paillier AESs is disclosed in addition
{N,g}。
Step 2, data service provider SP generate the ciphertext corresponding to the query object in different piecemeals;
Step 2.1, data service provider SP carry out piecemeal according to the dense degree of query object to the region on map,
And each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is designated as Di, and by i-th of piecemeal DiInterior institute
There is query object to be designated as Mi, i=1,2 ..., n;
(2.1.1) as shown in Fig. 2 data service provider SP according to the dense degree of query object to the region on map
Piecemeal is carried out, the region division is more concentrated into the piecemeal to differ in size, query object, then the piecemeal is smaller, otherwise piecemeal is got over
Greatly, and by each piecemeal it is labeled as Di(i=1,2 ..., n), the query object in each piecemeal is not more than 10.
(2.1.2) data service provider SP is by each piecemeal DiCorresponding query object total abstract is labeled as Mi(i=1,
2,...,n)。
Step 2.2, data service provider SP generate i-th of subregion DiSymmetric key ki;
Step 2.3, data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo query object MiCarry out AES
Encryption, form ciphertext E (ki,Mi) after send Cloud Server CS storages, and open ciphertext E (k toi,Mi)。
(2.3.1) AES encryption process, a state array will be copied into plain text, carry out a wheel initial transformation.Then enter
In nine capable wheel changes, each round is carried out according to the order of byte substitution, row displacement, row mixing and InvAddRoundKey, last
In one round transformation, byte substitution, row displacement, InvAddRoundKey are only carried out.
(2.3.2) is as shown in figure 3, Cloud Server CS stores ciphertext E (k by one piece of continuous region is distributedi,Mi), due to
Each piecemeal it is of different sizes, institute for store ciphertext E (ki,Mi) area size it is also variant.
The public key pk of step 3, data service provider SP in systematic parameter, utilizes Paillier homomorphic encryption algorithms
To i-th of piecemeal DiSymmetric key kiImplement encryption, form ciphertext Epk(ki) after send Cloud Server CS storages to, and openly
Ciphertext Epk(ki);
Data service provider SP selects a random numberTo symmetric key kiIt is encrypted, it is specific encrypted
Journey is as follows:Data service provider SP is by ciphertext Epk(ki) store and arrive Cloud Server CS, this makes
Data service provider SP is obtained not have to preserve substantial amounts of symmetrical key ki。
Step 4, any one location confirmations of mobile subscriber U according to present position and each piecemeal on map
Piecemeal D where self-positionj, and place piecemeal D is obtained at Cloud Server CSjInterior query object MiCiphertext E (kj,Mj) with
Place piecemeal DjSymmetric key kjCiphertext Epk(kj);
Step 5, any one mobile subscriber U randomly generate a random number sj, and calculated using Paillier homomorphic cryptographies
Method is to random number sjIt is encrypted, then by random number sjCiphertext E after encryptionpk(sj) and symmetric key kjCiphertext Epk(kj) enter
Row homomorphism multiplies processing, obtains blinding result cj=Epk(sj)·Epk(kj), so as to realize to symmetric key kjBlind;It is mobile to use
Family U will blind result cjIssue data service provider SP;
Any mobile subscriber U randomly generates a random numberAny mobile subscriber U is used in systematic parameter
Public key pk encrypted random numbers sj, specific ciphering process is as follows:Again by the random number after encryption
sjWith symmetric key kjCarry out homomorphism and multiply processing, homomorphism multiplies comprising the following steps that for processing:
Step 6, data service provider SP are using own private key sk to blinding result cjIt is decrypted, obtains blinding in plain text
yj;Plaintext y will be blinded againjSend mobile subscriber U to;
Data service provider SP is with the private key sk of itself to cjIt is decrypted, specifically decrypting process is as follows:The result after decryption is sent to any mobile subscriber U again.
Step 7, any mobile subscriber U are according to random number sjAnd blind plaintext yjBlind processing is carried out, obtains symmetric key kj
=yj-sj;And according to symmetric key kj, using AES decipherment algorithms to ciphertext E (kj,Mj) be decrypted, subregion D where obtainingjIt is interior
Query object Mj, so as to according to query object MjObtain the Query Result with self-position minimum distance.
AES decrypting processes, ciphertext is copied into a state array, carries out initial transformation.Then the nine wheel changes carried out
In, the order that each round replaces according to the displacement of reverse row, reverse byte, InvAddRoundKey and reverse row mix is carried out, last
In one round transformation, reverse row displacement is only carried out, reverse byte replaces and InvAddRoundKey.
The present invention is stored in each piecemeal of Cloud Server with AES symmetric encipherment algorithm encrypted data services provider SP
Query object, so as to ensure that the security of the query object of each piecemeal.Any mobile subscriber U is sent to data service provider
Blinding for SP contains k in ciphertextjAnd sjThe two unknown numbers, although data service provider SP can decrypt the ciphertext, obtain
Simply blind in plain text, any mobile subscriber U particular location can not be obtained.
Claims (1)
1. a kind of location privacy querying method based on homomorphic cryptography, it is applied to several mobile subscribers, a data, services
In the mobile internet environment that provider and a Cloud Server are formed, the mobile internet environment is located at same area
In domain, remember any one mobile subscriber be U, data service provider SP, Cloud Server CS;It is characterized in that the position
Method for secret protection is to carry out in accordance with the following steps:
Step 1, data service provider SP generations and public address system parameter;
Step 2, the data service provider SP generate the ciphertext corresponding to the query object in different piecemeals;
Step 2.1, the data service provider SP carry out piecemeal according to the dense degree of query object to the region on map,
And each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is designated as Di, and by i-th of piecemeal DiInterior institute
There is query object to be designated as Mi, i=1,2 ..., n;
Step 2.2, the data service provider SP generate i-th of subregion DiSymmetric key ki;
Step 2.3, the data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo the query object
MiAES encryption is carried out, forms ciphertext E (ki,Mi) after send Cloud Server CS storage to, and the ciphertext E (k are disclosedi,
Mi);
The public key pk of step 3, the data service provider SP in the systematic parameter, utilizes Paillier homomorphic cryptographies
Algorithm is to i-th of piecemeal DiSymmetric key kiImplement encryption, form ciphertext Epk(ki) after send the Cloud Server CS to and deposit
Storage, and the ciphertext E is disclosedpk(ki);
Step 4, any one the described location confirmations of mobile subscriber U according to present position and each piecemeal on map
Piecemeal D where self-positionj, and place piecemeal D is obtained at the Cloud Server CSjInterior query object MiCiphertext E (kj,
Mj) and place piecemeal DjSymmetric key kjCiphertext Epk(kj);
Step 5, any one described mobile subscriber U randomly generate a random number sj, and utilize the Paillier homomorphic cryptographies
Algorithm is to the random number sjIt is encrypted, then by the random number sjCiphertext E after encryptionpk(sj) and the symmetric key kj
Ciphertext Epk(kj) carry out homomorphism multiply processing, obtain blinding result cj=Epk(sj)·Epk(kj), so as to realize to described symmetrical
Key kjBlind;The mobile subscriber U blinds result c by describedjIssue the data service provider SP;
Step 6, the data service provider SP blind result c using own private key sk to describedjIt is decrypted, is blinded
Plaintext yj;Again plaintext y is blinded by describedjSend the mobile subscriber U to;
Step 7, any mobile subscriber U are according to the random number sjAnd described blind plaintext yjBlind processing is carried out, is obtained pair
Claim key kj=yj-sj;And according to the symmetric key kj, using AES decipherment algorithms to the ciphertext E (kj,Mj) be decrypted,
Subregion D where obtainingjInterior query object Mj, so as to according to the query object MjAcquisition is looked into self-position minimum distance
Ask result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711282361.XA CN107749865B (en) | 2017-12-07 | 2017-12-07 | Location privacy query method based on homomorphic encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711282361.XA CN107749865B (en) | 2017-12-07 | 2017-12-07 | Location privacy query method based on homomorphic encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107749865A true CN107749865A (en) | 2018-03-02 |
CN107749865B CN107749865B (en) | 2019-11-15 |
Family
ID=61250376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711282361.XA Active CN107749865B (en) | 2017-12-07 | 2017-12-07 | Location privacy query method based on homomorphic encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107749865B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650675A (en) * | 2018-04-23 | 2018-10-12 | 许昌学院 | A kind of location privacy protection system of the Homomorphic Encryption Scheme based on big data |
CN108769056A (en) * | 2018-06-15 | 2018-11-06 | 中国人民解放军战略支援部队信息工程大学 | A kind of single-point logging method, apparatus and system |
CN109151715A (en) * | 2018-09-05 | 2019-01-04 | 重庆理工大学 | A kind of being closely located to property detection method for secret protection based on polygon range |
CN109284627A (en) * | 2018-09-10 | 2019-01-29 | 中山大学 | A kind of reference prestige method and device based on block chain intelligence contract |
CN109299149A (en) * | 2018-10-09 | 2019-02-01 | 北京腾云天下科技有限公司 | Data query method calculates equipment and system |
CN109985386A (en) * | 2019-03-08 | 2019-07-09 | 珠海天燕科技有限公司 | A kind of method and apparatus generating map |
CN110162999A (en) * | 2019-05-08 | 2019-08-23 | 湖北工业大学 | A kind of income distribution difference Gini coefficient measure based on secret protection |
CN110622165A (en) * | 2018-04-19 | 2019-12-27 | 谷歌有限责任公司 | Security measures for determining privacy set intersections |
CN110895611A (en) * | 2019-11-26 | 2020-03-20 | 支付宝(杭州)信息技术有限公司 | Data query method, device, equipment and system based on privacy information protection |
CN111083631A (en) * | 2019-12-02 | 2020-04-28 | 兰州交通大学 | Efficient query processing method for protecting location privacy and query privacy |
CN111563267A (en) * | 2020-05-08 | 2020-08-21 | 京东数字科技控股有限公司 | Method and device for processing federal characteristic engineering data |
CN111683071A (en) * | 2020-05-29 | 2020-09-18 | 百度在线网络技术(北京)有限公司 | Private data processing method, device, equipment and storage medium of block chain |
CN111814076A (en) * | 2020-06-12 | 2020-10-23 | 西安热工研究院有限公司 | Power station position mark query method, system, equipment and readable storage medium |
CN113141246A (en) * | 2021-03-08 | 2021-07-20 | 江苏大学 | System design and implementation method for homomorphic encryption in student mental health investigation |
CN113505390A (en) * | 2021-07-12 | 2021-10-15 | 东莞理工学院 | Cross-service provider epidemic situation data comparison method based on homomorphic encryption |
CN116708040A (en) * | 2023-08-07 | 2023-09-05 | 成都墨甲信息科技有限公司 | Data security management and control method and system based on symmetric homomorphic encryption |
CN118643538A (en) * | 2024-08-14 | 2024-09-13 | 山东浪潮科学研究院有限公司 | Position data protection method and system based on searchable encryption |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120106738A1 (en) * | 2010-11-01 | 2012-05-03 | Microsoft Corporation | Location brokering for providing security, privacy and services |
US20140090023A1 (en) * | 2012-09-27 | 2014-03-27 | Hong Kong Baptist University | Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy |
CN105848139A (en) * | 2016-03-17 | 2016-08-10 | 安徽大学 | Privacy protection query processing method based on position and oriented to mobile cloud platform |
CN106792501A (en) * | 2016-11-17 | 2017-05-31 | 广东工业大学 | A kind of LBS customer locations and privacy of identities guard method |
CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | Location privacy protection method based on cloud server |
-
2017
- 2017-12-07 CN CN201711282361.XA patent/CN107749865B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120106738A1 (en) * | 2010-11-01 | 2012-05-03 | Microsoft Corporation | Location brokering for providing security, privacy and services |
US20140090023A1 (en) * | 2012-09-27 | 2014-03-27 | Hong Kong Baptist University | Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy |
CN105848139A (en) * | 2016-03-17 | 2016-08-10 | 安徽大学 | Privacy protection query processing method based on position and oriented to mobile cloud platform |
CN106792501A (en) * | 2016-11-17 | 2017-05-31 | 广东工业大学 | A kind of LBS customer locations and privacy of identities guard method |
CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | Location privacy protection method based on cloud server |
Non-Patent Citations (2)
Title |
---|
王家礼 等: "面向云环境的高效匿名认证系统的设计与实现", 《电脑知识与技术》 * |
裴媛媛 等: "面向位置服务的用户隐私保护", 《计算机工程》 * |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110622165B (en) * | 2018-04-19 | 2023-05-30 | 谷歌有限责任公司 | Security measures for determining privacy set intersections |
CN110622165A (en) * | 2018-04-19 | 2019-12-27 | 谷歌有限责任公司 | Security measures for determining privacy set intersections |
CN108650675A (en) * | 2018-04-23 | 2018-10-12 | 许昌学院 | A kind of location privacy protection system of the Homomorphic Encryption Scheme based on big data |
CN108769056B (en) * | 2018-06-15 | 2021-03-23 | 中国人民解放军战略支援部队信息工程大学 | Single sign-on method, device and system |
CN108769056A (en) * | 2018-06-15 | 2018-11-06 | 中国人民解放军战略支援部队信息工程大学 | A kind of single-point logging method, apparatus and system |
CN109151715A (en) * | 2018-09-05 | 2019-01-04 | 重庆理工大学 | A kind of being closely located to property detection method for secret protection based on polygon range |
CN109151715B (en) * | 2018-09-05 | 2020-07-14 | 重庆理工大学 | Position proximity detection privacy protection method based on polygon range |
CN109284627A (en) * | 2018-09-10 | 2019-01-29 | 中山大学 | A kind of reference prestige method and device based on block chain intelligence contract |
CN109284627B (en) * | 2018-09-10 | 2022-02-08 | 中山大学 | Credit credit method and device based on block chain intelligent contract |
CN109299149A (en) * | 2018-10-09 | 2019-02-01 | 北京腾云天下科技有限公司 | Data query method calculates equipment and system |
CN109985386A (en) * | 2019-03-08 | 2019-07-09 | 珠海天燕科技有限公司 | A kind of method and apparatus generating map |
CN110162999B (en) * | 2019-05-08 | 2022-06-07 | 湖北工业大学 | Income distribution difference kini coefficient measurement method based on privacy protection |
CN110162999A (en) * | 2019-05-08 | 2019-08-23 | 湖北工业大学 | A kind of income distribution difference Gini coefficient measure based on secret protection |
CN110895611A (en) * | 2019-11-26 | 2020-03-20 | 支付宝(杭州)信息技术有限公司 | Data query method, device, equipment and system based on privacy information protection |
CN111083631A (en) * | 2019-12-02 | 2020-04-28 | 兰州交通大学 | Efficient query processing method for protecting location privacy and query privacy |
CN111563267A (en) * | 2020-05-08 | 2020-08-21 | 京东数字科技控股有限公司 | Method and device for processing federal characteristic engineering data |
CN111563267B (en) * | 2020-05-08 | 2024-04-05 | 京东科技控股股份有限公司 | Method and apparatus for federal feature engineering data processing |
US11665000B2 (en) | 2020-05-29 | 2023-05-30 | Baidu Online Network Technology (Beijing) Co., Ltd. | Method and apparatus for processing privacy data of block chain, device, and storage medium |
CN111683071A (en) * | 2020-05-29 | 2020-09-18 | 百度在线网络技术(北京)有限公司 | Private data processing method, device, equipment and storage medium of block chain |
CN111683071B (en) * | 2020-05-29 | 2023-02-28 | 百度在线网络技术(北京)有限公司 | Private data processing method, device, equipment and storage medium of block chain |
CN111814076B (en) * | 2020-06-12 | 2023-04-07 | 西安热工研究院有限公司 | Power station position mark query method, system, equipment and readable storage medium |
CN111814076A (en) * | 2020-06-12 | 2020-10-23 | 西安热工研究院有限公司 | Power station position mark query method, system, equipment and readable storage medium |
CN113141246A (en) * | 2021-03-08 | 2021-07-20 | 江苏大学 | System design and implementation method for homomorphic encryption in student mental health investigation |
CN113505390A (en) * | 2021-07-12 | 2021-10-15 | 东莞理工学院 | Cross-service provider epidemic situation data comparison method based on homomorphic encryption |
CN116708040A (en) * | 2023-08-07 | 2023-09-05 | 成都墨甲信息科技有限公司 | Data security management and control method and system based on symmetric homomorphic encryption |
CN116708040B (en) * | 2023-08-07 | 2023-10-24 | 成都墨甲信息科技有限公司 | Data security management and control method and system based on symmetric homomorphic encryption |
CN118643538A (en) * | 2024-08-14 | 2024-09-13 | 山东浪潮科学研究院有限公司 | Position data protection method and system based on searchable encryption |
Also Published As
Publication number | Publication date |
---|---|
CN107749865B (en) | 2019-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107749865B (en) | Location privacy query method based on homomorphic encryption | |
KR102717212B1 (en) | Secure, multi-agency, loss-proof storage and transfer of cryptographic keys for blockchain-based systems linked to wallet management systems | |
CN107347096B (en) | Location privacy protection method based on cloud server | |
CN103414682B (en) | The method for cloud storage of a kind of data and system | |
Xu et al. | Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage | |
KR20190073472A (en) | Method, apparatus and system for transmitting data | |
CN105610793A (en) | Outsourced data encrypted storage and cryptograph query system and application method therefor | |
CN104113408A (en) | Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption | |
EP3375129A1 (en) | Method for re-keying an encrypted data file | |
CN104022868A (en) | Outsourcing decryption method of attribute-based encryption based on ciphertext policy | |
CN108090370B (en) | Instant communication encryption method and system based on index | |
CN111277412B (en) | Data security sharing system and method based on block chain key distribution | |
WO2017061950A1 (en) | Data security system and method for operation thereof | |
JP2016158189A (en) | Change direction with key control system and change direction with key control method | |
Ming et al. | Efficient revocable multi-authority attribute-based encryption for cloud storage | |
CN110519226B (en) | Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate | |
CN104993931A (en) | Multi-user encrypted search method in cloud storage | |
CN107086912B (en) | Ciphertext conversion method, decryption method and system in heterogeneous storage system | |
Chatterjee et al. | Cryptography in cloud computing: a basic approach to ensure security in cloud | |
CN101710879A (en) | Novel identity-based privacy enhanced mail forwarding system | |
Mishra et al. | A compendium over cloud computing cryptographic algorithms and security issues | |
CN111639345A (en) | Secure multi-party cloud computing method and system based on homomorphic encryption | |
CN111555861B (en) | Circular range query method and system in cloud environment based on position privacy protection | |
CN109120399A (en) | A kind of data ciphering method based on asymmetric encryption, decryption method and system | |
Lv et al. | A secure and efficient revocation scheme for fine-grained access control in cloud storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200907 Address after: 230088 14th floor, building 1, Tianyuan dike science and Technology Park, 66 Yunfei Road, high tech Zone, Hefei City, Anhui Province Patentee after: Anhui Dike Digital Gold Technology Co.,Ltd. Address before: 230601 No. 111 Jiulong Road, Hefei, Anhui Patentee before: ANHUI University |