CN107749865A - Location privacy query method based on homomorphic encryption - Google Patents

Location privacy query method based on homomorphic encryption Download PDF

Info

Publication number
CN107749865A
CN107749865A CN201711282361.XA CN201711282361A CN107749865A CN 107749865 A CN107749865 A CN 107749865A CN 201711282361 A CN201711282361 A CN 201711282361A CN 107749865 A CN107749865 A CN 107749865A
Authority
CN
China
Prior art keywords
ciphertext
service provider
data service
piecemeal
query object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711282361.XA
Other languages
Chinese (zh)
Other versions
CN107749865B (en
Inventor
石润华
王圣兰
李莉
王晴
张顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Dike Digital Gold Technology Co ltd
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN201711282361.XA priority Critical patent/CN107749865B/en
Publication of CN107749865A publication Critical patent/CN107749865A/en
Application granted granted Critical
Publication of CN107749865B publication Critical patent/CN107749865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a location privacy query method based on homomorphic encryption, which comprises a cloud server, a data service provider and a plurality of mobile users; the data service provider SP divides the area on the map into blocks according to the density of the query object, then encrypts the query object in each block by using a symmetric encryption algorithm, encrypts each symmetric key by using a homomorphic encryption algorithm, finally stores all ciphertext into a cloud server, and secretly stores a homomorphic encrypted private key; the user downloads the ciphertext of the query object and the corresponding symmetric key ciphertext from the cloud server according to the position of the user, and then performs blinding processing on the symmetric key ciphertext and transmits the symmetric key ciphertext to a data service provider; and the data service provider transmits the decrypted blinded plaintext to the user, and the final user decrypts the corresponding query object to obtain a final query result. The position information of the user can not be revealed in the whole process, so that the position privacy is protected.

Description

A kind of location privacy querying method based on homomorphic cryptography
Technical field
It is specifically a kind of to be applied to mobile interchange the present invention relates to data encryption and location privacy protection technical field The querying method of location of mobile users privacy is protected in network.
Background technology
In the utilization of mobile Internet, location Based service to life and the work of people bring it is huge just Profit, while the leakage of positional information of mobile subscriber may also be caused, so as to bring huge potential safety hazard.Therefore with LBS's Extensive use, the protection to mobile subscriber's privacy are essential.
At present, conventional location privacy protection method has assumed name anonymity, position k anonymities, space anonymity etc..
(1) assumed name anonymity refers to by the position of an assumed name user to hide the actual position of real user, the inquiry The degree of accuracy determines that this will reduce the degree of accuracy of inquiry, together by the position of assumed name user and the distance of position of real user When be also possible to cause the leakage of user profile.
(2) k anonymities in position refer mainly to some band of position at least k user, and this k user can not pass through identity Distinguished, so even if attacker obtains the positional information of some user, also can not accurately be looked for from this k user Go out real user.When k values are bigger, the information of user is less susceptible to compromised, but communication overhead can be caused to become big.
(3) for the anonymous mainly user in space when sending request, the position for being sent to server becomes the point by some point Some region at place.It is inaccurate due to positional information, it will to reduce the degree of accuracy of inquiry.
In summary, existing location privacy protection also has the following disadvantages:
1st, the position that mobile subscriber is sent to data, services business in existing location privacy protection is some region so that logical Believe that expense becomes big.
2nd, third party's generation and management key are introduced in existing location privacy protection, the part of mobile subscriber may be caused Privacy leakage.
3rd, metadata provider needs to store substantial amounts of data in existing location privacy protection.
4th, the exact value of oneself position can't be sent to data, services business by mobile subscriber in existing location privacy, this The degree of accuracy of inquiry will be reduced.
The content of the invention
The present invention, with reference to symmetric encipherment algorithm and the thought of homomorphic encryption algorithm, proposes that one kind is based on by Cloud Server The location privacy querying method of homomorphic cryptography, is asked to efficiently solve based on the location privacy protection in location-based service Topic, while data service provider SP storage cost and communication cost are reduced, so as to while customer location privacy is ensured Reduce overhead.
The present invention adopts the following technical scheme that to solve technical problem:
A kind of location privacy querying method based on homomorphic cryptography of the present invention, be applied to several mobile subscribers, one In the mobile internet environment that data service provider and a Cloud Server are formed, the mobile internet environment is located at In same region, remember any one mobile subscriber be U, data service provider SP, Cloud Server CS;It is characterized in, The location privacy protection method is to carry out in accordance with the following steps:
Step 1, data service provider SP generations and public address system parameter;
Step 2, the data service provider SP generate the ciphertext corresponding to the query object in different piecemeals;
Step 2.1, the data service provider SP are carried out according to the dense degree of query object to the region on map Piecemeal, and each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is designated as Di, and by i-th of piecemeal Di Interior all query objects are designated as Mi, i=1,2 ..., n;
Step 2.2, the data service provider SP generate i-th of subregion DiSymmetric key ki
Step 2.3, the data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo the inquiry Object MiAES encryption is carried out, forms ciphertext E (ki,Mi) after send Cloud Server CS storage to, and the ciphertext E is disclosed (ki,Mi);
The public key pk of step 3, the data service provider SP in the systematic parameter, utilizes Paillier homomorphisms AES is to i-th of piecemeal DiSymmetric key kiImplement encryption, form ciphertext Epk(ki) after send the Cloud Server CS to Storage, and the ciphertext E is disclosedpk(ki);
Step 4, any one the described positions of mobile subscriber U according to present position and each piecemeal on map Confirm the piecemeal D where self-positionj, and place piecemeal D is obtained at the Cloud Server CSjInterior query object MiCiphertext E (kj,Mj) and place piecemeal DjSymmetric key kjCiphertext Epk(kj);
Step 5, any one described mobile subscriber U randomly generate a random number sj, and it is same using the Paillier State AES is to the random number sjIt is encrypted, then by the random number sjCiphertext E after encryptionpk(sj) and it is described symmetrical Key kjCiphertext Epk(kj) carry out homomorphism multiply processing, obtain blinding result cj=Epk(sj)·Epk(kj), so as to realize to described Symmetric key kjBlind;The mobile subscriber U blinds result c by describedjIssue the data service provider SP;
Step 6, the data service provider SP blind result c using own private key sk to describedjIt is decrypted, obtains Blind plaintext yj;Again plaintext y is blinded by describedjSend the mobile subscriber U to;
Step 7, any mobile subscriber U are according to the random number sjAnd described blind plaintext yjBlind processing is carried out, is obtained To symmetric key kj=yj-sj;And according to the symmetric key kj, using AES decipherment algorithms to the ciphertext E (kj,Mj) carry out Decryption, subregion D where obtainingjInterior query object Mj, so as to according to the query object MjObtain and self-position minimum distance Query Result.
Compared with the prior art, beneficial effects of the present invention are embodied in:
1st, the query object in each piecemeal is encrypted with symmetric encipherment algorithm by the present invention, so as to ensure that each piecemeal The privacy of interior query object, and because symmetric cryptography compares public key cryptography faster, so as to improve enciphering rate;
2nd, present invention introduces Cloud Server, the ciphertext storage after encryption is arrived Cloud Server by data, services business, so as to effectively Ground reduces the storage cost of data service provider;
3rd, present invention introduces Cloud Server and homomorphic encryption algorithm, user needs only to implement homomorphic cryptography, one Secondary homomorphism multiplies, and once subtracts computing and can obtain corresponding Query Result, on the one hand reduces the computing cost of user, another Side is effectively protected the location privacy of user again;
4th, the key generation in the present invention is managed independently by data service provider completely with distribution, it is not necessary to by other KMC or believable third party, so as to reduce the cost of implementation of system, also improve the security of system.
Brief description of the drawings
Fig. 1 is the system model figure of the present invention;
Fig. 2 is the zoning plan of the present invention, each piecemeal D in figureiCorresponding query object is Mi
The Cloud Server that Fig. 3 is the present invention stores ciphertext graph.
Embodiment
Technical solution of the present invention is described in detail below, but protection scope of the present invention is not limited to embodiment.
In the present embodiment, as shown in figure 1, a kind of location privacy querying method based on homomorphic cryptography is to be applied to several In the mobile internet environment that mobile subscriber, a data service provider and a Cloud Server are formed, it is specific real Body Model is as shown in Figure 1:1. mobile subscriber U.Service request is proposed to data, services business according to the location of oneself;2. data Service provider SP.Data owner, it is responsible for receiving mobile subscriber U service request and making correspondingly responding, the mechanism half It is credible.3. Cloud Server CS.Data service provider SP can be stored data on CS by way of paying, Cloud Server CS The ciphertext of upper storage is full disclosure, and the mechanism half is credible.The location privacy protection method is to carry out in accordance with the following steps:
Step 1, data service provider SP generations and public address system parameter;
1. data service provider SP will be divided into the group of equal length in plain text, every group of length is 128, and the key of selection is grown Spend for 128;
2. data service provider SP randomly selects two prime number ps and q, and meets gcd (pq, (p-1) (q-1))=1;
3. calculate N=pq and Edward Carmichael function lambda=λ (N)=lcm (p-1, q-1);
4. data service provider SP selects a random numberAnd meet u=(L (gλmodN2))-1ModN, Wherein defined function L isPublic key pk=(N, g), private key sk=lcm (p-1, q-1);
5. disclosing the key length and block length of AES encryption algorithm, the public key of Paillier AESs is disclosed in addition {N,g}。
Step 2, data service provider SP generate the ciphertext corresponding to the query object in different piecemeals;
Step 2.1, data service provider SP carry out piecemeal according to the dense degree of query object to the region on map, And each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is designated as Di, and by i-th of piecemeal DiInterior institute There is query object to be designated as Mi, i=1,2 ..., n;
(2.1.1) as shown in Fig. 2 data service provider SP according to the dense degree of query object to the region on map Piecemeal is carried out, the region division is more concentrated into the piecemeal to differ in size, query object, then the piecemeal is smaller, otherwise piecemeal is got over Greatly, and by each piecemeal it is labeled as Di(i=1,2 ..., n), the query object in each piecemeal is not more than 10.
(2.1.2) data service provider SP is by each piecemeal DiCorresponding query object total abstract is labeled as Mi(i=1, 2,...,n)。
Step 2.2, data service provider SP generate i-th of subregion DiSymmetric key ki
Step 2.3, data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo query object MiCarry out AES Encryption, form ciphertext E (ki,Mi) after send Cloud Server CS storages, and open ciphertext E (k toi,Mi)。
(2.3.1) AES encryption process, a state array will be copied into plain text, carry out a wheel initial transformation.Then enter In nine capable wheel changes, each round is carried out according to the order of byte substitution, row displacement, row mixing and InvAddRoundKey, last In one round transformation, byte substitution, row displacement, InvAddRoundKey are only carried out.
(2.3.2) is as shown in figure 3, Cloud Server CS stores ciphertext E (k by one piece of continuous region is distributedi,Mi), due to Each piecemeal it is of different sizes, institute for store ciphertext E (ki,Mi) area size it is also variant.
The public key pk of step 3, data service provider SP in systematic parameter, utilizes Paillier homomorphic encryption algorithms To i-th of piecemeal DiSymmetric key kiImplement encryption, form ciphertext Epk(ki) after send Cloud Server CS storages to, and openly Ciphertext Epk(ki);
Data service provider SP selects a random numberTo symmetric key kiIt is encrypted, it is specific encrypted Journey is as follows:Data service provider SP is by ciphertext Epk(ki) store and arrive Cloud Server CS, this makes Data service provider SP is obtained not have to preserve substantial amounts of symmetrical key ki
Step 4, any one location confirmations of mobile subscriber U according to present position and each piecemeal on map Piecemeal D where self-positionj, and place piecemeal D is obtained at Cloud Server CSjInterior query object MiCiphertext E (kj,Mj) with Place piecemeal DjSymmetric key kjCiphertext Epk(kj);
Step 5, any one mobile subscriber U randomly generate a random number sj, and calculated using Paillier homomorphic cryptographies Method is to random number sjIt is encrypted, then by random number sjCiphertext E after encryptionpk(sj) and symmetric key kjCiphertext Epk(kj) enter Row homomorphism multiplies processing, obtains blinding result cj=Epk(sj)·Epk(kj), so as to realize to symmetric key kjBlind;It is mobile to use Family U will blind result cjIssue data service provider SP;
Any mobile subscriber U randomly generates a random numberAny mobile subscriber U is used in systematic parameter Public key pk encrypted random numbers sj, specific ciphering process is as follows:Again by the random number after encryption sjWith symmetric key kjCarry out homomorphism and multiply processing, homomorphism multiplies comprising the following steps that for processing:
Step 6, data service provider SP are using own private key sk to blinding result cjIt is decrypted, obtains blinding in plain text yj;Plaintext y will be blinded againjSend mobile subscriber U to;
Data service provider SP is with the private key sk of itself to cjIt is decrypted, specifically decrypting process is as follows:The result after decryption is sent to any mobile subscriber U again.
Step 7, any mobile subscriber U are according to random number sjAnd blind plaintext yjBlind processing is carried out, obtains symmetric key kj =yj-sj;And according to symmetric key kj, using AES decipherment algorithms to ciphertext E (kj,Mj) be decrypted, subregion D where obtainingjIt is interior Query object Mj, so as to according to query object MjObtain the Query Result with self-position minimum distance.
AES decrypting processes, ciphertext is copied into a state array, carries out initial transformation.Then the nine wheel changes carried out In, the order that each round replaces according to the displacement of reverse row, reverse byte, InvAddRoundKey and reverse row mix is carried out, last In one round transformation, reverse row displacement is only carried out, reverse byte replaces and InvAddRoundKey.
The present invention is stored in each piecemeal of Cloud Server with AES symmetric encipherment algorithm encrypted data services provider SP Query object, so as to ensure that the security of the query object of each piecemeal.Any mobile subscriber U is sent to data service provider Blinding for SP contains k in ciphertextjAnd sjThe two unknown numbers, although data service provider SP can decrypt the ciphertext, obtain Simply blind in plain text, any mobile subscriber U particular location can not be obtained.

Claims (1)

1. a kind of location privacy querying method based on homomorphic cryptography, it is applied to several mobile subscribers, a data, services In the mobile internet environment that provider and a Cloud Server are formed, the mobile internet environment is located at same area In domain, remember any one mobile subscriber be U, data service provider SP, Cloud Server CS;It is characterized in that the position Method for secret protection is to carry out in accordance with the following steps:
Step 1, data service provider SP generations and public address system parameter;
Step 2, the data service provider SP generate the ciphertext corresponding to the query object in different piecemeals;
Step 2.1, the data service provider SP carry out piecemeal according to the dense degree of query object to the region on map, And each piecemeal and its position on map are disclosed, wherein any i-th of piecemeal is designated as Di, and by i-th of piecemeal DiInterior institute There is query object to be designated as Mi, i=1,2 ..., n;
Step 2.2, the data service provider SP generate i-th of subregion DiSymmetric key ki
Step 2.3, the data service provider SP utilize i-th of piecemeal DiSymmetric key kiTo the query object MiAES encryption is carried out, forms ciphertext E (ki,Mi) after send Cloud Server CS storage to, and the ciphertext E (k are disclosedi, Mi);
The public key pk of step 3, the data service provider SP in the systematic parameter, utilizes Paillier homomorphic cryptographies Algorithm is to i-th of piecemeal DiSymmetric key kiImplement encryption, form ciphertext Epk(ki) after send the Cloud Server CS to and deposit Storage, and the ciphertext E is disclosedpk(ki);
Step 4, any one the described location confirmations of mobile subscriber U according to present position and each piecemeal on map Piecemeal D where self-positionj, and place piecemeal D is obtained at the Cloud Server CSjInterior query object MiCiphertext E (kj, Mj) and place piecemeal DjSymmetric key kjCiphertext Epk(kj);
Step 5, any one described mobile subscriber U randomly generate a random number sj, and utilize the Paillier homomorphic cryptographies Algorithm is to the random number sjIt is encrypted, then by the random number sjCiphertext E after encryptionpk(sj) and the symmetric key kj Ciphertext Epk(kj) carry out homomorphism multiply processing, obtain blinding result cj=Epk(sj)·Epk(kj), so as to realize to described symmetrical Key kjBlind;The mobile subscriber U blinds result c by describedjIssue the data service provider SP;
Step 6, the data service provider SP blind result c using own private key sk to describedjIt is decrypted, is blinded Plaintext yj;Again plaintext y is blinded by describedjSend the mobile subscriber U to;
Step 7, any mobile subscriber U are according to the random number sjAnd described blind plaintext yjBlind processing is carried out, is obtained pair Claim key kj=yj-sj;And according to the symmetric key kj, using AES decipherment algorithms to the ciphertext E (kj,Mj) be decrypted, Subregion D where obtainingjInterior query object Mj, so as to according to the query object MjAcquisition is looked into self-position minimum distance Ask result.
CN201711282361.XA 2017-12-07 2017-12-07 Location privacy query method based on homomorphic encryption Active CN107749865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711282361.XA CN107749865B (en) 2017-12-07 2017-12-07 Location privacy query method based on homomorphic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711282361.XA CN107749865B (en) 2017-12-07 2017-12-07 Location privacy query method based on homomorphic encryption

Publications (2)

Publication Number Publication Date
CN107749865A true CN107749865A (en) 2018-03-02
CN107749865B CN107749865B (en) 2019-11-15

Family

ID=61250376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711282361.XA Active CN107749865B (en) 2017-12-07 2017-12-07 Location privacy query method based on homomorphic encryption

Country Status (1)

Country Link
CN (1) CN107749865B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650675A (en) * 2018-04-23 2018-10-12 许昌学院 A kind of location privacy protection system of the Homomorphic Encryption Scheme based on big data
CN108769056A (en) * 2018-06-15 2018-11-06 中国人民解放军战略支援部队信息工程大学 A kind of single-point logging method, apparatus and system
CN109151715A (en) * 2018-09-05 2019-01-04 重庆理工大学 A kind of being closely located to property detection method for secret protection based on polygon range
CN109284627A (en) * 2018-09-10 2019-01-29 中山大学 A kind of reference prestige method and device based on block chain intelligence contract
CN109299149A (en) * 2018-10-09 2019-02-01 北京腾云天下科技有限公司 Data query method calculates equipment and system
CN109985386A (en) * 2019-03-08 2019-07-09 珠海天燕科技有限公司 A kind of method and apparatus generating map
CN110162999A (en) * 2019-05-08 2019-08-23 湖北工业大学 A kind of income distribution difference Gini coefficient measure based on secret protection
CN110622165A (en) * 2018-04-19 2019-12-27 谷歌有限责任公司 Security measures for determining privacy set intersections
CN110895611A (en) * 2019-11-26 2020-03-20 支付宝(杭州)信息技术有限公司 Data query method, device, equipment and system based on privacy information protection
CN111083631A (en) * 2019-12-02 2020-04-28 兰州交通大学 Efficient query processing method for protecting location privacy and query privacy
CN111563267A (en) * 2020-05-08 2020-08-21 京东数字科技控股有限公司 Method and device for processing federal characteristic engineering data
CN111683071A (en) * 2020-05-29 2020-09-18 百度在线网络技术(北京)有限公司 Private data processing method, device, equipment and storage medium of block chain
CN111814076A (en) * 2020-06-12 2020-10-23 西安热工研究院有限公司 Power station position mark query method, system, equipment and readable storage medium
CN113141246A (en) * 2021-03-08 2021-07-20 江苏大学 System design and implementation method for homomorphic encryption in student mental health investigation
CN113505390A (en) * 2021-07-12 2021-10-15 东莞理工学院 Cross-service provider epidemic situation data comparison method based on homomorphic encryption
CN116708040A (en) * 2023-08-07 2023-09-05 成都墨甲信息科技有限公司 Data security management and control method and system based on symmetric homomorphic encryption
CN118643538A (en) * 2024-08-14 2024-09-13 山东浪潮科学研究院有限公司 Position data protection method and system based on searchable encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120106738A1 (en) * 2010-11-01 2012-05-03 Microsoft Corporation Location brokering for providing security, privacy and services
US20140090023A1 (en) * 2012-09-27 2014-03-27 Hong Kong Baptist University Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy
CN105848139A (en) * 2016-03-17 2016-08-10 安徽大学 Privacy protection query processing method based on position and oriented to mobile cloud platform
CN106792501A (en) * 2016-11-17 2017-05-31 广东工业大学 A kind of LBS customer locations and privacy of identities guard method
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 Location privacy protection method based on cloud server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120106738A1 (en) * 2010-11-01 2012-05-03 Microsoft Corporation Location brokering for providing security, privacy and services
US20140090023A1 (en) * 2012-09-27 2014-03-27 Hong Kong Baptist University Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy
CN105848139A (en) * 2016-03-17 2016-08-10 安徽大学 Privacy protection query processing method based on position and oriented to mobile cloud platform
CN106792501A (en) * 2016-11-17 2017-05-31 广东工业大学 A kind of LBS customer locations and privacy of identities guard method
CN107347096A (en) * 2017-07-07 2017-11-14 安徽大学 Location privacy protection method based on cloud server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王家礼 等: "面向云环境的高效匿名认证系统的设计与实现", 《电脑知识与技术》 *
裴媛媛 等: "面向位置服务的用户隐私保护", 《计算机工程》 *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110622165B (en) * 2018-04-19 2023-05-30 谷歌有限责任公司 Security measures for determining privacy set intersections
CN110622165A (en) * 2018-04-19 2019-12-27 谷歌有限责任公司 Security measures for determining privacy set intersections
CN108650675A (en) * 2018-04-23 2018-10-12 许昌学院 A kind of location privacy protection system of the Homomorphic Encryption Scheme based on big data
CN108769056B (en) * 2018-06-15 2021-03-23 中国人民解放军战略支援部队信息工程大学 Single sign-on method, device and system
CN108769056A (en) * 2018-06-15 2018-11-06 中国人民解放军战略支援部队信息工程大学 A kind of single-point logging method, apparatus and system
CN109151715A (en) * 2018-09-05 2019-01-04 重庆理工大学 A kind of being closely located to property detection method for secret protection based on polygon range
CN109151715B (en) * 2018-09-05 2020-07-14 重庆理工大学 Position proximity detection privacy protection method based on polygon range
CN109284627A (en) * 2018-09-10 2019-01-29 中山大学 A kind of reference prestige method and device based on block chain intelligence contract
CN109284627B (en) * 2018-09-10 2022-02-08 中山大学 Credit credit method and device based on block chain intelligent contract
CN109299149A (en) * 2018-10-09 2019-02-01 北京腾云天下科技有限公司 Data query method calculates equipment and system
CN109985386A (en) * 2019-03-08 2019-07-09 珠海天燕科技有限公司 A kind of method and apparatus generating map
CN110162999B (en) * 2019-05-08 2022-06-07 湖北工业大学 Income distribution difference kini coefficient measurement method based on privacy protection
CN110162999A (en) * 2019-05-08 2019-08-23 湖北工业大学 A kind of income distribution difference Gini coefficient measure based on secret protection
CN110895611A (en) * 2019-11-26 2020-03-20 支付宝(杭州)信息技术有限公司 Data query method, device, equipment and system based on privacy information protection
CN111083631A (en) * 2019-12-02 2020-04-28 兰州交通大学 Efficient query processing method for protecting location privacy and query privacy
CN111563267A (en) * 2020-05-08 2020-08-21 京东数字科技控股有限公司 Method and device for processing federal characteristic engineering data
CN111563267B (en) * 2020-05-08 2024-04-05 京东科技控股股份有限公司 Method and apparatus for federal feature engineering data processing
US11665000B2 (en) 2020-05-29 2023-05-30 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for processing privacy data of block chain, device, and storage medium
CN111683071A (en) * 2020-05-29 2020-09-18 百度在线网络技术(北京)有限公司 Private data processing method, device, equipment and storage medium of block chain
CN111683071B (en) * 2020-05-29 2023-02-28 百度在线网络技术(北京)有限公司 Private data processing method, device, equipment and storage medium of block chain
CN111814076B (en) * 2020-06-12 2023-04-07 西安热工研究院有限公司 Power station position mark query method, system, equipment and readable storage medium
CN111814076A (en) * 2020-06-12 2020-10-23 西安热工研究院有限公司 Power station position mark query method, system, equipment and readable storage medium
CN113141246A (en) * 2021-03-08 2021-07-20 江苏大学 System design and implementation method for homomorphic encryption in student mental health investigation
CN113505390A (en) * 2021-07-12 2021-10-15 东莞理工学院 Cross-service provider epidemic situation data comparison method based on homomorphic encryption
CN116708040A (en) * 2023-08-07 2023-09-05 成都墨甲信息科技有限公司 Data security management and control method and system based on symmetric homomorphic encryption
CN116708040B (en) * 2023-08-07 2023-10-24 成都墨甲信息科技有限公司 Data security management and control method and system based on symmetric homomorphic encryption
CN118643538A (en) * 2024-08-14 2024-09-13 山东浪潮科学研究院有限公司 Position data protection method and system based on searchable encryption

Also Published As

Publication number Publication date
CN107749865B (en) 2019-11-15

Similar Documents

Publication Publication Date Title
CN107749865B (en) Location privacy query method based on homomorphic encryption
KR102717212B1 (en) Secure, multi-agency, loss-proof storage and transfer of cryptographic keys for blockchain-based systems linked to wallet management systems
CN107347096B (en) Location privacy protection method based on cloud server
CN103414682B (en) The method for cloud storage of a kind of data and system
Xu et al. Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage
KR20190073472A (en) Method, apparatus and system for transmitting data
CN105610793A (en) Outsourced data encrypted storage and cryptograph query system and application method therefor
CN104113408A (en) Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
EP3375129A1 (en) Method for re-keying an encrypted data file
CN104022868A (en) Outsourcing decryption method of attribute-based encryption based on ciphertext policy
CN108090370B (en) Instant communication encryption method and system based on index
CN111277412B (en) Data security sharing system and method based on block chain key distribution
WO2017061950A1 (en) Data security system and method for operation thereof
JP2016158189A (en) Change direction with key control system and change direction with key control method
Ming et al. Efficient revocable multi-authority attribute-based encryption for cloud storage
CN110519226B (en) Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate
CN104993931A (en) Multi-user encrypted search method in cloud storage
CN107086912B (en) Ciphertext conversion method, decryption method and system in heterogeneous storage system
Chatterjee et al. Cryptography in cloud computing: a basic approach to ensure security in cloud
CN101710879A (en) Novel identity-based privacy enhanced mail forwarding system
Mishra et al. A compendium over cloud computing cryptographic algorithms and security issues
CN111639345A (en) Secure multi-party cloud computing method and system based on homomorphic encryption
CN111555861B (en) Circular range query method and system in cloud environment based on position privacy protection
CN109120399A (en) A kind of data ciphering method based on asymmetric encryption, decryption method and system
Lv et al. A secure and efficient revocation scheme for fine-grained access control in cloud storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200907

Address after: 230088 14th floor, building 1, Tianyuan dike science and Technology Park, 66 Yunfei Road, high tech Zone, Hefei City, Anhui Province

Patentee after: Anhui Dike Digital Gold Technology Co.,Ltd.

Address before: 230601 No. 111 Jiulong Road, Hefei, Anhui

Patentee before: ANHUI University