CN108881204A - Secret protection cluster data mining method, electronic equipment, storage medium and system - Google Patents

Secret protection cluster data mining method, electronic equipment, storage medium and system Download PDF

Info

Publication number
CN108881204A
CN108881204A CN201810589541.0A CN201810589541A CN108881204A CN 108881204 A CN108881204 A CN 108881204A CN 201810589541 A CN201810589541 A CN 201810589541A CN 108881204 A CN108881204 A CN 108881204A
Authority
CN
China
Prior art keywords
data
ciphertext
service provider
cloud service
mining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810589541.0A
Other languages
Chinese (zh)
Inventor
尚凌辉
陈鑫
叶淑阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd
Original Assignee
Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd filed Critical Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd
Priority to CN201810589541.0A priority Critical patent/CN108881204A/en
Publication of CN108881204A publication Critical patent/CN108881204A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides secret protection cluster data mining method, including step:Key is generated, high-quality base, random integers matrix, open parameter is generated, elementary transformation is carried out to high-quality base and random integers matrix, generate base inferior, be stored in local using high-quality base as private key, be committed to cloud service provider using base inferior as public key;Encryption data generates ciphertext by public key encryption plaintext multidimensional data, and ciphertext and open parameter are sent to cloud service provider;Mining data, cloud service provider call ciphertext central point computational algorithm and ciphertext to carry out data mining, returned data Result to ciphertext apart from computational algorithm;Ciphertext data is decrypted data mining results using public key and private key, generates plaintext Result.The invention further relates to a kind of electronic equipment, storage medium, secret protection cluster data mining systems.The present invention has very high safety, effectively maintains the accuracy of distance between ciphertext data.

Description

Secret protection cluster data mining method, electronic equipment, storage medium and system
Technical field
The present invention relates to data mining technology field more particularly to secret protection cluster data mining method, electronic equipment, Storage medium and system.
Background technique
With the development of cloud computing and universal, user increasingly tends to store data on cloud, rents cloud computing clothes The abundant calculating and storage resource that business center provides can provide data analysis service more efficiently, professional for user.So And cloud service provider is often not fully credible, user is while enjoying cloud computing High-effective Service, privacy of user data It is directly exposed to cloud service center, therefore, data-privacy safety problem just becomes the head that user is had to take into account that using cloud computing Want problem.Available data mining algorithm does not account for the incredible situation of cloud service provider under cloud environment and is therefore badly in need of one kind The secret protection cluster data mining method of Result accuracy can be improved under the precondition for guaranteeing privacy of user.
Summary of the invention
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide secret protection cluster data mining sides Method solves available data mining algorithm and does not account for the incredible situation of cloud service provider under cloud environment, not can guarantee use The problem of family privacy.
The present invention provides secret protection cluster data mining method, includes the following steps:
Key is generated, high-quality base, random integers matrix, open parameter are generated, to the high-quality base and the random integers Matrix carries out elementary transformation, generates base inferior, is stored in local using the high-quality base as private key, using the base inferior as public affairs Key is committed to cloud service provider;
Encryption data generates ciphertext by the public key encryption plaintext multidimensional data, by the ciphertext and the open ginseng Number is sent to the cloud service provider;
Mining data, the cloud service provider call ciphertext central point computational algorithm and ciphertext apart from computational algorithm to institute It states ciphertext and carries out data mining, returned data Result;
Ciphertext data is decrypted the data mining results using the public key and the private key, generates and digs in plain text Dig result.
Further, the step encryption data further includes being added by homomorphic cryptography to the plaintext multidimensional data It is close.
Further, the step mining data further includes the cloud service provider according to the cryptogram computation ciphertext number The distance at strong point and cluster centre point, the distance of the ciphertext data point to the cluster centre point, distance is nearest Ciphertext data point is divided into corresponding cluster.
Further, the step ciphertext data include using Babai algorithm calculate closest to the ciphertext most proximad Amount generates the plaintext Result by public key described in the nearest vector sum.
A kind of electronic equipment, including:Processor;
Memory;And program, wherein described program is stored in the memory, and is configured to by processor It executes, described program includes for executing above-mentioned secret protection cluster data mining method.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The above-mentioned secret protection cluster data mining method of row.
Secret protection cluster data mining system, including:
Generate cipher key module:For generating high-quality base, random integers matrix, open parameter, to the high-quality base and described Random integers matrix carries out elementary transformation, generates base inferior, local is stored in using the high-quality base as private key, by the poor quality Base is committed to cloud service provider as public key;
Encryption data module:For ciphertext being generated, by the ciphertext and institute by the public key encryption plaintext multidimensional data It states open parameter and is sent to the cloud service provider;
Mining data module:Ciphertext central point computational algorithm and ciphertext distance is called to calculate for the cloud service provider Algorithm carries out data mining, returned data Result to the ciphertext;
Ciphertext data module:It is raw for the data mining results to be decrypted using the public key and the private key At plaintext Result.
Further, the encryption data module further includes being added by homomorphic cryptography to the plaintext multidimensional data It is close.
Further, the mining data module further includes the cloud service provider according to the cryptogram computation ciphertext number The distance at strong point and cluster centre point, the distance of the ciphertext data point to the cluster centre point, distance is nearest Ciphertext data point is divided into corresponding cluster.
Further, the ciphertext data module include using Babai algorithm calculate closest to the ciphertext most proximad Amount generates the plaintext Result by public key described in the nearest vector sum.
Compared with prior art, the beneficial effects of the present invention are:
The present invention provides secret protection cluster data mining method, includes the following steps:Generate key, generate high-quality base, Random integers matrix, open parameter, carry out elementary transformation to high-quality base and random integers matrix, base inferior are generated, by high-quality base It is stored in local as private key, is committed to cloud service provider using base inferior as public key;Encryption data, it is bright by public key encryption Literary multidimensional data generates ciphertext, and ciphertext and open parameter are sent to cloud service provider;Mining data, cloud service provider Ciphertext central point computational algorithm and ciphertext is called to carry out data mining, returned data Result to ciphertext apart from computational algorithm; Ciphertext data is decrypted data mining results using public key and private key, generates plaintext Result.The invention further relates to one Kind electronic equipment, storage medium, secret protection cluster data mining system.The safe homomorphism that the present invention passes through building private data Operation method, and the cloud ciphertext data clusters analysis data mining service for supporting secret protection is realized on this basis; To protect user data privacy, user will be distributed to cloud service provider after data encryption, cloud service provider utilizes homomorphism Encryption Algorithm realizes secret protection, but cloud service provider can not directly access user data and destroy privacy of user;The present invention With very high safety, the accuracy of distance between ciphertext data is effectively maintained.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings. A specific embodiment of the invention is shown in detail by following embodiment and its attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is secret protection cluster data mining method flow diagram of the invention;
Fig. 2 is secret protection cluster data mining system structure diagram of the invention.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination Example.
Secret protection cluster data mining method, as shown in Figure 1, including the following steps:
Key is generated, high-quality base K is generatedpri, random integers matrix U, open parameter p, to high-quality base and random integers matrix Elementary transformation is carried out, base K inferior is generatedpub, it is stored in local using high-quality base as private key, is committed to using base inferior as public key Cloud service provider;In the present embodiment, base K inferiorpubCalculation formula is as follows:
Kpub=UKpri=w1,w2..., wn
Encryption data generates ciphertext by public key encryption plaintext multidimensional data, and ciphertext and open parameter are sent to cloud clothes Be engaged in provider;Preferably, step encryption data further includes being encrypted by homomorphic cryptography to plaintext multidimensional data.The present embodiment In, plaintext multidimensional data stores in vector form, and for plaintext high dimension vector m, user uses KpubEncrypt m, the ciphertext of generation Binary group (si,ti) consist of two parts, siClear data is restored for decrypting process;tiFor KpubThe cryptographic Hash of m is used for ciphertext Auxiliary homomorphism calculating process under state.
Mining data, cloud service provider call ciphertext central point computational algorithm and ciphertext apart from computational algorithm to ciphertext into Row data mining, returned data Result;Preferably, step mining data further includes cloud service provider according to cryptogram computation The distance of ciphertext data point and cluster centre point, compares ciphertext data point to the distance of cluster centre point, will nearest close of distance Literary data point is divided into corresponding cluster.In the present embodiment, for a pair of of cyphertext vector (s1,t1) and (s2,t2), ciphertext Calculating process is as follows:
Ciphertext data is decrypted data mining results using public key and private key, generates plaintext Result.It is preferred that , step ciphertext data includes the nearest vector calculated using Babai algorithm closest to ciphertext, raw by nearest vector sum public key At plaintext Result.In the present embodiment, plaintext Result calculation formula is as follows:
V=round (SiKpri -1)·Kpri
Code=vKpub -1
A kind of electronic equipment, including:Processor;
Memory;And program, wherein program is stored in memory, and is configured to be executed by processor, journey Sequence includes for executing above-mentioned secret protection cluster data mining method.
A kind of computer readable storage medium, is stored thereon with computer program, and computer program is executed by processor State secret protection cluster data mining method.
Secret protection cluster data mining system, as shown in Fig. 2, including:
Generate cipher key module:For generating high-quality base Kpri, random integers matrix U, open parameter p, to high-quality base and random INTEGER MATRICES carries out elementary transformation, generates base K inferiorpub, it is stored in local using high-quality base as private key, using base inferior as public affairs Key is committed to cloud service provider;In the present embodiment, base K inferiorpubCalculation formula is as follows:
Kpub=UKpri=w1, w2..., wn
Encryption data module:For generating ciphertext by public key encryption plaintext multidimensional data, by ciphertext and open parameter hair It send to cloud service provider;Preferably, encryption data module further includes being encrypted by homomorphic cryptography to plaintext multidimensional data. In the present embodiment, plaintext multidimensional data stores in vector form, and for plaintext high dimension vector m, user uses KpubM is encrypted, it is raw At ciphertext binary group (si,ti) consist of two parts, siClear data is restored for decrypting process;tiFor KpubThe cryptographic Hash of m, For the auxiliary homomorphism calculating process under ciphertext state.
Mining data module:Call ciphertext central point computational algorithm and ciphertext apart from computational algorithm for cloud service provider Data mining, returned data Result are carried out to ciphertext;Preferably, mining data module further include cloud service provider according to The distance of cryptogram computation ciphertext data point and cluster centre point, compare ciphertext data point to cluster centre point distance, by distance Nearest ciphertext data point is divided into corresponding cluster.In the present embodiment, for a pair of of cyphertext vector (s1,t1) and (s2, t2), the calculating process of ciphertext is as follows:
Ciphertext data module:For data mining results to be decrypted using public key and private key, generates and excavate knot in plain text Fruit.Preferably, ciphertext data module includes the nearest vector calculated using Babai algorithm closest to ciphertext, passes through nearest vector Plaintext Result is generated with public key.In the present embodiment, plaintext Result calculation formula is as follows:
V=round (SiKpri -1)·Kpri
Code=vKpub -1
The present invention provides secret protection cluster data mining method, includes the following steps:Generate key, generate high-quality base, Random integers matrix, open parameter, carry out elementary transformation to high-quality base and random integers matrix, base inferior are generated, by high-quality base It is stored in local as private key, is committed to cloud service provider using base inferior as public key;Encryption data, it is bright by public key encryption Literary multidimensional data generates ciphertext, and ciphertext and open parameter are sent to cloud service provider;Mining data, cloud service provider Ciphertext central point computational algorithm and ciphertext is called to carry out data mining, returned data Result to ciphertext apart from computational algorithm; Ciphertext data is decrypted data mining results using public key and private key, generates plaintext Result.The invention further relates to one Kind electronic equipment, storage medium, secret protection cluster data mining system.The safe homomorphism that the present invention passes through building private data Operation method, and the cloud ciphertext data clusters analysis data mining service for supporting secret protection is realized on this basis; To protect user data privacy, user will be distributed to cloud service provider after data encryption, cloud service provider utilizes homomorphism Encryption Algorithm realizes secret protection, but cloud service provider can not directly access user data and destroy privacy of user;The present invention With very high safety, the accuracy of distance between ciphertext data is effectively maintained.
More than, only presently preferred embodiments of the present invention is not intended to limit the present invention in any form;All current rows The those of ordinary skill of industry can be shown in by specification attached drawing and above and swimmingly implement the present invention;But all to be familiar with sheet special The technical staff of industry without departing from the scope of the present invention, is made a little using disclosed above technology contents The equivalent variations of variation, modification and evolution is equivalent embodiment of the invention;Meanwhile all substantial technologicals according to the present invention The variation, modification and evolution etc. of any equivalent variations to the above embodiments, still fall within technical solution of the present invention Within protection scope.

Claims (10)

1. secret protection cluster data mining method, it is characterised in that include the following steps:
Key is generated, high-quality base, random integers matrix, open parameter are generated, to the high-quality base and the random integers matrix Elementary transformation is carried out, base inferior is generated, is stored in local using the high-quality base as private key, is mentioned using the base inferior as public key It hands over to cloud service provider;
Encryption data generates ciphertext by the public key encryption plaintext multidimensional data, by the ciphertext and the open parameter hair It send to the cloud service provider;
Mining data, the cloud service provider call ciphertext central point computational algorithm and ciphertext apart from computational algorithm to described close Text carries out data mining, returned data Result;
Ciphertext data is decrypted the data mining results using the public key and the private key, generates and excavates knot in plain text Fruit.
2. secret protection cluster data mining method as described in claim 1, it is characterised in that:The step encryption data is also Including being encrypted by homomorphic cryptography to the plaintext multidimensional data.
3. secret protection cluster data mining method as claimed in claim 2, it is characterised in that:The step mining data is also Including the cloud service provider according to the distance of the cryptogram computation ciphertext data point and cluster centre point, the ciphertext Data point will be divided into corresponding cluster to the distance of the cluster centre point apart from nearest ciphertext data point.
4. secret protection cluster data mining method as described in claim 1, which is characterized in that the step decrypted data packet The nearest vector for calculating the closest ciphertext using Babai algorithm is included, passes through public key described in the nearest vector sum and generates institute State literary Result clearly.
5. a kind of electronic equipment, it is characterised in that including:Processor;
Memory;And program, wherein described program is stored in the memory, and is configured to be held by processor Row, described program include requiring method described in 1-4 any one for perform claim.
6. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that:The computer program quilt Processor executes the method as described in claim 1-4 any one.
7. secret protection cluster data mining system, it is characterised in that including:
Generate cipher key module:For generating high-quality base, random integers matrix, open parameter, to the high-quality base and described random INTEGER MATRICES carries out elementary transformation, generates base inferior, is stored in local using the high-quality base as private key, and the base inferior is made Cloud service provider is committed to for public key;
Encryption data module:For ciphertext being generated, by the ciphertext and the public affairs by the public key encryption plaintext multidimensional data It opens parameter and is sent to the cloud service provider;
Mining data module:Call ciphertext central point computational algorithm and ciphertext apart from computational algorithm for the cloud service provider Data mining, returned data Result are carried out to the ciphertext;
Ciphertext data module:For the data mining results to be decrypted using the public key and the private key, generate bright Literary Result.
8. secret protection cluster data mining system as claimed in claim 7, it is characterised in that:The encryption data module is also Including being encrypted by homomorphic cryptography to the plaintext multidimensional data.
9. secret protection cluster data mining system as claimed in claim 8, it is characterised in that:The mining data module is also Including the cloud service provider according to the distance of the cryptogram computation ciphertext data point and cluster centre point, the ciphertext Data point will be divided into corresponding cluster to the distance of the cluster centre point apart from nearest ciphertext data point.
10. secret protection cluster data mining system as claimed in claim 7, it is characterised in that:The ciphertext data module Including calculating the nearest vector closest to the ciphertext using Babai algorithm, generated by public key described in the nearest vector sum The plaintext Result.
CN201810589541.0A 2018-06-08 2018-06-08 Secret protection cluster data mining method, electronic equipment, storage medium and system Pending CN108881204A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810589541.0A CN108881204A (en) 2018-06-08 2018-06-08 Secret protection cluster data mining method, electronic equipment, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810589541.0A CN108881204A (en) 2018-06-08 2018-06-08 Secret protection cluster data mining method, electronic equipment, storage medium and system

Publications (1)

Publication Number Publication Date
CN108881204A true CN108881204A (en) 2018-11-23

Family

ID=64338590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810589541.0A Pending CN108881204A (en) 2018-06-08 2018-06-08 Secret protection cluster data mining method, electronic equipment, storage medium and system

Country Status (1)

Country Link
CN (1) CN108881204A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110163292A (en) * 2019-05-28 2019-08-23 电子科技大学 Secret protection k-means clustering method based on vector homomorphic cryptography
CN110378708A (en) * 2019-07-24 2019-10-25 核芯互联科技(青岛)有限公司 A kind of concealed credibility certificate method, apparatus, system and storage medium
CN111107076A (en) * 2019-12-16 2020-05-05 电子科技大学 Safe and efficient matrix multiplication outsourcing method
CN112231737A (en) * 2020-11-05 2021-01-15 深圳技术大学 Data security comparison protocol implementation method, system, electronic device and storage medium
WO2021249500A1 (en) * 2020-06-12 2021-12-16 支付宝(杭州)信息技术有限公司 Method and apparatus for clustering private data of multiple parties
CN114070553A (en) * 2021-10-29 2022-02-18 深圳技术大学 Private data matching method, system and storage medium
CN114978623A (en) * 2022-05-06 2022-08-30 支付宝(杭州)信息技术有限公司 Privacy protection-based face comparison method and device
TWI835300B (en) * 2022-02-28 2024-03-11 大陸商中國銀聯股份有限公司 A data matching method, device, equipment and medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110163292A (en) * 2019-05-28 2019-08-23 电子科技大学 Secret protection k-means clustering method based on vector homomorphic cryptography
CN110378708A (en) * 2019-07-24 2019-10-25 核芯互联科技(青岛)有限公司 A kind of concealed credibility certificate method, apparatus, system and storage medium
CN111107076A (en) * 2019-12-16 2020-05-05 电子科技大学 Safe and efficient matrix multiplication outsourcing method
WO2021249500A1 (en) * 2020-06-12 2021-12-16 支付宝(杭州)信息技术有限公司 Method and apparatus for clustering private data of multiple parties
CN112231737A (en) * 2020-11-05 2021-01-15 深圳技术大学 Data security comparison protocol implementation method, system, electronic device and storage medium
CN112231737B (en) * 2020-11-05 2023-08-22 深圳技术大学 Data security comparison protocol implementation method, system, electronic device and storage medium
CN114070553A (en) * 2021-10-29 2022-02-18 深圳技术大学 Private data matching method, system and storage medium
TWI835300B (en) * 2022-02-28 2024-03-11 大陸商中國銀聯股份有限公司 A data matching method, device, equipment and medium
CN114978623A (en) * 2022-05-06 2022-08-30 支付宝(杭州)信息技术有限公司 Privacy protection-based face comparison method and device
CN114978623B (en) * 2022-05-06 2023-11-17 支付宝(杭州)信息技术有限公司 Face comparison method and device based on privacy protection

Similar Documents

Publication Publication Date Title
CN108881204A (en) Secret protection cluster data mining method, electronic equipment, storage medium and system
CN107145791B (en) K-means clustering method and system with privacy protection function
CN110430161B (en) Unsupervised data anonymous sharing method and system based on block chain
CN110635909B (en) Attribute-based collusion attack resistant proxy re-encryption method
CN106487506B (en) Multi-mechanism KP-ABE method supporting pre-encryption and outsourcing decryption
CN104320393B (en) The controllable efficient attribute base proxy re-encryption method of re-encryption
CN108111295B (en) Homomorphic encryption method based on analog-to-analog operation
CN108880801B (en) Distributed attribute-based encryption method for supporting fine-grained attribute revocation in lattice manner
CN107204997A (en) The method and apparatus for managing cloud storage data
CN108989049A (en) A kind of the proxy re-encryption system and encryption method of no Bilinear Pairing
WO2021129470A1 (en) Polynomial-based system and method for fully homomorphic encryption of binary data
CN109688143A (en) A kind of cluster data mining method towards secret protection in cloud environment
CN114125831B (en) 5G smart grid user side data acquisition method and system based on proxy re-encryption
Murad et al. Implementation and performance analysis of hybrid cryptographic schemes applied in cloud computing environment
CN110784300A (en) Secret key synthesis method based on multiplication homomorphic encryption
Shah et al. Review of Image encryption and decryption techniques for 2D images
CN115065492B (en) Security aggregation method and system for power time sequence data communication
Kumar et al. Hybridization of Cryptography for Security of Cloud Data
CN106712929A (en) Encryption method for big data
CN113343258A (en) Attribute-based agent re-encryption method applicable to lattice-based ciphertext strategy shared by body test result cloud
Abduljabbar Fast approach for arabic text encryption using genetic algorithm
Patro et al. Text-to-image encryption and decryption using piece wise linear chaotic maps
CN105978685B (en) A kind of attribute base encryption outsourcing method with high concurrency
CN110932847A (en) User revocation method for identity identification cryptosystem with ciphertext homomorphism
CN110061837A (en) A kind of encrypted transmission mechanism of the ciphertext fixed length based on outsourcing decryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181123

WD01 Invention patent application deemed withdrawn after publication