CN111510464B  Epidemic situation information sharing method and system for protecting user privacy  Google Patents
Epidemic situation information sharing method and system for protecting user privacy Download PDFInfo
 Publication number
 CN111510464B CN111510464B CN202010584407.9A CN202010584407A CN111510464B CN 111510464 B CN111510464 B CN 111510464B CN 202010584407 A CN202010584407 A CN 202010584407A CN 111510464 B CN111510464 B CN 111510464B
 Authority
 CN
 China
 Prior art keywords
 inquired
 information
 identity
 party
 queried
 Prior art date
 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
 Active
Links
 230000002633 protecting Effects 0.000 title claims abstract description 34
 230000000875 corresponding Effects 0.000 claims abstract description 24
 238000000034 method Methods 0.000 claims abstract description 10
 238000004364 calculation method Methods 0.000 description 8
 230000005540 biological transmission Effects 0.000 description 6
 201000009910 diseases by infectious agent Diseases 0.000 description 6
 238000010586 diagram Methods 0.000 description 3
 230000002265 prevention Effects 0.000 description 3
 238000006073 displacement reaction Methods 0.000 description 2
 230000002349 favourable Effects 0.000 description 2
 230000004048 modification Effects 0.000 description 2
 238000006011 modification reaction Methods 0.000 description 2
 150000003839 salts Chemical class 0.000 description 2
 239000011780 sodium chloride Substances 0.000 description 2
 241000700605 Viruses Species 0.000 description 1
 230000001419 dependent Effects 0.000 description 1
 238000003745 diagnosis Methods 0.000 description 1
 201000010099 disease Diseases 0.000 description 1
 230000000694 effects Effects 0.000 description 1
 230000003203 everyday Effects 0.000 description 1
 238000003780 insertion Methods 0.000 description 1
 230000003287 optical Effects 0.000 description 1
 238000006467 substitution reaction Methods 0.000 description 1
Classifications

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L63/00—Network architectures or network communication protocols for network security
 H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
 H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
 G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
 G06F16/24—Querying
 G06F16/245—Query processing
 G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
 G06F16/2468—Fuzzy queries

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 G06F21/60—Protecting data
 G06F21/602—Providing cryptographic facilities or services

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 G06F21/60—Protecting data
 G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
 G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
 G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 G06F21/60—Protecting data
 G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
 G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
 G06F21/6245—Protecting personal data, e.g. for financial or medical purposes

 G—PHYSICS
 G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
 G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
 G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
 G16H50/80—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L63/00—Network architectures or network communication protocols for network security
 H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
 H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
 H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
 H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
 H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving DiffieHellman or related key agreement protocols

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
 H04L2209/16—Obfuscation or hiding, e.g. involving white box
Abstract
The invention discloses an epidemic situation information sharing method and system for protecting user privacy, which relate to the technical field of data sharing, and comprise the following steps: the third party aligns the encrypted tobequeried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information; the third party sends the accurate intersection information to the inquired party; and the inquired party obtains the sensitive information corresponding to the position according to the accurate intersection information and sends the sensitive information to the inquiring party. The method follows the principle of information minimization, only displays the information required by processing in the sharing process to each party, is beneficial to reducing the leakage risk of other information outside the intersection, reduces the operation on sensitive information to the greatest extent, can effectively protect the safety of the identity to be inquired, the inquired identity information and the sensitive information, is convenient for the inquirer to quickly obtain the sensitive information of the person to be inquired, has high sharing efficiency, and is suitable for data sharing of any scale.
Description
Technical Field
The invention relates to the technical field of data sharing, in particular to an epidemic situation information sharing method and system for protecting user privacy.
Background
In order to suppress the development of epidemic situation of infectious disease caused by virus, realtime progress of the epidemic situation, such as confirmed people and suspected people every day, is often required to be issued in time, and then epidemic prevention and control means are adjusted in time according to the realtime progress of the epidemic situation. The disclosed information is mostly statistical data, and the specific sensitive information is only reported to a management organization, if not necessary, other individuals and organizations should not acquire privacy information such as personal identity therein. However, the dissynchronization of the epidemic situation information easily causes inconvenience in actual management, and even may generate a great epidemic situation risk, for example, a certain person A is isolated from the area A to the area B due to contact with a diagnosed patient, but the person A is not reported to the area A in time, so that the area A cannot timely examine the people who the person A contacts before leaving the area A, and the management of the person A has a blind area for a certain time; or a person has been isolated as a suspect by a local cell, but who does not respect the fact that management still goes to work privately and is hidden from the company, the company will face a great risk of epidemic propagation because it cannot acquire the necessary information.
Therefore, it is necessary to solve the problem of how to share sensitive information on the basis of protecting the privacy of the identity of an individual.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide an epidemic situation information sharing method for protecting user privacy, which obtains accurate intersection information between identity information to be queried and queried data through alignment processing, and a queried party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the queried party, so that the queried party can quickly and accurately obtain sensitive information of accurate intersection personnel, and meanwhile, information security is effectively protected.
One of the purposes of the invention is realized by adopting the following technical scheme:
an epidemic situation information sharing method for protecting user privacy comprises the following steps:
aligning the encrypted tobequeried identity information of a querying party and the encrypted queried identity information of a queried party to obtain accurate intersection information, wherein the accurate intersection information is an accurate intersection ciphertext or the accurate intersection information is the position of the accurate intersection ciphertext in the encrypted queried identity information;
sending the accurate intersection information to the inquired party;
and the inquired party obtains the sensitive information corresponding to the position according to the accurate intersection information and sends the sensitive information to the inquiring party.
Further, aligning the encrypted tobequeried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information, comprising:
the encrypted identity information to be queried and the encrypted queried identity information are aligned in a fuzzy manner to obtain a fuzzy intersection ciphertext, wherein each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information to be queried and at least one encrypted queried identity information;
sending the fuzzy intersection ciphertext to the inquiring party and the inquired party;
receiving a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext; each encrypted data in the first ciphertext set corresponds to identity information to be queried;
receiving a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext; each piece of encrypted data in the second ciphertext set corresponds to queried identity information;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
Further, the first ciphertext set may be obtained by:
the inquiring party decrypts the fuzzy intersection ciphertext to obtain a first fuzzy intersection, and each data of the first fuzzy intersection corresponds to at least one identity information to be inquired;
the inquiring party obtains an identity set to be inquired according to the first fuzzy intersection, and conducts second encryption processing on the identity set to be inquired to obtain a first ciphertext set;
the second ciphertext set may be obtained by:
the inquired party decrypts the fuzzy intersection ciphertext to obtain a second fuzzy intersection, and each data of the second fuzzy intersection corresponds to at least one inquired identity information;
and the inquired party obtains an inquired identity set according to the second fuzzy intersection, and carries out second encryption processing on the inquired identity set to obtain a second ciphertext set.
Further, the position of the queried identity information in the queried identity set is the same as the position of the queried identity information in the second ciphertext set; accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information, including:
judging whether the first ciphertext set and the second ciphertext set are equal according to bits, and enabling the bits with the equal judgment result to correspond to the position in the second ciphertext set to serve as the accurate intersection information;
the inquired party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party, and the method comprises the following steps:
the inquired party acquires accurate intersection identity information according to the accurate intersection information and the inquired identity set;
inquiring a sensitive information table according to the accurate intersection identity information to obtain sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information;
and sending the sensitive information to the inquiring party.
Further, before aligning the encrypted tobequeried identity information of the querying party with the encrypted queried identity information of the queried party, the method further comprises the following steps:
the inquired party generates an inquired identity filter in an offline mode according to the inquired identity information and the bloom filter, and encrypts the inquired identity filter for the first time to obtain an inquired filter ciphertext; wherein a bit with a value of 1 in the queried identity filter corresponds to at least one queried identity information;
the inquiring party generates an identity filter to be inquired according to the identity information to be inquired and the bloom filter, and encrypts the identity filter to be inquired for the first time to obtain a ciphertext of the filter to be inquired; wherein, a bit with a value of 1 in the identity filter to be queried corresponds to at least one identity information to be queried.
Further, before the queried identity filter and the tobequeried identity filter are encrypted for the first time, the queried party and the querying party perform key agreement for the first time to obtain a first key; and the inquired party and the inquiring party respectively encrypt the inquired identity filter and the tobeinquired identity filter for the first time based on the first secret key.
Further, aligning the encrypted tobequeried identity information of the querying party and the encrypted queried identity information of the queried party to obtain an accurate intersection position, comprising:
receiving the ciphertext of the filter to be queried;
obtaining the cipher text of the queried filter;
the cipher text of the inquired filter and the cipher text of the tobeinquired filter are aligned in a fuzzy mode to obtain filter intersection cipher text, and each encrypted data in the filter intersection cipher text corresponds to one bit in the inquired identity filter and one bit in the tobeinquired identity filter;
sending the filter intersection ciphertext to the inquired party and the inquiring party, and respectively carrying out decryption processing to obtain a filter intersection;
the inquiring party obtains a first ciphertext set based on the filter intersection; each encrypted data in the first ciphertext set corresponds to identity information to be queried;
the inquired party obtains a second ciphertext set based on the filter intersection; each piece of encrypted data in the second ciphertext set corresponds to queried identity information;
receiving the first ciphertext set and the second ciphertext set;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
Further, the querying party obtains a first ciphertext set based on the filter intersection, including:
the inquiring party generates an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information to be inquired in the identity filter to be inquired;
the inquiring party inquires the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired, and encrypts the identity set to be inquired for the second time to obtain the first ciphertext set;
the inquired party obtains a second ciphertext set based on the filter intersection, and the second ciphertext set comprises the following steps:
the inquired party generates an inquired identity mapping table in an offline manner according to the mapping relation between the inquired identity information and the position of the inquired identity information in the inquired identity filter;
and the inquired party inquires the inquired identity mapping table according to the filter intersection to obtain an inquired identity set, and encrypts the inquired identity set for the second time to obtain the second ciphertext set.
Further, before the identity set to be queried and the queried identity set are encrypted for the second time, the querying party and the queried party perform second key agreement to obtain a second key; the inquiring party and the inquired party respectively encrypt the identity set to be inquired and the inquired identity set for the second time based on the second secret key;
the inquiring party and the inquired party perform the second key agreement, which comprises the following steps: the inquired party and the inquiring party run a DiffieHellman secure key agreement protocol once.
The invention also aims to provide an epidemic situation information sharing system for protecting user privacy, which aligns encrypted tobequeried identity information and encrypted tobequeried identity information through a thirdparty terminal to obtain accurate intersection information, obtains sensitive information according to the accurate intersection information by a tobequeried terminal and sends the sensitive information to a query terminal, so that the query terminal can quickly and accurately obtain the sensitive information of accurate intersection personnel between the tobequeried identity information and the tobequeried identity information, and meanwhile, effectively protects information security.
The second purpose of the invention is realized by adopting the following technical scheme:
an epidemic situation information sharing system for protecting user privacy, comprising:
the inquiry terminal is used for acquiring identity information to be inquired; encrypting the identity information to be inquired to obtain encrypted identity information to be inquired and sending the encrypted identity information to the third party terminal; receiving sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information;
the inquired terminal is used for encrypting the prestored inquired identity information to obtain encrypted inquired identity information and sending the encrypted inquired identity information to the third party terminal; obtaining sensitive information according to the accurate intersection information and sending the sensitive information to the query terminal;
the thirdparty terminal is used for aligning the encrypted inquiry identity information and the encrypted inquired identity information to obtain accurate intersection information; and sending the accurate intersection information to the inquired terminal. Compared with the prior art, the invention has the beneficial effects that:
the invention follows the principle of information minimization, so that an inquiring party can only obtain sensitive information of accurate intersection of two parties (namely, shared personnel), an inquired party can only obtain identity information of accurate intersection of the two parties, and the inquiring party, the inquired party and a third party can not obtain any other information, thereby being beneficial to reducing information leakage risks, reducing the operation of the inquired party on the sensitive information, effectively improving the safety of the sensitive information, ensuring that the inquiring party can quickly and accurately obtain the sensitive information of the personnel to be inquired, having high sharing efficiency and being suitable for data sharing of any scale.
Drawings
Fig. 1 is a flowchart of an epidemic situation information sharing method for protecting user privacy according to a first embodiment of the present invention;
fig. 2 is a flowchart of an epidemic situation information sharing method for protecting user privacy according to a second embodiment of the present invention;
FIG. 3 is a flowchart of a fourth encryption process according to the present invention;
fig. 4 is a flowchart of an epidemic situation information sharing method for protecting user privacy according to a fifth embodiment of the present invention;
FIG. 5 is a diagram of a queried identity filter according to a sixth embodiment of the invention;
fig. 6 is a diagram illustrating a queried identity mapping table according to a sixth embodiment of the present invention;
fig. 7 is a schematic diagram of a replacement process according to a sixth embodiment of the present invention.
Detailed Description
The present invention will now be described in more detail with reference to the accompanying drawings, in which the description of the invention is given by way of illustration and not of limitation. The various embodiments may be combined with each other to form other embodiments not shown in the following description.
Example one
The embodiment one provides an epidemic situation information sharing method for protecting user privacy, which aims to follow an information minimization principle, so that an inquiring party can only obtain sensitive information of accurate intersection of two parties (namely, shared personnel), and an inquired party can only obtain identity information of accurate intersection of the two parties.
Referring to fig. 1, an epidemic situation information sharing method for protecting user privacy includes the following steps:
and S10, the third party aligns the encrypted tobequeried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information.
The identity information to be inquired comprises basic identity information (such as name, identification number, household/resident area and the like) of one or more persons to be inquired, and is identity information of internal persons which are authorized to be managed by an inquirer according to legal regulations, such as identity information of all staff in a certain enterprise and identity information of all persons in a certain government jurisdiction. The encrypted tobequeried identity information can be uploaded in real time after the tobequeried identity information is obfuscated by a querying party through encryption technologies such as symmetric encryption and asymmetric encryption.
The inquired identity information refers to basic identity information (such as names, identity numbers, household/resident places and the like) of a plurality of inquired persons of the inquired party. The encrypted queried identity information can be uploaded in real time after the queried identity information is obfuscated by a queried party through encryption technologies such as symmetric encryption and asymmetric encryption. The inquired party also has a sensitive information table corresponding to the inquired identity information, wherein the sensitive information belongs to private information which is protected by the inquired person according to law (for example, whether the inquired person is a suspected or confirmed person of infectious disease, the public deposit payment data of the inquired person, and the like).
The third party does not obtain any real identity information from the confused encrypted tobequeried identity information and the encrypted tobequeried identity information, and can obtain an accurate intersection ciphertext, namely encrypted data of the accurate intersection (namely common personnel) identity information of the two parties only by aligning the encrypted tobequeried identity information and the encrypted tobequeried identity information. And each data in the accurate intersection ciphertext belongs to the encrypted information of both sides at the same time, and the accurate intersection ciphertext is used as the accurate intersection information. Preferably, the third party judges whether the encrypted tobequeried identity information and the encrypted tobequeried identity information are equal according to bits, and the data with the equal judgment result is the accurate intersection ciphertext. The operation of judging the equality according to the bit is simple and quick, the software is convenient to realize, and the whole sharing efficiency is favorably improved.
And S20, the third party sends the accurate intersection information to the inquired party.
The inquired party only receives the accurate intersection ciphertext to ensure that the inquired party cannot obtain the identity information outside the accurate intersection, and also cannot obtain the identity information which does not belong to the inquired identity information, so that the information which can be obtained by the inquired party is minimized, and the safety of the identity information which does not belong to the accurate intersection in the identity information to be inquired can be protected.
And S30, the inquired party obtains the sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party.
Because the accurate intersection ciphertext corresponds to the unencrypted accurate intersection identity information of the two parties, the inquired party decrypts the accurate intersection identity information to obtain the accurate intersection identity information, and the accurate intersection identity information belongs to the identity information to be inquired and the inquired identity information at the same time. And then, inquiring the sensitive information table according to the accurate intersection identity information to obtain sensitive information corresponding to the shared personnel of the inquiring party and the inquired party, and sending the sensitive information to the inquiring party to ensure that the inquiring party can only obtain the sensitive information of the shared personnel of the two parties.
The whole data sharing process follows the information minimization principle, the inquiring party, the inquired party and the third party are ensured to only acquire information data related to operation, and sensitive information is only subjected to onetime operation after positioning by intersection personnel, so that the leakage risk of the sensitive information and other information outside the intersection can be effectively reduced, the data sharing efficiency is improved, and the data sharing method can be used for sharing data of any data scale.
In some other embodiments, the third party determines whether the encrypted tobequeried identity information and the encrypted tobequeried identity information are equal by bit, the data with the equal determination result is the accurate intersection ciphertext, and the position of the accurate intersection ciphertext in the encrypted tobequeried identity information is used as the accurate intersection information. The third party sends the accurate intersection information to the inquired party, the accurate intersection information is the position information of the accurate intersection, the data volume of the accurate intersection information is less than that of the accurate intersection ciphertext information, the data transmission amount is reduced, and the data sharing efficiency is integrally improved. Because the position of the accurate intersection ciphertext in the encrypted inquired identity information is the same as the position of the accurate intersection identity information in the inquired identity information, namely the position information before and after encryption is the same, the inquired party can obtain the accurate intersection identity information according to the accurate intersection information, further inquire a sensitive information table corresponding to the identity information, obtain sensitive information of shared personnel between the identity information to be inquired and the inquired identity information, and send the sensitive information to the inquired party.
Example two
The second embodiment is an improvement on the first embodiment, the alignment processing includes fuzzy alignment and precise alignment, most identities which do not necessarily belong to a precise intersection (i.e. shared people) between the identity information to be queried and the identity information to be queried can be quickly screened out through the fuzzy alignment, the shared people can be accurately positioned from the screened people through the precise alignment, and the method is particularly suitable for largescale data sharing. Referring to fig. 2, an epidemic situation information sharing method for protecting user privacy includes the following steps:
s201, the third party aligns the encrypted identity information to be inquired and the encrypted inquired identity information in a fuzzy mode to obtain a fuzzy intersection ciphertext.
Each encrypted data in the encrypted identity information to be queried corresponds to at least one identity information to be queried, and each encrypted data in the encrypted identity information to be queried corresponds to at least one queried identity information. The third party carries out fuzzy alignment on the encrypted information of the two parties, and can preliminarily screen and obtain overlapped data of the encrypted information of the two parties, namely fuzzy intersection ciphertext. Each encrypted data in the fuzzy intersection ciphertext simultaneously corresponds to at least one piece of encrypted tobequeried identity information and at least one piece of encrypted tobequeried identity information, so that the fuzzy intersection ciphertext contains encrypted data which simultaneously belong to people shared by two parties, and a small amount of encrypted data which only belong to a querying party or a queried party. For largescale (e.g., hundred million) data, the precisely located data magnitude can be quickly reduced by fuzzy alignment while ensuring that no intersecting personnel are missed.
S202, the third party sends the fuzzy intersection ciphertext to the inquiring party and the inquired party.
The third party does not decrypt the fuzzy intersection ciphertext, so that the third party does not obtain any real identity information, and the risk of information leakage can be reduced.
S203, the third party receives a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext and receives a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext.
Preferably, the first set of ciphertexts and the second set of ciphertexts are obtained by: the inquiring party decrypts the fuzzy intersection ciphertext to obtain a first fuzzy intersection, and each data of the first fuzzy intersection corresponds to at least one identity information to be inquired; and the inquiring party obtains an identity set to be inquired according to the first fuzzy intersection, and performs second encryption processing on the identity set to be inquired to obtain a first ciphertext set. The inquired party decrypts the fuzzy intersection ciphertext to obtain a second fuzzy intersection, and each data of the second fuzzy intersection corresponds to at least one inquired identity information; and the inquired party obtains an inquired identity set according to the second fuzzy intersection, and carries out second encryption processing on the inquired identity set to obtain a second ciphertext set.
The identity information of the shared personnel of both parties exists in the identity set to be inquired and the identity set to be inquired. Each encrypted data in the first ciphertext set corresponds to one tobequeried identity information in the tobequeried identity set. Each encrypted data in the second ciphertext set corresponds to one queried identity set in the queried identity set. The identity set encryption processing of the two parties is separately carried out in respective local places, the information minimization principle is followed, the information leakage risk is reduced, and the security is higher.
Compared with the data volume of the encrypted identity information to be queried and the encrypted queried identity information, the data magnitude of the first ciphertext set and the second ciphertext set is greatly reduced, and the method is favorable for accelerating the accurate alignment speed. Each encrypted data in the first ciphertext set corresponds to one tobequeried identity information, and each encrypted data in the second ciphertext set corresponds to one tobequeried identity information.
And S204, the third party accurately aligns the first ciphertext set and the second ciphertext set to obtain accurate intersection information.
The third party does not obtain any real identity information from the first ciphertext set and the second ciphertext set, and only carries out accurate alignment processing on the first ciphertext set and the second ciphertext set to obtain accurate intersection ciphertext, namely encrypted data of the identity information of the accurate intersection (namely common personnel) of the two parties. And each data in the accurate intersection ciphertext belongs to the encrypted information of both sides at the same time, and the accurate intersection ciphertext is used as the accurate intersection information. Preferably, the third party first ciphertext set and the second ciphertext set judge whether they are equal by bit, and the data with the equal judgment result is the accurate intersection ciphertext.
The epidemic situation information sharing method for protecting the privacy of the user is particularly suitable for largescale (even hundred millionlevel) data, and compared with the method that the largescale onetoone encrypted information is directly aligned to obtain accurate positioning, the data magnitude of the accurate positioning can be greatly reduced by screening out the data through fuzzy alignment, and the data sharing efficiency among the largescale data is greatly improved. In the fuzzy alignment and accurate alignment processes, the third party does not decrypt the encrypted information, and sends the fuzzy intersection ciphertext to the inquiring party and the inquired party, so that the inquiring party and the inquired party can not obtain the personnel information which does not belong to the respective data, the information amount sent to the inquiring party and the inquired party is reduced as much as possible, and the data safety is effectively improved.
For a specific application of the second sharing method in this embodiment, reference may be made to the following description. For example, the identity information to be queried is basic identity information (including a name, an identity card number, a household registration/a household place) of all persons in a jurisdiction of a certain province government, the querying party is the certain province government, the queried identity information is basic identity information (including a name, an identity card number, a household registration/a household place) of a confirmed case of a certain infectious disease, the queried party is a certain disease control center and also has a sensitive information table (including sensitive information such as confirmed diagnosis time and cure time) corresponding to the queried identity information, and the third party is a credible government information platform or a third party organization.
And the third party aligns the encrypted identity information of all the personnel in a certain province and the encrypted identity information of the confirmed cases of the infectious diseases in a fuzzy manner to obtain a fuzzy intersection ciphertext and sends the fuzzy intersection ciphertext to the inquiring party and the inquired party. Each data in the encrypted information of the two parties corresponds to at least one identity information, and each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information of a certain province and at least one encrypted identity information of a confirmed case. And the third party receives a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext, for example, the identity ciphertext set D of all the personnel in the C street of the prefecture in the B district of the Alevel city of a certain province, so that the personnel in the province outside the C street are not confirmed cases, and the confirmed cases exist in the identity ciphertext set D. And the third party receives a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext, for example, the identity ciphertext set E of the placelevel city of a certain province, wherein the identity ciphertext set D and the identity ciphertext set E are greatly reduced in data magnitude compared with the identity information of all the personnel of the certain province and the confirmed case data of the certain infectious disease. And the identity ciphertext set D and the identity ciphertext set E are accurately aligned by the third party, so that the confirmed case in the street C can be accurately positioned. If the encrypted identity information of confirmed cases of all the people in a certain province and a certain infectious disease is directly aligned one to one, the confirmed cases are positioned from all the people in a certain province, the data sharing efficiency is low due to the huge data scale, and the sharing method of the second embodiment can greatly improve the sharing efficiency of largescale data.
In other embodiments, the third party judges whether the first ciphertext set and the second ciphertext set are equal according to bits, and the bits which are equal in the judgment result are corresponding to the positions in the second ciphertext set to serve as accurate intersection information, so that the data volume is smaller than that of the accurate intersection ciphertext information, the data transmission volume is reduced, and the data sharing efficiency is integrally improved. The position of the inquired identity information in the inquired identity set is the same as the position of the inquired identity information in the second ciphertext set, the inquired party can obtain the accurate intersection identity information according to the accurate intersection information and the inquired identity set, then, a sensitive information table is inquired according to the accurate intersection identity information, sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information is obtained, and the sensitive information is sent to the inquired party.
EXAMPLE III
The third embodiment is an improvement on the first embodiment and/or the second embodiment, before the third party aligns the encrypted tobequeried identity information and the encrypted tobequeried identity information, the queried party and the querying party respectively generate respective identity filters according to the tobequeried identity information and the queried identity information, the identity filters hide the identity information, protect data security, save storage space and improve data sharing efficiency.
The inquired identity information comprises epidemic situation identity information, such as the names of suspected, isolated and confirmed personnel, identity cards, household registration and other basic identity information, and the information can be acquired by the inquired party in advance and updated regularly, so that the accuracy of data is ensured, and meanwhile, the time for sharing the data in real time is reduced.
The filter is generally in the form of a binary string or array, wherein 0 indicates that no identity information is encoded in the location, 1 indicates that at least one identity information is encoded in the location, the identity information can be effectively hidden, and the length of the filter is only related to the size of the data, even if the size of the filter is less than 10MB when the length of the filter is 1 hundred million, the storage space can be effectively saved, and the efficiency of data encryption and transmission can be improved.
The inquired party generates an inquired identity filter according to the epidemic situation identity information and the bloom filter, and a bit with a value of 1 in the inquired identity filter corresponds to at least one epidemic situation identity information. And the inquiring party generates an identity filter to be inquired according to the identity information to be inquired and the bloom filter, wherein a bit with a value of 1 in the identity filter to be inquired corresponds to at least one identity information to be inquired.
A bloom filter is a long binary vector and a series of random mapping functions that can be used to retrieve whether an element is in a set. Compared with other data structures, the bloom filter can represent a complete set, has great advantages in terms of space and time, is constant in storage space and insertion/query time, does not need storage elements per se, and has advantages in occasions with strict requirements on confidentiality.
Preferably, in order to improve the generation efficiency of the identity filter, only 1 Hash function is used to calculate the index of each identity information, and the position of the corresponding index in the bloom filter with the initial value of all 0 is set to be 1, which indicates that at least one identity information exists and is encoded to the position, thereby obtaining the queried identity filter and the identity filter to be queried. For example, the index calculation formula of each epidemic situation identity information is idx _ i = Hash (ID _ i)% length, where ID _ i represents the ith epidemic situation identity information, length is the length of the queried identity filter, in practical application, the maximum data size of both parties is generally multiplied, Hash is any cryptographic secure Hash function, and after calculation is completed, the idx _ i bit in the queried identity filter is set to 1.
In order to further hide the identity information of the two parties and protect the data security, the inquired party encrypts the inquired identity filter for the first time to obtain the ciphertext of the inquired filter, and the inquiring party encrypts the identity filter to be inquired for the first time to obtain the ciphertext of the filter to be inquired.
In other embodiments, the inquired party periodically generates the inquired identity filter in an offline manner according to the epidemic situation identity information, so that the repeated calculation of the inquired identity filter can be avoided when the data is shared online in real time, and the data sharing efficiency is improved.
Example four
The fourth embodiment is an improvement on the third embodiment, and the inquired party and the inquiring party encrypt the identity filters of the inquired party and the inquired party by using a symmetric encryption method, so that the data encryption efficiency is improved, and the data sharing efficiency is integrally improved.
Before the inquired identity filter and the identity filter to be inquired are encrypted for the first time, the inquired party and the inquiring party perform key agreement for the first time to obtain a first key; the inquired party and the inquiring party respectively encrypt the inquired identity filter and the tobeinquired identity filter for the first time based on the first secret key. The symmetric encryption method is used for encrypting the identity filters of the two parties, so that the data encryption efficiency can be effectively improved, particularly when the data scale is large, the encryption efficiency is remarkably improved, the data sharing efficiency is further improved, only the inquiring party and the inquired party can decrypt the encrypted filter ciphertext, and the information safety of the two parties is improved.
Preferably, the inquired party and the inquiring party run a DiffieHellman secure key agreement protocol twice to obtain a first key comprising a key A and a key B, so that the operation is more secure. The DiffieHellman key agreement algorithm generates a secret value which can be used as a symmetric key, a key can be agreed under the condition that two parties negotiating the key do not reveal the key, and the agreed key cannot be quickly decrypted.
The inquired party and the inquiring party respectively encrypt the inquired identity filter and the tobeinquired identity filter for the first time based on the first secret key, as shown in fig. 3, including the following steps:
s310, generating a full permutation according to the key A.
The sequence of each bit in the identity filter can be disturbed according to the full permutation generated by the secret key A, and the safety is improved. Methods for generating full permutation include, but are not limited to, generation using AESFF1 mode, generation using FisherYates algorithm. Preferably, an AESFF1 mode is adopted, the plaintext space and the ciphertext space of the encryption model are the same, theoretically, for the plaintext space and the ciphertext space of any size, the encryption and the decryption in the mode are mapped one by one, and full permutation can be generated through the mode.
And S320, generating a mask according to the key B.
According to the key B, a bit combination set to be on (1) or off (0), namely a mask is generated, the mask facilitates data calculation, and data processing efficiency is improved. Preferably, the mask may employ a secure pseudorandom number generator, such as the HMAC _ DRBG method, to generate a random bit string and truncate the required length. The pseudorandom number generator determines the output at the same time under the condition of determining the input, the same input necessarily results in the same output, the realization is generally only dependent on a software algorithm, the requirement on a system is low, and the application range is wide.
S330, based on full permutation, the inquired party and the inquiring party respectively carry out permutation processing on the inquired identity filter and the identity filter to be inquired to obtain the inquired permutation filter and the permutation filter to be inquired.
And S340, the inquired party and the inquiring party respectively carry out mask operation on the inquired displacement filter and the tobeinquired displacement filter to obtain the cipher text of the inquired filter and the cipher text of the tobeinquired filter.
The inquired party and the inquiring party respectively judge whether the bits at the same index position are equal with the inquired permutation filter and the permutation filter to be inquired according to the bits with the mask, if so, the result corresponding to the bit is 1, and if not, the result is 0. For example, assuming that the queried filter is 10000011, the mask is 10110100, and 10000011 and 10110100 determine whether they are equal by bit, the ciphertext of the queried filter is 11001000.
The inquiring party and the inquired party obtain the same full permutation and the same mask according to the same key A and the same key B. According to the same full permutation and the same mask, the consistency of the encryption of the inquirer and the inquired party can be kept, and the accuracy of the fuzzy alignment result is further ensured.
In other embodiments, the queried identity filter and the tobequeried identity filter may be encrypted for the first time by using an asymmetric encryption algorithm, which is more secure, but the algorithm strength is complex, the security depends on the algorithm and the key, and the efficiency of data encryption is lower than that of a symmetric encryption algorithm.
EXAMPLE five
The fifth embodiment is an improvement on the fourth embodiment, the third party performs fuzzy alignment and precise alignment on the cipher text of the queried filter and the cipher text of the filter to be queried, most identities which do not belong to precise intersection (namely common personnel) between the identity information to be queried and the epidemic situation identity information can be rapidly screened out through the fuzzy alignment, the data magnitude of precise positioning is greatly reduced, the common personnel can be accurately positioned from the screened personnel through the precise alignment, the data sharing efficiency can be effectively improved, and particularly, the sharing among largescale data is safe and effective. As shown in fig. 4, the method comprises the following steps:
and S410, the third party receives the ciphertext of the filter to be queried and acquires the ciphertext of the queried filter.
And S420, the third party fuzzily aligns the cipher text of the queried filter and the cipher text of the filter to be queried to obtain the filter intersection cipher text.
And the third party judges whether the cipher text of the inquired filter and the cipher text of the tobeinquired filter are equal by bit, data with the equal judgment result is used as the filter intersection cipher text, and each encrypted data in the filter intersection cipher text corresponds to one bit in the inquired identity filter and one bit in the tobeinquired identity filter. Through fuzzy alignment, a large amount of encrypted data which are not overlapped by filter ciphertexts of both sides are screened out, the data magnitude of accurate alignment processing is greatly reduced, identity information of common personnel of both sides is guaranteed not to be omitted, and accuracy of accurate alignment results is guaranteed.
And S430, the third party sends the filter intersection ciphertext to the inquired party and the inquiring party, and decryption processing is respectively carried out to obtain the filter intersection.
Preferably, the third party sends the filter intersection ciphertext to the inquired party and the inquiring party, and performs decryption processing respectively, including the following steps:
the inquired party and the inquiring party respectively carry out mask removing calculation on the filter intersection ciphertext to obtain mask removing identity intersection; and based on full permutation, performing inverse permutation processing on the mask removing identity intersection to obtain a filter intersection.
And respectively carrying out bitwise AND operation on the filter intersection ciphertext and the queried replacement filter and the replacement filter to be queried in the first encryption process by the queried party and the querying party to obtain the same mask removing identity intersection. And based on the same full permutation, the same mask removing identity intersection is subjected to inverse permutation treatment to obtain the same filter intersection. Experiments can prove that the inquired identity filter and the identity filter to be inquired are directly the same as the filter intersection obtained by decryption according to the phase and the obtained intersection, so that the accuracy of the data before and after the first encryption and decryption is ensured.
S440, the inquiring party obtains a first ciphertext set based on the filter intersection, and the inquired party obtains a second ciphertext set based on the filter intersection.
Each encrypted data in the first ciphertext set corresponds to one tobequeried identity information, and each encrypted data in the second ciphertext set corresponds to one epidemic situation identity information. The data magnitude of the first ciphertext set and the second ciphertext set is further reduced compared with the ciphertext of the inquired filter and the ciphertext of the filter to be inquired, so that the data transmission is accelerated, and the accurate alignment efficiency is improved.
Preferably, the querying party obtains the first ciphertext set based on the filter intersection, including: the inquiring party generates an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information in the identity filter to be inquired; and inquiring the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired, and encrypting the identity set to be inquired for the second time to obtain a first ciphertext set. The inquired party obtains a second ciphertext set based on the filter intersection, and the second ciphertext set comprises the following steps: the inquired party generates an inquired identity mapping table in an offline manner according to the mapping relation between the epidemic situation identity information and the position of the inquired identity information in the inquired identity filter; and inquiring the inquired identity mapping table according to the filter intersection to obtain an inquired identity set, and encrypting the inquired identity set for the second time to obtain a second ciphertext set.
The inquired identity mapping table represents at least one epidemic situation identity information corresponding to a bit with a value of 1 in the inquired identity filter, the tobeinquired identity mapping table represents at least one tobeinquired identity information corresponding to a bit with a value of 1 in the tobeinquired identity filter, the tobeinquired identity mapping table is favorable for quickly searching the identity information corresponding to the filter, and the efficiency is high.
Preferably, in order to improve the security, the Hash value or the ciphertext of each identity information is stored in each of the identity mapping table to be queried and the identity mapping table to be queried, and the querying party and the queried party respectively decrypt the Hash value or the ciphertext in each identity mapping table and then query to obtain the identity set to be queried and the identity set to be queried.
S450, the third party receives the first ciphertext set and the second ciphertext set.
And S460, the third party accurately aligns the first ciphertext set and the second ciphertext set to obtain accurate intersection information.
And the third party aligns the two ciphertext sets of the encrypted data corresponding to the identity information accurately, judges whether the first ciphertext set and the second ciphertext set are equal according to the position to obtain the overlapped data of the ciphertext sets of the two parties, namely the accurate intersection information, and can quickly and accurately position the shared personnel of the two parties.
In the fuzzy alignment and accurate alignment processes, the third party does not decrypt the encrypted information, and sends the filter intersection ciphertext to the inquiring party and the inquired party, so that the inquiring party and the inquired party can not obtain the personnel information which does not belong to the respective data, the information amount sent to the inquiring party and the inquired party is reduced as much as possible, and the data safety is effectively improved.
In other embodiments, the querying party and the queried party perform the second key negotiation before the second encryption to obtain the second key, and the querying party and the queried party perform the second encryption on the identity set to be queried and the queried identity set respectively based on the second key. By adopting the symmetric encryption method, the data encryption efficiency can be effectively improved. Preferably, the inquired party and the inquiring party run a DiffieHellman secure key agreement protocol once to complete the second key agreement to obtain the second key, which can protect the data security and accelerate the data encryption speed.
And performing second encryption according to the second key by using an encryption method including but not limited to salt Hash (the key is used as a salt value), HMAC and AES symmetric encryption algorithms. Preferably, the AES symmetric encryption algorithm is adopted for the second encryption, the encryption speed is very high, and the encryption efficiency can be further improved.
In other embodiments, an asymmetric encryption algorithm may be used for the second encryption, which is more secure.
In other embodiments, the third party uses the positions of the bits of the ciphertext sets with the same bit judgment result as the bit positions of the ciphertext sets as the accurate intersection information, so that the data transmission quantity is reduced, and the data sharing efficiency is improved.
EXAMPLE six
The sixth embodiment is a specific application embodiment of the fifth embodiment, wherein a certain organization is an inquiring party, a certain epidemic control center is an inquired party, and a third party is a trusted government information platform or a third party organization, and the organization needs to obtain whether the internal personnel of the organization is suspected, confirmed or isolated from the epidemic control center. The third party carries out fuzzy alignment and accurate alignment on the encrypted tobeinquired identity information of the personnel in the mechanism and the encrypted epidemic situation identity information of the epidemic situation control center, can quickly obtain accurate intersection information and send the accurate intersection information to the epidemic situation control center, the epidemic situation control center obtains epidemic situation sensitive information according to the accurate intersection information and sends the epidemic situation sensitive information to the mechanism, and the mechanism can quickly and accurately obtain the sensitive information of whether the personnel in the mechanism are suspected, confirmed or isolated, thereby being beneficial to the mechanism to take timely and effective epidemic situation prevention and control measures and reducing the epidemic situation risk. The whole process follows the principle of information minimization, all parties can not acquire data which is not involved in the processing, and the information safety of all parties can be effectively protected.
For convenience of description, it is assumed that the length of the identity filter is 8, the querying party uses its insiders { Eda, Charlie, Jack } as the identity information to be queried, and the epidemic situation identity information on the queried party is { Alice, Bob, Charlie, Darwin }. Referring to fig. 5, a queried identity filter is generated to be 01100010, according to the queried identity filter, encrypted epidemic situation identity information is recorded in a queried identity mapping table as shown in fig. 6, the identity information in fig. 6 is only convenient to understand, and in practical application, in order to meet the requirement of security compliance, stored data should be a Hash value or a ciphertext of the identity information. In the same generation manner, it is assumed that the identity filter to be queried 10100010 and the corresponding identity mapping table to be queried are obtained.
The inquiring party and the inquired party run a DiffieHellman security key agreement protocol twice to carry out the first key agreement, and jointly negotiate out a key A and a key B. The two parties generate ciphertexts from 0 to 7 by using a key A in an AESFF1 mode to obtain the same full permutation, and randomly generate an 8bit string as the same mask by using a key B in an HMAC _ DRBG method. Assuming that the generated full permutation is as shown in the table below (direction from left to right), the randomly generated mask is 10110100.
TABLE 1 full permutation
Based on the full permutation shown in table 1, the queried party performs a permutation process on queried identity filter 01100010, as shown in fig. 7, to obtain queried permutation filter 10000011. The queried filter 10000011 and the mask 10110100 are bitwise judged to be equal to each other, and a queried filter ciphertext 11001000 is obtained. Based on the same full permutation and mask, the inquiring party encrypts the identity filter to be inquired 10100010 for the first time to obtain the ciphertext 11011010 of the filter to be inquired.
The third party makes fuzzy alignment between the cipher text 11001000 of the inquired filter and the cipher text 11011010 of the tobeinquired filter, judges whether the cipher texts are equal according to the bit, obtains the filter intersection cipher text 11101101, and sends the filter intersection cipher text 11101101 back to the inquired party and the inquiring party.
The filter intersection ciphertext 11101101 is decrypted by the inquired party and the inquiring party based on the first key. And the inquired party carries out mask removing calculation on the fuzzy identity intersection ciphertext 11101101, the fuzzy identity intersection ciphertext 11101101 and the inquired replacement filter 10000011 are subjected to phase and to obtain a mask removing identity intersection 10000001, and reverse replacement processing is carried out on the basis of the full replacement arrangement shown in the table 1 to obtain a filter intersection 00100010. The inquiring party also decrypts the filter intersection ciphertext 11101101 to obtain the same filter intersection 00100010. The bitwise andwise negation of the original queried identity filter 01100010 with the tobequeried identity filter 10100010 yields an intersection 00100010 that is the same as the filter intersection obtained by decryption. Therefore, the fuzzy alignment can keep the original information of the data while protecting the privacy information of both parties, and ensure that common people can be accurately positioned.
The inquired party and the inquiring party respectively inquire the inquired identity mapping table and the tobeinquired identity mapping table according to the filter intersection 00100010 to obtain a listform inquired identity set [ Alice, Charlie, Darwin ] and a tobeinquired identity set [ Charlie, Jack ]. The values in the set are only for convenience of presentation and are actually typically Hash values of the identity information. Identity information which does not belong to common people of two parties can be quickly screened out through fuzzy alignment, screening personnel are fewer for convenient display, and a large amount of noncommon people can be screened out when the scale of the identity information is huge.
The inquiring party and the inquired party operate a DiffieHellman security key agreement protocol for the first time, and perform the second key agreement to obtain the same second key. And the two parties respectively encrypt the elements in the inquired identity set and the identity set to be inquired for the second time by using the second key and adopting an AES symmetric encryption algorithm as an encryption mode to obtain a second ciphertext set and a first ciphertext set.
And the third party judges whether the second ciphertext set and the first ciphertext set are equal according to the bit to obtain a ciphertext corresponding to the accurate identity intersection of the two parties, and the position of each encrypted data in the ciphertext in the second ciphertext set is used as accurate intersection information and returned to the inquired party.
Assuming that the accurate intersection information received by the inquired party is [1], the accurate intersection identity information of the inquired party and the inquired party obtained corresponding to the identity set to be inquired is Charlie, and the epidemic situation sensitive information table is inquired according to the identity information to obtain the epidemic situation sensitive information corresponding to the Charlie and sent to the inquired party. The inquiring party can quickly obtain epidemic situation sensitive information corresponding to Charlie, and effective prevention and control measures are taken according to the epidemic situation sensitive information, so that time blind zones in management caused by asynchronous information are avoided, and epidemic situation risks are reduced.
EXAMPLE seven
The seventh embodiment is an epidemic situation information sharing system for protecting user privacy, which corresponds to the epidemic situation information sharing method for protecting user privacy in the above embodiments, is safe and effective, and is suitable for data sharing of any scale.
An epidemic situation information sharing system for protecting user privacy, comprising:
the inquiry terminal is used for acquiring identity information to be inquired; encrypting the identity information to be queried to obtain encrypted identity information to be queried and sending the encrypted identity information to the thirdparty terminal; receiving sensitive information corresponding to the accurate intersection between the identity information to be queried and the queried identity information;
the inquired terminal is used for encrypting the prestored inquired identity information to obtain encrypted inquired identity information and sending the encrypted inquired identity information to the third party terminal; obtaining sensitive information according to the accurate intersection information and sending the sensitive information to the query terminal;
the thirdparty terminal is used for aligning the encrypted inquiry identity information and the encrypted inquired identity information to obtain accurate intersection information; and sending the accurate intersection information to the inquired terminal.
The inquiry terminal can only obtain the sensitive information of the accurate intersection of the two parties (namely, the shared personnel), the inquired terminal can only obtain the identity information of the accurate intersection of the two parties, and in addition, the inquiry terminal, the inquired terminal and the third party terminal can not obtain any other information, so that the information leakage risk is favorably reduced, the operation on the sensitive information is reduced, and the safety of the sensitive information is effectively improved.
Preferably, the queried terminal comprises a queried first encryption and decryption module, a queried second encryption module and a sensitive information query module;
the inquired first encryption and decryption module is used for generating an inquired identity filter in an offline mode according to the inquired identity information and the bloom filter; encrypting the inquired identity filter for the first time to obtain an inquired filter ciphertext and sending the inquired filter ciphertext to the thirdparty terminal; decrypting a filter intersection ciphertext sent by a thirdparty terminal to obtain a filter intersection;
the inquired second encryption module is used for generating an inquired identity mapping table in an offline manner according to the mapping relation between the inquired identity information and the position of the inquired identity information in the inquired identity filter; inquiring the inquired identity mapping table according to the filter intersection to obtain an inquired identity set; encrypting the inquired identity set for the second time to obtain a second ciphertext set and sending the second ciphertext set to the third party terminal;
the sensitive information query module is used for obtaining accurate intersection identity information according to the accurate intersection information sent by the thirdparty terminal; and inquiring the sensitive information table according to the accurate intersection identity information to obtain sensitive information and sending the sensitive information to the inquiry terminal.
Preferably, the inquiry terminal comprises an inquiry first encryption and decryption module and an inquiry second encryption module;
the query first encryption and decryption module is used for generating an identity filter to be queried according to the identity information to be queried and the bloom filter; encrypting the identity filter to be queried for the first time to obtain a ciphertext of the identity filter to be queried and sending the ciphertext to the thirdparty terminal; decrypting a filter intersection ciphertext sent by a thirdparty terminal to obtain a filter intersection;
the inquiry second encryption module is used for generating an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information in the identity filter to be inquired; inquiring the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired; and encrypting the identity set to be queried for the second time to obtain a first ciphertext set and sending the ciphertext set to the third party terminal.
Preferably, the third party terminal comprises a fuzzy alignment module and a precise alignment module;
the fuzzy alignment module is used for receiving a ciphertext of the filter to be queried; obtaining a cipher text of the queried filter; fuzzy alignment is carried out on the cipher text of the inquired filter and the cipher text of the filter to be inquired to obtain filter intersection cipher text which is sent to the inquiry terminal and the inquired terminal;
the precise alignment module is used for receiving the first ciphertext set and the second ciphertext set; and accurately aligning the first ciphertext set and the second ciphertext set to obtain accurate intersection information, wherein the accurate intersection information is the position of the accurate intersection ciphertext in the second ciphertext set.
The fuzzy alignment module and the precise alignment module can obviously improve the sharing efficiency of largescale (hundred millionlevel) data and ensure the accuracy at the same time. The fuzzy alignment module can exclude most identity information which does not belong to accurate intersection (namely common personnel) between the identity information to be inquired and the identity information to be inquired, so that the data magnitude is reduced rapidly, the accurate alignment speed is increased, and meanwhile, the intersection personnel are not omitted. The position of the accurate intersection ciphertext in the second ciphertext set is obtained through the accurate alignment module, so that the data transmission quantity can be reduced, and the sharing efficiency is further improved.
Preferably, the queried first encryption and decryption module comprises a queried first key negotiation unit, an epidemic situation filter encryption unit and a queried decryption unit;
the inquired first key negotiation unit is used for operating a DiffieHellman security key negotiation protocol twice with the inquiry terminal to obtain a first key, and the first key comprises a key A and a key B;
the epidemic situation filter encryption unit is used for generating full permutation and replacement according to the secret key A; generating a mask according to the key B; based on the full permutation, the queried identity filter is permuted to obtain a queried permutation filter; the queried substitution filter and the mask operate according to bits to obtain a ciphertext of the queried filter;
the queried filter decryption unit is used for performing mask removing calculation on the filter intersection ciphertext to obtain mask removing identity intersection; and based on full permutation, performing inverse permutation processing on the mask removing identity intersection to obtain a filter intersection.
Preferably, querying the first encryption and decryption module comprises querying a first key negotiation unit, querying a filter encryption unit and querying a decryption unit;
inquiring a first key negotiation unit, which is used for operating a DiffieHellman security key negotiation protocol twice with an inquired terminal to obtain a first key, wherein the first key comprises a key A and a key B;
the inquiry filter encryption unit is used for generating full permutation according to the key A; generating a mask according to the key B; based on the full permutation, carrying out permutation treatment on the identity filter to be queried to obtain a permutation filter to be queried; the permutation filter to be queried and the mask are operated according to bits to obtain a ciphertext of the filter to be queried;
the query decryption unit is used for performing mask removing calculation on the filter intersection ciphertext to obtain mask removing identity intersection; and based on full permutation, performing inverse permutation processing on the mask removing identity intersection to obtain a filter intersection.
Preferably, the queried second encryption module comprises a queried second key negotiation unit, and the queried second key negotiation unit is used for operating a DiffieHellman secure key negotiation protocol with the querying terminal once to obtain a second key; the second key is used to encrypt the queried set of identities a second time.
Preferably, querying the second encryption module comprises querying a second key negotiation unit, where the querying the second key negotiation unit is configured to run a DiffieHellman secure key negotiation protocol with the queried terminal once to obtain a second key; the second key is used for encrypting the identity set to be queried for the second time.
The encryption is carried out through a symmetric encryption algorithm based on key agreement, so that the efficiency of encrypting data of both sides can be effectively improved, and especially when the data scale is large, the efficiency of sharing the whole sensitive data can be obviously improved.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a computerreadable storage medium, such as a floppy disk, a ReadOnly Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes instructions for enabling an electronic device (which may be a mobile phone, a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
Various other modifications and changes may be made by those skilled in the art based on the abovedescribed technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.
Claims (9)
1. An epidemic situation information sharing method for protecting user privacy is characterized in that: the method comprises the following steps:
aligning the encrypted tobequeried identity information of a querying party and the encrypted queried identity information of a queried party to obtain accurate intersection information, wherein the accurate intersection information is an accurate intersection ciphertext or the accurate intersection information is the position of the accurate intersection ciphertext in the encrypted queried identity information;
sending the accurate intersection information to the inquired party;
the inquired party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party;
the method for aligning the encrypted tobequeried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information comprises the following steps:
the encrypted identity information to be queried and the encrypted queried identity information are aligned in a fuzzy manner to obtain a fuzzy intersection ciphertext, wherein each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information to be queried and at least one encrypted queried identity information;
sending the fuzzy intersection ciphertext to the inquiring party and the inquired party;
receiving a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext, wherein each encrypted data in the first ciphertext set corresponds to identity information to be inquired;
receiving a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext, wherein each encrypted data in the second ciphertext set corresponds to inquired identity information;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
2. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 1, wherein:
the first ciphertext set may be obtained by:
the inquiring party decrypts the fuzzy intersection ciphertext to obtain a first fuzzy intersection, and each data of the first fuzzy intersection corresponds to at least one identity information to be inquired;
the inquiring party obtains an identity set to be inquired according to the first fuzzy intersection, and conducts second encryption processing on the identity set to be inquired to obtain a first ciphertext set;
the second ciphertext set may be obtained by:
the inquired party decrypts the fuzzy intersection ciphertext to obtain a second fuzzy intersection, and each data of the second fuzzy intersection corresponds to at least one inquired identity information;
and the inquired party obtains an inquired identity set according to the second fuzzy intersection, and carries out second encryption processing on the inquired identity set to obtain a second ciphertext set.
3. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 2, wherein: the position of the inquired identity information in the inquired identity set is the same as the position of the inquired identity information in the second ciphertext set; accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information, including:
judging whether the first ciphertext set and the second ciphertext set are equal according to bits, and enabling the bits with the equal judgment result to correspond to the position in the second ciphertext set to serve as the accurate intersection information;
the inquired party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party, and the method comprises the following steps:
the inquired party acquires accurate intersection identity information according to the accurate intersection information and the inquired identity set;
inquiring a sensitive information table according to the accurate intersection identity information to obtain sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information;
and sending the sensitive information to the inquiring party.
4. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 1, wherein: before aligning the encrypted tobequeried identity information of the querying party with the encrypted queried identity information of the queried party, the method further comprises the following steps:
the inquired party generates an inquired identity filter in an offline mode according to the inquired identity information and the bloom filter, and encrypts the inquired identity filter for the first time to obtain an inquired filter ciphertext; wherein a bit with a value of 1 in the queried identity filter corresponds to at least one queried identity information;
the inquiring party generates an identity filter to be inquired according to the identity information to be inquired and the bloom filter, and encrypts the identity filter to be inquired for the first time to obtain a ciphertext of the filter to be inquired; wherein, a bit with a value of 1 in the identity filter to be queried corresponds to at least one identity information to be queried.
5. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 4, wherein: before the queried identity filter and the identity filter to be queried are encrypted for the first time, the queried party and the querying party perform key agreement for the first time to obtain a first key; and the inquired party and the inquiring party respectively encrypt the inquired identity filter and the tobeinquired identity filter for the first time based on the first secret key.
6. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 4, wherein: aligning the encrypted tobequeried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information, wherein the aligning comprises the following steps:
receiving the ciphertext of the filter to be queried;
obtaining the cipher text of the queried filter;
the cipher text of the inquired filter and the cipher text of the tobeinquired filter are aligned in a fuzzy mode to obtain filter intersection cipher text, and each encrypted data in the filter intersection cipher text corresponds to one bit in the inquired identity filter and one bit in the tobeinquired identity filter;
sending the filter intersection ciphertext to the inquired party and the inquiring party, and respectively carrying out decryption processing to obtain a filter intersection;
the inquiring party obtains a first ciphertext set based on the filter intersection; each encrypted data in the first ciphertext set corresponds to identity information to be queried;
the inquired party obtains a second ciphertext set based on the filter intersection; each piece of encrypted data in the second ciphertext set corresponds to queried identity information;
receiving the first set of ciphertexts and the second set of ciphertexts;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
7. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 6, wherein: the inquiring party obtains a first ciphertext set based on the filter intersection, and the method comprises the following steps:
the inquiring party generates an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information to be inquired in the identity filter to be inquired;
the inquiring party inquires the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired, and encrypts the identity set to be inquired for the second time to obtain the first ciphertext set;
the inquired party obtains a second ciphertext set based on the filter intersection, and the second ciphertext set comprises the following steps:
the inquired party generates an inquired identity mapping table in an offline manner according to the mapping relation between the inquired identity information and the position of the inquired identity information in the inquired identity filter;
and the inquired party inquires the inquired identity mapping table according to the filter intersection to obtain an inquired identity set, and encrypts the inquired identity set for the second time to obtain the second ciphertext set.
8. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 7, wherein: before encrypting the identity set to be queried and the queried identity set for the second time, the method further comprises the following steps:
the inquiring party and the inquired party perform second key agreement to obtain a second key; the inquiring party and the inquired party respectively encrypt the identity set to be inquired and the inquired identity set for the second time based on the second secret key;
the inquiring party and the inquired party perform the second key agreement, which comprises the following steps: the inquired party and the inquiring party run a DiffieHellman secure key agreement protocol once.
9. An epidemic situation information sharing system for protecting user privacy is characterized in that: the method comprises the following steps:
the inquiry terminal is used for acquiring identity information to be inquired; encrypting the identity information to be inquired to obtain encrypted identity information to be inquired and sending the encrypted identity information to the third party terminal; obtaining a first ciphertext set based on a fuzzy intersection ciphertext, and sending the first ciphertext set to a thirdparty terminal, wherein each piece of encrypted data in the first ciphertext set corresponds to one piece of identity information to be queried; sensitive information corresponding to accurate intersection information between the encrypted tobequeried identity information and the encrypted tobequeried identity information is received;
the inquired terminal is used for encrypting the prestored inquired identity information to obtain encrypted inquired identity information and sending the encrypted inquired identity information to the third party terminal; obtaining a second ciphertext set based on the fuzzy intersection ciphertext, and sending the second ciphertext set to a thirdparty terminal, wherein each piece of encrypted data in the second ciphertext set corresponds to one piece of queried identity information; obtaining sensitive information according to the accurate intersection information and sending the sensitive information to the query terminal;
the thirdparty terminal is used for aligning the encrypted tobequeried identity information and the encrypted tobequeried identity information to obtain accurate intersection information; sending the accurate intersection information to the inquired terminal; wherein, the aligning process of the encrypted tobequeried identity information and the encrypted queried identity information to obtain accurate intersection information comprises the following steps: the encrypted identity information to be queried and the encrypted queried identity information are aligned in a fuzzy manner to obtain a fuzzy intersection ciphertext, wherein each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information to be queried and at least one encrypted queried identity information; sending the fuzzy intersection ciphertext to the inquiry terminal and the inquired terminal; and receiving the first ciphertext set and the second ciphertext set, and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
Priority Applications (1)
Application Number  Priority Date  Filing Date  Title 

CN202010584407.9A CN111510464B (en)  20200624  20200624  Epidemic situation information sharing method and system for protecting user privacy 
Applications Claiming Priority (1)
Application Number  Priority Date  Filing Date  Title 

CN202010584407.9A CN111510464B (en)  20200624  20200624  Epidemic situation information sharing method and system for protecting user privacy 
Publications (2)
Publication Number  Publication Date 

CN111510464A CN111510464A (en)  20200807 
CN111510464B true CN111510464B (en)  20201002 
Family
ID=71872212
Family Applications (1)
Application Number  Title  Priority Date  Filing Date 

CN202010584407.9A Active CN111510464B (en)  20200624  20200624  Epidemic situation information sharing method and system for protecting user privacy 
Country Status (1)
Country  Link 

CN (1)  CN111510464B (en) 
Families Citing this family (1)
Publication number  Priority date  Publication date  Assignee  Title 

CN112800478B (en) *  20210407  20210706  支付宝(杭州)信息技术有限公司  Method, device and system for determining shared data for protecting private data 
Citations (11)
Publication number  Priority date  Publication date  Assignee  Title 

CN103095453A (en) *  20110708  20130508  Sap股份公司  Publickey Encrypted Bloom Filters With Applications To Private Set Intersection 
CN104572810A (en) *  20141117  20150429  深圳市光息谷科技发展有限公司  Method for carrying out operation processing on massive files by using bitmap 
CN105205406A (en) *  20150826  20151230  中国地质大学（武汉）  Intersection calculation method for privacy protection 
CN109657489A (en) *  20180803  20190419  湖北工业大学  A kind of safe calculation method of two side of set intersection and system of secret protection 
WO2019204711A1 (en) *  20180419  20191024  Google Llc  Security measures for determination of private set intersections 
CN110442570A (en) *  20190606  20191112  北京左江科技股份有限公司  A kind of BitMap high speed fuzzy search method 
CN110727960A (en) *  20191016  20200124  卓尔智联(武汉)研究院有限公司  Data intersection solving device and method based on privacy protection and readable storage medium 
CN111159252A (en) *  20191227  20200515  腾讯科技（深圳）有限公司  Transaction execution method and device, computer equipment and storage medium 
CN111178538A (en) *  20191217  20200519  杭州睿信数据科技有限公司  Federated learning method and device for vertical data 
CN111191282A (en) *  20191225  20200522  苏宁云计算有限公司  Sensitive data management method and system 
CN111311018A (en) *  20200304  20200619  苏州远征魂车船技术有限公司  Accurate management and control system of epidemic situation 

2020
 20200624 CN CN202010584407.9A patent/CN111510464B/en active Active
Patent Citations (11)
Publication number  Priority date  Publication date  Assignee  Title 

CN103095453A (en) *  20110708  20130508  Sap股份公司  Publickey Encrypted Bloom Filters With Applications To Private Set Intersection 
CN104572810A (en) *  20141117  20150429  深圳市光息谷科技发展有限公司  Method for carrying out operation processing on massive files by using bitmap 
CN105205406A (en) *  20150826  20151230  中国地质大学（武汉）  Intersection calculation method for privacy protection 
WO2019204711A1 (en) *  20180419  20191024  Google Llc  Security measures for determination of private set intersections 
CN109657489A (en) *  20180803  20190419  湖北工业大学  A kind of safe calculation method of two side of set intersection and system of secret protection 
CN110442570A (en) *  20190606  20191112  北京左江科技股份有限公司  A kind of BitMap high speed fuzzy search method 
CN110727960A (en) *  20191016  20200124  卓尔智联(武汉)研究院有限公司  Data intersection solving device and method based on privacy protection and readable storage medium 
CN111178538A (en) *  20191217  20200519  杭州睿信数据科技有限公司  Federated learning method and device for vertical data 
CN111191282A (en) *  20191225  20200522  苏宁云计算有限公司  Sensitive data management method and system 
CN111159252A (en) *  20191227  20200515  腾讯科技（深圳）有限公司  Transaction execution method and device, computer equipment and storage medium 
CN111311018A (en) *  20200304  20200619  苏州远征魂车船技术有限公司  Accurate management and control system of epidemic situation 
Also Published As
Publication number  Publication date 

CN111510464A (en)  20200807 
Similar Documents
Publication  Publication Date  Title 

US9704159B2 (en)  Purchase transaction system with encrypted transaction information  
Timothy et al.  A hybrid cryptography algorithm for cloud computing security  
CN109525386A (en)  A method of based on the privately owned intersection of Paillier homomorphic cryptography and  
US20040037424A1 (en)  Information distribution and processing  
CN109614792B (en)  Hierarchical file key management method  
CN105306194A (en)  Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol  
Gafsi et al.  High securing cryptography system for digital image transmission  
Sekar et al.  Comparative study of encryption algorithm over big data in cloud systems  
CN111510464B (en)  Epidemic situation information sharing method and system for protecting user privacy  
Chatterjee et al.  Cryptography in cloud computing: a basic approach to ensure security in cloud  
US20150205970A1 (en)  Data encryption using an external arguments encryption algorithm  
CN102752112A (en)  Authority control method and device based on signed message 1 (SM1)/SM2 algorithm  
CN112740615A (en)  Multiparty computed key management  
CN107317667B (en)  Early warning method and early warning device for identity document loss  
CN103607273B (en)  A kind of data file encipherdecipher method controlled based on time limit  
CN110474873B (en)  Electronic file access control method and system based on knowledge range encryption  
WO2017033843A1 (en)  Searchable cryptograph processing system  
CN111049738B (en)  Email data security protection method based on hybrid encryption  
US20200169541A1 (en)  Systems and methods for encryption  
Kaushik et al.  Secure cloud data using hybrid cryptographic scheme  
Taylor et al.  Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security  
Sriram et al.  Location based encryptiondecryption system for android  
CN111010386B (en)  Privacy protection and data supervision control method based on shared account book  
CN111541652B (en)  System for improving security of secret information keeping and transmission  
Sharma et al.  Key sharing technique to preserve integrity and confidentiality 
Legal Events
Date  Code  Title  Description 

PB01  Publication  
PB01  Publication  
SE01  Entry into force of request for substantive examination  
SE01  Entry into force of request for substantive examination  
GR01  Patent grant  
GR01  Patent grant  
TR01  Transfer of patent right 
Effective date of registration: 20210922 Address after: 311121 room 210, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou Bodun Xiyan Technology Co.,Ltd. Address before: Room 704, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province Patentee before: TONGDUN HOLDINGS Co.,Ltd. 

TR01  Transfer of patent right 