CN111510464B - Epidemic situation information sharing method and system for protecting user privacy - Google Patents

Epidemic situation information sharing method and system for protecting user privacy Download PDF

Info

Publication number
CN111510464B
CN111510464B CN202010584407.9A CN202010584407A CN111510464B CN 111510464 B CN111510464 B CN 111510464B CN 202010584407 A CN202010584407 A CN 202010584407A CN 111510464 B CN111510464 B CN 111510464B
Authority
CN
China
Prior art keywords
inquired
information
identity
party
queried
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010584407.9A
Other languages
Chinese (zh)
Other versions
CN111510464A (en
Inventor
汪宏
孟丹
李宏宇
李晓林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Bodun Xiyan Technology Co.,Ltd.
Original Assignee
Tongdun Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongdun Holdings Co Ltd filed Critical Tongdun Holdings Co Ltd
Priority to CN202010584407.9A priority Critical patent/CN111510464B/en
Publication of CN111510464A publication Critical patent/CN111510464A/en
Application granted granted Critical
Publication of CN111510464B publication Critical patent/CN111510464B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2468Fuzzy queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/80ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Abstract

The invention discloses an epidemic situation information sharing method and system for protecting user privacy, which relate to the technical field of data sharing, and comprise the following steps: the third party aligns the encrypted to-be-queried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information; the third party sends the accurate intersection information to the inquired party; and the inquired party obtains the sensitive information corresponding to the position according to the accurate intersection information and sends the sensitive information to the inquiring party. The method follows the principle of information minimization, only displays the information required by processing in the sharing process to each party, is beneficial to reducing the leakage risk of other information outside the intersection, reduces the operation on sensitive information to the greatest extent, can effectively protect the safety of the identity to be inquired, the inquired identity information and the sensitive information, is convenient for the inquirer to quickly obtain the sensitive information of the person to be inquired, has high sharing efficiency, and is suitable for data sharing of any scale.

Description

Epidemic situation information sharing method and system for protecting user privacy
Technical Field
The invention relates to the technical field of data sharing, in particular to an epidemic situation information sharing method and system for protecting user privacy.
Background
In order to suppress the development of epidemic situation of infectious disease caused by virus, real-time progress of the epidemic situation, such as confirmed people and suspected people every day, is often required to be issued in time, and then epidemic prevention and control means are adjusted in time according to the real-time progress of the epidemic situation. The disclosed information is mostly statistical data, and the specific sensitive information is only reported to a management organization, if not necessary, other individuals and organizations should not acquire privacy information such as personal identity therein. However, the dissynchronization of the epidemic situation information easily causes inconvenience in actual management, and even may generate a great epidemic situation risk, for example, a certain person A is isolated from the area A to the area B due to contact with a diagnosed patient, but the person A is not reported to the area A in time, so that the area A cannot timely examine the people who the person A contacts before leaving the area A, and the management of the person A has a blind area for a certain time; or a person has been isolated as a suspect by a local cell, but who does not respect the fact that management still goes to work privately and is hidden from the company, the company will face a great risk of epidemic propagation because it cannot acquire the necessary information.
Therefore, it is necessary to solve the problem of how to share sensitive information on the basis of protecting the privacy of the identity of an individual.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide an epidemic situation information sharing method for protecting user privacy, which obtains accurate intersection information between identity information to be queried and queried data through alignment processing, and a queried party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the queried party, so that the queried party can quickly and accurately obtain sensitive information of accurate intersection personnel, and meanwhile, information security is effectively protected.
One of the purposes of the invention is realized by adopting the following technical scheme:
an epidemic situation information sharing method for protecting user privacy comprises the following steps:
aligning the encrypted to-be-queried identity information of a querying party and the encrypted queried identity information of a queried party to obtain accurate intersection information, wherein the accurate intersection information is an accurate intersection ciphertext or the accurate intersection information is the position of the accurate intersection ciphertext in the encrypted queried identity information;
sending the accurate intersection information to the inquired party;
and the inquired party obtains the sensitive information corresponding to the position according to the accurate intersection information and sends the sensitive information to the inquiring party.
Further, aligning the encrypted to-be-queried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information, comprising:
the encrypted identity information to be queried and the encrypted queried identity information are aligned in a fuzzy manner to obtain a fuzzy intersection ciphertext, wherein each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information to be queried and at least one encrypted queried identity information;
sending the fuzzy intersection ciphertext to the inquiring party and the inquired party;
receiving a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext; each encrypted data in the first ciphertext set corresponds to identity information to be queried;
receiving a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext; each piece of encrypted data in the second ciphertext set corresponds to queried identity information;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
Further, the first ciphertext set may be obtained by:
the inquiring party decrypts the fuzzy intersection ciphertext to obtain a first fuzzy intersection, and each data of the first fuzzy intersection corresponds to at least one identity information to be inquired;
the inquiring party obtains an identity set to be inquired according to the first fuzzy intersection, and conducts second encryption processing on the identity set to be inquired to obtain a first ciphertext set;
the second ciphertext set may be obtained by:
the inquired party decrypts the fuzzy intersection ciphertext to obtain a second fuzzy intersection, and each data of the second fuzzy intersection corresponds to at least one inquired identity information;
and the inquired party obtains an inquired identity set according to the second fuzzy intersection, and carries out second encryption processing on the inquired identity set to obtain a second ciphertext set.
Further, the position of the queried identity information in the queried identity set is the same as the position of the queried identity information in the second ciphertext set; accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information, including:
judging whether the first ciphertext set and the second ciphertext set are equal according to bits, and enabling the bits with the equal judgment result to correspond to the position in the second ciphertext set to serve as the accurate intersection information;
the inquired party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party, and the method comprises the following steps:
the inquired party acquires accurate intersection identity information according to the accurate intersection information and the inquired identity set;
inquiring a sensitive information table according to the accurate intersection identity information to obtain sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information;
and sending the sensitive information to the inquiring party.
Further, before aligning the encrypted to-be-queried identity information of the querying party with the encrypted queried identity information of the queried party, the method further comprises the following steps:
the inquired party generates an inquired identity filter in an off-line mode according to the inquired identity information and the bloom filter, and encrypts the inquired identity filter for the first time to obtain an inquired filter ciphertext; wherein a bit with a value of 1 in the queried identity filter corresponds to at least one queried identity information;
the inquiring party generates an identity filter to be inquired according to the identity information to be inquired and the bloom filter, and encrypts the identity filter to be inquired for the first time to obtain a ciphertext of the filter to be inquired; wherein, a bit with a value of 1 in the identity filter to be queried corresponds to at least one identity information to be queried.
Further, before the queried identity filter and the to-be-queried identity filter are encrypted for the first time, the queried party and the querying party perform key agreement for the first time to obtain a first key; and the inquired party and the inquiring party respectively encrypt the inquired identity filter and the to-be-inquired identity filter for the first time based on the first secret key.
Further, aligning the encrypted to-be-queried identity information of the querying party and the encrypted queried identity information of the queried party to obtain an accurate intersection position, comprising:
receiving the ciphertext of the filter to be queried;
obtaining the cipher text of the queried filter;
the cipher text of the inquired filter and the cipher text of the to-be-inquired filter are aligned in a fuzzy mode to obtain filter intersection cipher text, and each encrypted data in the filter intersection cipher text corresponds to one bit in the inquired identity filter and one bit in the to-be-inquired identity filter;
sending the filter intersection ciphertext to the inquired party and the inquiring party, and respectively carrying out decryption processing to obtain a filter intersection;
the inquiring party obtains a first ciphertext set based on the filter intersection; each encrypted data in the first ciphertext set corresponds to identity information to be queried;
the inquired party obtains a second ciphertext set based on the filter intersection; each piece of encrypted data in the second ciphertext set corresponds to queried identity information;
receiving the first ciphertext set and the second ciphertext set;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
Further, the querying party obtains a first ciphertext set based on the filter intersection, including:
the inquiring party generates an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information to be inquired in the identity filter to be inquired;
the inquiring party inquires the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired, and encrypts the identity set to be inquired for the second time to obtain the first ciphertext set;
the inquired party obtains a second ciphertext set based on the filter intersection, and the second ciphertext set comprises the following steps:
the inquired party generates an inquired identity mapping table in an off-line manner according to the mapping relation between the inquired identity information and the position of the inquired identity information in the inquired identity filter;
and the inquired party inquires the inquired identity mapping table according to the filter intersection to obtain an inquired identity set, and encrypts the inquired identity set for the second time to obtain the second ciphertext set.
Further, before the identity set to be queried and the queried identity set are encrypted for the second time, the querying party and the queried party perform second key agreement to obtain a second key; the inquiring party and the inquired party respectively encrypt the identity set to be inquired and the inquired identity set for the second time based on the second secret key;
the inquiring party and the inquired party perform the second key agreement, which comprises the following steps: the inquired party and the inquiring party run a Diffie-Hellman secure key agreement protocol once.
The invention also aims to provide an epidemic situation information sharing system for protecting user privacy, which aligns encrypted to-be-queried identity information and encrypted to-be-queried identity information through a third-party terminal to obtain accurate intersection information, obtains sensitive information according to the accurate intersection information by a to-be-queried terminal and sends the sensitive information to a query terminal, so that the query terminal can quickly and accurately obtain the sensitive information of accurate intersection personnel between the to-be-queried identity information and the to-be-queried identity information, and meanwhile, effectively protects information security.
The second purpose of the invention is realized by adopting the following technical scheme:
an epidemic situation information sharing system for protecting user privacy, comprising:
the inquiry terminal is used for acquiring identity information to be inquired; encrypting the identity information to be inquired to obtain encrypted identity information to be inquired and sending the encrypted identity information to the third party terminal; receiving sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information;
the inquired terminal is used for encrypting the prestored inquired identity information to obtain encrypted inquired identity information and sending the encrypted inquired identity information to the third party terminal; obtaining sensitive information according to the accurate intersection information and sending the sensitive information to the query terminal;
the third-party terminal is used for aligning the encrypted inquiry identity information and the encrypted inquired identity information to obtain accurate intersection information; and sending the accurate intersection information to the inquired terminal. Compared with the prior art, the invention has the beneficial effects that:
the invention follows the principle of information minimization, so that an inquiring party can only obtain sensitive information of accurate intersection of two parties (namely, shared personnel), an inquired party can only obtain identity information of accurate intersection of the two parties, and the inquiring party, the inquired party and a third party can not obtain any other information, thereby being beneficial to reducing information leakage risks, reducing the operation of the inquired party on the sensitive information, effectively improving the safety of the sensitive information, ensuring that the inquiring party can quickly and accurately obtain the sensitive information of the personnel to be inquired, having high sharing efficiency and being suitable for data sharing of any scale.
Drawings
Fig. 1 is a flowchart of an epidemic situation information sharing method for protecting user privacy according to a first embodiment of the present invention;
fig. 2 is a flowchart of an epidemic situation information sharing method for protecting user privacy according to a second embodiment of the present invention;
FIG. 3 is a flowchart of a fourth encryption process according to the present invention;
fig. 4 is a flowchart of an epidemic situation information sharing method for protecting user privacy according to a fifth embodiment of the present invention;
FIG. 5 is a diagram of a queried identity filter according to a sixth embodiment of the invention;
fig. 6 is a diagram illustrating a queried identity mapping table according to a sixth embodiment of the present invention;
fig. 7 is a schematic diagram of a replacement process according to a sixth embodiment of the present invention.
Detailed Description
The present invention will now be described in more detail with reference to the accompanying drawings, in which the description of the invention is given by way of illustration and not of limitation. The various embodiments may be combined with each other to form other embodiments not shown in the following description.
Example one
The embodiment one provides an epidemic situation information sharing method for protecting user privacy, which aims to follow an information minimization principle, so that an inquiring party can only obtain sensitive information of accurate intersection of two parties (namely, shared personnel), and an inquired party can only obtain identity information of accurate intersection of the two parties.
Referring to fig. 1, an epidemic situation information sharing method for protecting user privacy includes the following steps:
and S10, the third party aligns the encrypted to-be-queried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information.
The identity information to be inquired comprises basic identity information (such as name, identification number, household/resident area and the like) of one or more persons to be inquired, and is identity information of internal persons which are authorized to be managed by an inquirer according to legal regulations, such as identity information of all staff in a certain enterprise and identity information of all persons in a certain government jurisdiction. The encrypted to-be-queried identity information can be uploaded in real time after the to-be-queried identity information is obfuscated by a querying party through encryption technologies such as symmetric encryption and asymmetric encryption.
The inquired identity information refers to basic identity information (such as names, identity numbers, household/resident places and the like) of a plurality of inquired persons of the inquired party. The encrypted queried identity information can be uploaded in real time after the queried identity information is obfuscated by a queried party through encryption technologies such as symmetric encryption and asymmetric encryption. The inquired party also has a sensitive information table corresponding to the inquired identity information, wherein the sensitive information belongs to private information which is protected by the inquired person according to law (for example, whether the inquired person is a suspected or confirmed person of infectious disease, the public deposit payment data of the inquired person, and the like).
The third party does not obtain any real identity information from the confused encrypted to-be-queried identity information and the encrypted to-be-queried identity information, and can obtain an accurate intersection ciphertext, namely encrypted data of the accurate intersection (namely common personnel) identity information of the two parties only by aligning the encrypted to-be-queried identity information and the encrypted to-be-queried identity information. And each data in the accurate intersection ciphertext belongs to the encrypted information of both sides at the same time, and the accurate intersection ciphertext is used as the accurate intersection information. Preferably, the third party judges whether the encrypted to-be-queried identity information and the encrypted to-be-queried identity information are equal according to bits, and the data with the equal judgment result is the accurate intersection ciphertext. The operation of judging the equality according to the bit is simple and quick, the software is convenient to realize, and the whole sharing efficiency is favorably improved.
And S20, the third party sends the accurate intersection information to the inquired party.
The inquired party only receives the accurate intersection ciphertext to ensure that the inquired party cannot obtain the identity information outside the accurate intersection, and also cannot obtain the identity information which does not belong to the inquired identity information, so that the information which can be obtained by the inquired party is minimized, and the safety of the identity information which does not belong to the accurate intersection in the identity information to be inquired can be protected.
And S30, the inquired party obtains the sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party.
Because the accurate intersection ciphertext corresponds to the unencrypted accurate intersection identity information of the two parties, the inquired party decrypts the accurate intersection identity information to obtain the accurate intersection identity information, and the accurate intersection identity information belongs to the identity information to be inquired and the inquired identity information at the same time. And then, inquiring the sensitive information table according to the accurate intersection identity information to obtain sensitive information corresponding to the shared personnel of the inquiring party and the inquired party, and sending the sensitive information to the inquiring party to ensure that the inquiring party can only obtain the sensitive information of the shared personnel of the two parties.
The whole data sharing process follows the information minimization principle, the inquiring party, the inquired party and the third party are ensured to only acquire information data related to operation, and sensitive information is only subjected to one-time operation after positioning by intersection personnel, so that the leakage risk of the sensitive information and other information outside the intersection can be effectively reduced, the data sharing efficiency is improved, and the data sharing method can be used for sharing data of any data scale.
In some other embodiments, the third party determines whether the encrypted to-be-queried identity information and the encrypted to-be-queried identity information are equal by bit, the data with the equal determination result is the accurate intersection ciphertext, and the position of the accurate intersection ciphertext in the encrypted to-be-queried identity information is used as the accurate intersection information. The third party sends the accurate intersection information to the inquired party, the accurate intersection information is the position information of the accurate intersection, the data volume of the accurate intersection information is less than that of the accurate intersection ciphertext information, the data transmission amount is reduced, and the data sharing efficiency is integrally improved. Because the position of the accurate intersection ciphertext in the encrypted inquired identity information is the same as the position of the accurate intersection identity information in the inquired identity information, namely the position information before and after encryption is the same, the inquired party can obtain the accurate intersection identity information according to the accurate intersection information, further inquire a sensitive information table corresponding to the identity information, obtain sensitive information of shared personnel between the identity information to be inquired and the inquired identity information, and send the sensitive information to the inquired party.
Example two
The second embodiment is an improvement on the first embodiment, the alignment processing includes fuzzy alignment and precise alignment, most identities which do not necessarily belong to a precise intersection (i.e. shared people) between the identity information to be queried and the identity information to be queried can be quickly screened out through the fuzzy alignment, the shared people can be accurately positioned from the screened people through the precise alignment, and the method is particularly suitable for large-scale data sharing. Referring to fig. 2, an epidemic situation information sharing method for protecting user privacy includes the following steps:
s201, the third party aligns the encrypted identity information to be inquired and the encrypted inquired identity information in a fuzzy mode to obtain a fuzzy intersection ciphertext.
Each encrypted data in the encrypted identity information to be queried corresponds to at least one identity information to be queried, and each encrypted data in the encrypted identity information to be queried corresponds to at least one queried identity information. The third party carries out fuzzy alignment on the encrypted information of the two parties, and can preliminarily screen and obtain overlapped data of the encrypted information of the two parties, namely fuzzy intersection ciphertext. Each encrypted data in the fuzzy intersection ciphertext simultaneously corresponds to at least one piece of encrypted to-be-queried identity information and at least one piece of encrypted to-be-queried identity information, so that the fuzzy intersection ciphertext contains encrypted data which simultaneously belong to people shared by two parties, and a small amount of encrypted data which only belong to a querying party or a queried party. For large-scale (e.g., hundred million) data, the precisely located data magnitude can be quickly reduced by fuzzy alignment while ensuring that no intersecting personnel are missed.
S202, the third party sends the fuzzy intersection ciphertext to the inquiring party and the inquired party.
The third party does not decrypt the fuzzy intersection ciphertext, so that the third party does not obtain any real identity information, and the risk of information leakage can be reduced.
S203, the third party receives a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext and receives a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext.
Preferably, the first set of ciphertexts and the second set of ciphertexts are obtained by: the inquiring party decrypts the fuzzy intersection ciphertext to obtain a first fuzzy intersection, and each data of the first fuzzy intersection corresponds to at least one identity information to be inquired; and the inquiring party obtains an identity set to be inquired according to the first fuzzy intersection, and performs second encryption processing on the identity set to be inquired to obtain a first ciphertext set. The inquired party decrypts the fuzzy intersection ciphertext to obtain a second fuzzy intersection, and each data of the second fuzzy intersection corresponds to at least one inquired identity information; and the inquired party obtains an inquired identity set according to the second fuzzy intersection, and carries out second encryption processing on the inquired identity set to obtain a second ciphertext set.
The identity information of the shared personnel of both parties exists in the identity set to be inquired and the identity set to be inquired. Each encrypted data in the first ciphertext set corresponds to one to-be-queried identity information in the to-be-queried identity set. Each encrypted data in the second ciphertext set corresponds to one queried identity set in the queried identity set. The identity set encryption processing of the two parties is separately carried out in respective local places, the information minimization principle is followed, the information leakage risk is reduced, and the security is higher.
Compared with the data volume of the encrypted identity information to be queried and the encrypted queried identity information, the data magnitude of the first ciphertext set and the second ciphertext set is greatly reduced, and the method is favorable for accelerating the accurate alignment speed. Each encrypted data in the first ciphertext set corresponds to one to-be-queried identity information, and each encrypted data in the second ciphertext set corresponds to one to-be-queried identity information.
And S204, the third party accurately aligns the first ciphertext set and the second ciphertext set to obtain accurate intersection information.
The third party does not obtain any real identity information from the first ciphertext set and the second ciphertext set, and only carries out accurate alignment processing on the first ciphertext set and the second ciphertext set to obtain accurate intersection ciphertext, namely encrypted data of the identity information of the accurate intersection (namely common personnel) of the two parties. And each data in the accurate intersection ciphertext belongs to the encrypted information of both sides at the same time, and the accurate intersection ciphertext is used as the accurate intersection information. Preferably, the third party first ciphertext set and the second ciphertext set judge whether they are equal by bit, and the data with the equal judgment result is the accurate intersection ciphertext.
The epidemic situation information sharing method for protecting the privacy of the user is particularly suitable for large-scale (even hundred million-level) data, and compared with the method that the large-scale one-to-one encrypted information is directly aligned to obtain accurate positioning, the data magnitude of the accurate positioning can be greatly reduced by screening out the data through fuzzy alignment, and the data sharing efficiency among the large-scale data is greatly improved. In the fuzzy alignment and accurate alignment processes, the third party does not decrypt the encrypted information, and sends the fuzzy intersection ciphertext to the inquiring party and the inquired party, so that the inquiring party and the inquired party can not obtain the personnel information which does not belong to the respective data, the information amount sent to the inquiring party and the inquired party is reduced as much as possible, and the data safety is effectively improved.
For a specific application of the second sharing method in this embodiment, reference may be made to the following description. For example, the identity information to be queried is basic identity information (including a name, an identity card number, a household registration/a household place) of all persons in a jurisdiction of a certain province government, the querying party is the certain province government, the queried identity information is basic identity information (including a name, an identity card number, a household registration/a household place) of a confirmed case of a certain infectious disease, the queried party is a certain disease control center and also has a sensitive information table (including sensitive information such as confirmed diagnosis time and cure time) corresponding to the queried identity information, and the third party is a credible government information platform or a third party organization.
And the third party aligns the encrypted identity information of all the personnel in a certain province and the encrypted identity information of the confirmed cases of the infectious diseases in a fuzzy manner to obtain a fuzzy intersection ciphertext and sends the fuzzy intersection ciphertext to the inquiring party and the inquired party. Each data in the encrypted information of the two parties corresponds to at least one identity information, and each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information of a certain province and at least one encrypted identity information of a confirmed case. And the third party receives a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext, for example, the identity ciphertext set D of all the personnel in the C street of the prefecture in the B district of the A-level city of a certain province, so that the personnel in the province outside the C street are not confirmed cases, and the confirmed cases exist in the identity ciphertext set D. And the third party receives a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext, for example, the identity ciphertext set E of the place-level city of a certain province, wherein the identity ciphertext set D and the identity ciphertext set E are greatly reduced in data magnitude compared with the identity information of all the personnel of the certain province and the confirmed case data of the certain infectious disease. And the identity ciphertext set D and the identity ciphertext set E are accurately aligned by the third party, so that the confirmed case in the street C can be accurately positioned. If the encrypted identity information of confirmed cases of all the people in a certain province and a certain infectious disease is directly aligned one to one, the confirmed cases are positioned from all the people in a certain province, the data sharing efficiency is low due to the huge data scale, and the sharing method of the second embodiment can greatly improve the sharing efficiency of large-scale data.
In other embodiments, the third party judges whether the first ciphertext set and the second ciphertext set are equal according to bits, and the bits which are equal in the judgment result are corresponding to the positions in the second ciphertext set to serve as accurate intersection information, so that the data volume is smaller than that of the accurate intersection ciphertext information, the data transmission volume is reduced, and the data sharing efficiency is integrally improved. The position of the inquired identity information in the inquired identity set is the same as the position of the inquired identity information in the second ciphertext set, the inquired party can obtain the accurate intersection identity information according to the accurate intersection information and the inquired identity set, then, a sensitive information table is inquired according to the accurate intersection identity information, sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information is obtained, and the sensitive information is sent to the inquired party.
EXAMPLE III
The third embodiment is an improvement on the first embodiment and/or the second embodiment, before the third party aligns the encrypted to-be-queried identity information and the encrypted to-be-queried identity information, the queried party and the querying party respectively generate respective identity filters according to the to-be-queried identity information and the queried identity information, the identity filters hide the identity information, protect data security, save storage space and improve data sharing efficiency.
The inquired identity information comprises epidemic situation identity information, such as the names of suspected, isolated and confirmed personnel, identity cards, household registration and other basic identity information, and the information can be acquired by the inquired party in advance and updated regularly, so that the accuracy of data is ensured, and meanwhile, the time for sharing the data in real time is reduced.
The filter is generally in the form of a binary string or array, wherein 0 indicates that no identity information is encoded in the location, 1 indicates that at least one identity information is encoded in the location, the identity information can be effectively hidden, and the length of the filter is only related to the size of the data, even if the size of the filter is less than 10MB when the length of the filter is 1 hundred million, the storage space can be effectively saved, and the efficiency of data encryption and transmission can be improved.
The inquired party generates an inquired identity filter according to the epidemic situation identity information and the bloom filter, and a bit with a value of 1 in the inquired identity filter corresponds to at least one epidemic situation identity information. And the inquiring party generates an identity filter to be inquired according to the identity information to be inquired and the bloom filter, wherein a bit with a value of 1 in the identity filter to be inquired corresponds to at least one identity information to be inquired.
A bloom filter is a long binary vector and a series of random mapping functions that can be used to retrieve whether an element is in a set. Compared with other data structures, the bloom filter can represent a complete set, has great advantages in terms of space and time, is constant in storage space and insertion/query time, does not need storage elements per se, and has advantages in occasions with strict requirements on confidentiality.
Preferably, in order to improve the generation efficiency of the identity filter, only 1 Hash function is used to calculate the index of each identity information, and the position of the corresponding index in the bloom filter with the initial value of all 0 is set to be 1, which indicates that at least one identity information exists and is encoded to the position, thereby obtaining the queried identity filter and the identity filter to be queried. For example, the index calculation formula of each epidemic situation identity information is idx _ i = Hash (ID _ i)% length, where ID _ i represents the ith epidemic situation identity information, length is the length of the queried identity filter, in practical application, the maximum data size of both parties is generally multiplied, Hash is any cryptographic secure Hash function, and after calculation is completed, the idx _ i bit in the queried identity filter is set to 1.
In order to further hide the identity information of the two parties and protect the data security, the inquired party encrypts the inquired identity filter for the first time to obtain the ciphertext of the inquired filter, and the inquiring party encrypts the identity filter to be inquired for the first time to obtain the ciphertext of the filter to be inquired.
In other embodiments, the inquired party periodically generates the inquired identity filter in an off-line manner according to the epidemic situation identity information, so that the repeated calculation of the inquired identity filter can be avoided when the data is shared on-line in real time, and the data sharing efficiency is improved.
Example four
The fourth embodiment is an improvement on the third embodiment, and the inquired party and the inquiring party encrypt the identity filters of the inquired party and the inquired party by using a symmetric encryption method, so that the data encryption efficiency is improved, and the data sharing efficiency is integrally improved.
Before the inquired identity filter and the identity filter to be inquired are encrypted for the first time, the inquired party and the inquiring party perform key agreement for the first time to obtain a first key; the inquired party and the inquiring party respectively encrypt the inquired identity filter and the to-be-inquired identity filter for the first time based on the first secret key. The symmetric encryption method is used for encrypting the identity filters of the two parties, so that the data encryption efficiency can be effectively improved, particularly when the data scale is large, the encryption efficiency is remarkably improved, the data sharing efficiency is further improved, only the inquiring party and the inquired party can decrypt the encrypted filter ciphertext, and the information safety of the two parties is improved.
Preferably, the inquired party and the inquiring party run a Diffie-Hellman secure key agreement protocol twice to obtain a first key comprising a key A and a key B, so that the operation is more secure. The Diffie-Hellman key agreement algorithm generates a secret value which can be used as a symmetric key, a key can be agreed under the condition that two parties negotiating the key do not reveal the key, and the agreed key cannot be quickly decrypted.
The inquired party and the inquiring party respectively encrypt the inquired identity filter and the to-be-inquired identity filter for the first time based on the first secret key, as shown in fig. 3, including the following steps:
s310, generating a full permutation according to the key A.
The sequence of each bit in the identity filter can be disturbed according to the full permutation generated by the secret key A, and the safety is improved. Methods for generating full permutation include, but are not limited to, generation using AES-FF1 mode, generation using Fisher-Yates algorithm. Preferably, an AES-FF1 mode is adopted, the plaintext space and the ciphertext space of the encryption model are the same, theoretically, for the plaintext space and the ciphertext space of any size, the encryption and the decryption in the mode are mapped one by one, and full permutation can be generated through the mode.
And S320, generating a mask according to the key B.
According to the key B, a bit combination set to be on (1) or off (0), namely a mask is generated, the mask facilitates data calculation, and data processing efficiency is improved. Preferably, the mask may employ a secure pseudo-random number generator, such as the HMAC _ DRBG method, to generate a random bit string and truncate the required length. The pseudo-random number generator determines the output at the same time under the condition of determining the input, the same input necessarily results in the same output, the realization is generally only dependent on a software algorithm, the requirement on a system is low, and the application range is wide.
S330, based on full permutation, the inquired party and the inquiring party respectively carry out permutation processing on the inquired identity filter and the identity filter to be inquired to obtain the inquired permutation filter and the permutation filter to be inquired.
And S340, the inquired party and the inquiring party respectively carry out mask operation on the inquired displacement filter and the to-be-inquired displacement filter to obtain the cipher text of the inquired filter and the cipher text of the to-be-inquired filter.
The inquired party and the inquiring party respectively judge whether the bits at the same index position are equal with the inquired permutation filter and the permutation filter to be inquired according to the bits with the mask, if so, the result corresponding to the bit is 1, and if not, the result is 0. For example, assuming that the queried filter is 10000011, the mask is 10110100, and 10000011 and 10110100 determine whether they are equal by bit, the ciphertext of the queried filter is 11001000.
The inquiring party and the inquired party obtain the same full permutation and the same mask according to the same key A and the same key B. According to the same full permutation and the same mask, the consistency of the encryption of the inquirer and the inquired party can be kept, and the accuracy of the fuzzy alignment result is further ensured.
In other embodiments, the queried identity filter and the to-be-queried identity filter may be encrypted for the first time by using an asymmetric encryption algorithm, which is more secure, but the algorithm strength is complex, the security depends on the algorithm and the key, and the efficiency of data encryption is lower than that of a symmetric encryption algorithm.
EXAMPLE five
The fifth embodiment is an improvement on the fourth embodiment, the third party performs fuzzy alignment and precise alignment on the cipher text of the queried filter and the cipher text of the filter to be queried, most identities which do not belong to precise intersection (namely common personnel) between the identity information to be queried and the epidemic situation identity information can be rapidly screened out through the fuzzy alignment, the data magnitude of precise positioning is greatly reduced, the common personnel can be accurately positioned from the screened personnel through the precise alignment, the data sharing efficiency can be effectively improved, and particularly, the sharing among large-scale data is safe and effective. As shown in fig. 4, the method comprises the following steps:
and S410, the third party receives the ciphertext of the filter to be queried and acquires the ciphertext of the queried filter.
And S420, the third party fuzzily aligns the cipher text of the queried filter and the cipher text of the filter to be queried to obtain the filter intersection cipher text.
And the third party judges whether the cipher text of the inquired filter and the cipher text of the to-be-inquired filter are equal by bit, data with the equal judgment result is used as the filter intersection cipher text, and each encrypted data in the filter intersection cipher text corresponds to one bit in the inquired identity filter and one bit in the to-be-inquired identity filter. Through fuzzy alignment, a large amount of encrypted data which are not overlapped by filter ciphertexts of both sides are screened out, the data magnitude of accurate alignment processing is greatly reduced, identity information of common personnel of both sides is guaranteed not to be omitted, and accuracy of accurate alignment results is guaranteed.
And S430, the third party sends the filter intersection ciphertext to the inquired party and the inquiring party, and decryption processing is respectively carried out to obtain the filter intersection.
Preferably, the third party sends the filter intersection ciphertext to the inquired party and the inquiring party, and performs decryption processing respectively, including the following steps:
the inquired party and the inquiring party respectively carry out mask removing calculation on the filter intersection ciphertext to obtain mask removing identity intersection; and based on full permutation, performing inverse permutation processing on the mask removing identity intersection to obtain a filter intersection.
And respectively carrying out bitwise AND operation on the filter intersection ciphertext and the queried replacement filter and the replacement filter to be queried in the first encryption process by the queried party and the querying party to obtain the same mask removing identity intersection. And based on the same full permutation, the same mask removing identity intersection is subjected to inverse permutation treatment to obtain the same filter intersection. Experiments can prove that the inquired identity filter and the identity filter to be inquired are directly the same as the filter intersection obtained by decryption according to the phase and the obtained intersection, so that the accuracy of the data before and after the first encryption and decryption is ensured.
S440, the inquiring party obtains a first ciphertext set based on the filter intersection, and the inquired party obtains a second ciphertext set based on the filter intersection.
Each encrypted data in the first ciphertext set corresponds to one to-be-queried identity information, and each encrypted data in the second ciphertext set corresponds to one epidemic situation identity information. The data magnitude of the first ciphertext set and the second ciphertext set is further reduced compared with the ciphertext of the inquired filter and the ciphertext of the filter to be inquired, so that the data transmission is accelerated, and the accurate alignment efficiency is improved.
Preferably, the querying party obtains the first ciphertext set based on the filter intersection, including: the inquiring party generates an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information in the identity filter to be inquired; and inquiring the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired, and encrypting the identity set to be inquired for the second time to obtain a first ciphertext set. The inquired party obtains a second ciphertext set based on the filter intersection, and the second ciphertext set comprises the following steps: the inquired party generates an inquired identity mapping table in an off-line manner according to the mapping relation between the epidemic situation identity information and the position of the inquired identity information in the inquired identity filter; and inquiring the inquired identity mapping table according to the filter intersection to obtain an inquired identity set, and encrypting the inquired identity set for the second time to obtain a second ciphertext set.
The inquired identity mapping table represents at least one epidemic situation identity information corresponding to a bit with a value of 1 in the inquired identity filter, the to-be-inquired identity mapping table represents at least one to-be-inquired identity information corresponding to a bit with a value of 1 in the to-be-inquired identity filter, the to-be-inquired identity mapping table is favorable for quickly searching the identity information corresponding to the filter, and the efficiency is high.
Preferably, in order to improve the security, the Hash value or the ciphertext of each identity information is stored in each of the identity mapping table to be queried and the identity mapping table to be queried, and the querying party and the queried party respectively decrypt the Hash value or the ciphertext in each identity mapping table and then query to obtain the identity set to be queried and the identity set to be queried.
S450, the third party receives the first ciphertext set and the second ciphertext set.
And S460, the third party accurately aligns the first ciphertext set and the second ciphertext set to obtain accurate intersection information.
And the third party aligns the two ciphertext sets of the encrypted data corresponding to the identity information accurately, judges whether the first ciphertext set and the second ciphertext set are equal according to the position to obtain the overlapped data of the ciphertext sets of the two parties, namely the accurate intersection information, and can quickly and accurately position the shared personnel of the two parties.
In the fuzzy alignment and accurate alignment processes, the third party does not decrypt the encrypted information, and sends the filter intersection ciphertext to the inquiring party and the inquired party, so that the inquiring party and the inquired party can not obtain the personnel information which does not belong to the respective data, the information amount sent to the inquiring party and the inquired party is reduced as much as possible, and the data safety is effectively improved.
In other embodiments, the querying party and the queried party perform the second key negotiation before the second encryption to obtain the second key, and the querying party and the queried party perform the second encryption on the identity set to be queried and the queried identity set respectively based on the second key. By adopting the symmetric encryption method, the data encryption efficiency can be effectively improved. Preferably, the inquired party and the inquiring party run a Diffie-Hellman secure key agreement protocol once to complete the second key agreement to obtain the second key, which can protect the data security and accelerate the data encryption speed.
And performing second encryption according to the second key by using an encryption method including but not limited to salt Hash (the key is used as a salt value), HMAC and AES symmetric encryption algorithms. Preferably, the AES symmetric encryption algorithm is adopted for the second encryption, the encryption speed is very high, and the encryption efficiency can be further improved.
In other embodiments, an asymmetric encryption algorithm may be used for the second encryption, which is more secure.
In other embodiments, the third party uses the positions of the bits of the ciphertext sets with the same bit judgment result as the bit positions of the ciphertext sets as the accurate intersection information, so that the data transmission quantity is reduced, and the data sharing efficiency is improved.
EXAMPLE six
The sixth embodiment is a specific application embodiment of the fifth embodiment, wherein a certain organization is an inquiring party, a certain epidemic control center is an inquired party, and a third party is a trusted government information platform or a third party organization, and the organization needs to obtain whether the internal personnel of the organization is suspected, confirmed or isolated from the epidemic control center. The third party carries out fuzzy alignment and accurate alignment on the encrypted to-be-inquired identity information of the personnel in the mechanism and the encrypted epidemic situation identity information of the epidemic situation control center, can quickly obtain accurate intersection information and send the accurate intersection information to the epidemic situation control center, the epidemic situation control center obtains epidemic situation sensitive information according to the accurate intersection information and sends the epidemic situation sensitive information to the mechanism, and the mechanism can quickly and accurately obtain the sensitive information of whether the personnel in the mechanism are suspected, confirmed or isolated, thereby being beneficial to the mechanism to take timely and effective epidemic situation prevention and control measures and reducing the epidemic situation risk. The whole process follows the principle of information minimization, all parties can not acquire data which is not involved in the processing, and the information safety of all parties can be effectively protected.
For convenience of description, it is assumed that the length of the identity filter is 8, the querying party uses its insiders { Eda, Charlie, Jack } as the identity information to be queried, and the epidemic situation identity information on the queried party is { Alice, Bob, Charlie, Darwin }. Referring to fig. 5, a queried identity filter is generated to be 01100010, according to the queried identity filter, encrypted epidemic situation identity information is recorded in a queried identity mapping table as shown in fig. 6, the identity information in fig. 6 is only convenient to understand, and in practical application, in order to meet the requirement of security compliance, stored data should be a Hash value or a ciphertext of the identity information. In the same generation manner, it is assumed that the identity filter to be queried 10100010 and the corresponding identity mapping table to be queried are obtained.
The inquiring party and the inquired party run a Diffie-Hellman security key agreement protocol twice to carry out the first key agreement, and jointly negotiate out a key A and a key B. The two parties generate ciphertexts from 0 to 7 by using a key A in an AES-FF1 mode to obtain the same full permutation, and randomly generate an 8-bit string as the same mask by using a key B in an HMAC _ DRBG method. Assuming that the generated full permutation is as shown in the table below (direction from left to right), the randomly generated mask is 10110100.
TABLE 1 full permutation
Based on the full permutation shown in table 1, the queried party performs a permutation process on queried identity filter 01100010, as shown in fig. 7, to obtain queried permutation filter 10000011. The queried filter 10000011 and the mask 10110100 are bitwise judged to be equal to each other, and a queried filter ciphertext 11001000 is obtained. Based on the same full permutation and mask, the inquiring party encrypts the identity filter to be inquired 10100010 for the first time to obtain the ciphertext 11011010 of the filter to be inquired.
The third party makes fuzzy alignment between the cipher text 11001000 of the inquired filter and the cipher text 11011010 of the to-be-inquired filter, judges whether the cipher texts are equal according to the bit, obtains the filter intersection cipher text 11101101, and sends the filter intersection cipher text 11101101 back to the inquired party and the inquiring party.
The filter intersection ciphertext 11101101 is decrypted by the inquired party and the inquiring party based on the first key. And the inquired party carries out mask removing calculation on the fuzzy identity intersection ciphertext 11101101, the fuzzy identity intersection ciphertext 11101101 and the inquired replacement filter 10000011 are subjected to phase and to obtain a mask removing identity intersection 10000001, and reverse replacement processing is carried out on the basis of the full replacement arrangement shown in the table 1 to obtain a filter intersection 00100010. The inquiring party also decrypts the filter intersection ciphertext 11101101 to obtain the same filter intersection 00100010. The bitwise and-wise negation of the original queried identity filter 01100010 with the to-be-queried identity filter 10100010 yields an intersection 00100010 that is the same as the filter intersection obtained by decryption. Therefore, the fuzzy alignment can keep the original information of the data while protecting the privacy information of both parties, and ensure that common people can be accurately positioned.
The inquired party and the inquiring party respectively inquire the inquired identity mapping table and the to-be-inquired identity mapping table according to the filter intersection 00100010 to obtain a list-form inquired identity set [ Alice, Charlie, Darwin ] and a to-be-inquired identity set [ Charlie, Jack ]. The values in the set are only for convenience of presentation and are actually typically Hash values of the identity information. Identity information which does not belong to common people of two parties can be quickly screened out through fuzzy alignment, screening personnel are fewer for convenient display, and a large amount of non-common people can be screened out when the scale of the identity information is huge.
The inquiring party and the inquired party operate a Diffie-Hellman security key agreement protocol for the first time, and perform the second key agreement to obtain the same second key. And the two parties respectively encrypt the elements in the inquired identity set and the identity set to be inquired for the second time by using the second key and adopting an AES symmetric encryption algorithm as an encryption mode to obtain a second ciphertext set and a first ciphertext set.
And the third party judges whether the second ciphertext set and the first ciphertext set are equal according to the bit to obtain a ciphertext corresponding to the accurate identity intersection of the two parties, and the position of each encrypted data in the ciphertext in the second ciphertext set is used as accurate intersection information and returned to the inquired party.
Assuming that the accurate intersection information received by the inquired party is [1], the accurate intersection identity information of the inquired party and the inquired party obtained corresponding to the identity set to be inquired is Charlie, and the epidemic situation sensitive information table is inquired according to the identity information to obtain the epidemic situation sensitive information corresponding to the Charlie and sent to the inquired party. The inquiring party can quickly obtain epidemic situation sensitive information corresponding to Charlie, and effective prevention and control measures are taken according to the epidemic situation sensitive information, so that time blind zones in management caused by asynchronous information are avoided, and epidemic situation risks are reduced.
EXAMPLE seven
The seventh embodiment is an epidemic situation information sharing system for protecting user privacy, which corresponds to the epidemic situation information sharing method for protecting user privacy in the above embodiments, is safe and effective, and is suitable for data sharing of any scale.
An epidemic situation information sharing system for protecting user privacy, comprising:
the inquiry terminal is used for acquiring identity information to be inquired; encrypting the identity information to be queried to obtain encrypted identity information to be queried and sending the encrypted identity information to the third-party terminal; receiving sensitive information corresponding to the accurate intersection between the identity information to be queried and the queried identity information;
the inquired terminal is used for encrypting the prestored inquired identity information to obtain encrypted inquired identity information and sending the encrypted inquired identity information to the third party terminal; obtaining sensitive information according to the accurate intersection information and sending the sensitive information to the query terminal;
the third-party terminal is used for aligning the encrypted inquiry identity information and the encrypted inquired identity information to obtain accurate intersection information; and sending the accurate intersection information to the inquired terminal.
The inquiry terminal can only obtain the sensitive information of the accurate intersection of the two parties (namely, the shared personnel), the inquired terminal can only obtain the identity information of the accurate intersection of the two parties, and in addition, the inquiry terminal, the inquired terminal and the third party terminal can not obtain any other information, so that the information leakage risk is favorably reduced, the operation on the sensitive information is reduced, and the safety of the sensitive information is effectively improved.
Preferably, the queried terminal comprises a queried first encryption and decryption module, a queried second encryption module and a sensitive information query module;
the inquired first encryption and decryption module is used for generating an inquired identity filter in an off-line mode according to the inquired identity information and the bloom filter; encrypting the inquired identity filter for the first time to obtain an inquired filter ciphertext and sending the inquired filter ciphertext to the third-party terminal; decrypting a filter intersection ciphertext sent by a third-party terminal to obtain a filter intersection;
the inquired second encryption module is used for generating an inquired identity mapping table in an off-line manner according to the mapping relation between the inquired identity information and the position of the inquired identity information in the inquired identity filter; inquiring the inquired identity mapping table according to the filter intersection to obtain an inquired identity set; encrypting the inquired identity set for the second time to obtain a second ciphertext set and sending the second ciphertext set to the third party terminal;
the sensitive information query module is used for obtaining accurate intersection identity information according to the accurate intersection information sent by the third-party terminal; and inquiring the sensitive information table according to the accurate intersection identity information to obtain sensitive information and sending the sensitive information to the inquiry terminal.
Preferably, the inquiry terminal comprises an inquiry first encryption and decryption module and an inquiry second encryption module;
the query first encryption and decryption module is used for generating an identity filter to be queried according to the identity information to be queried and the bloom filter; encrypting the identity filter to be queried for the first time to obtain a ciphertext of the identity filter to be queried and sending the ciphertext to the third-party terminal; decrypting a filter intersection ciphertext sent by a third-party terminal to obtain a filter intersection;
the inquiry second encryption module is used for generating an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information in the identity filter to be inquired; inquiring the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired; and encrypting the identity set to be queried for the second time to obtain a first ciphertext set and sending the ciphertext set to the third party terminal.
Preferably, the third party terminal comprises a fuzzy alignment module and a precise alignment module;
the fuzzy alignment module is used for receiving a ciphertext of the filter to be queried; obtaining a cipher text of the queried filter; fuzzy alignment is carried out on the cipher text of the inquired filter and the cipher text of the filter to be inquired to obtain filter intersection cipher text which is sent to the inquiry terminal and the inquired terminal;
the precise alignment module is used for receiving the first ciphertext set and the second ciphertext set; and accurately aligning the first ciphertext set and the second ciphertext set to obtain accurate intersection information, wherein the accurate intersection information is the position of the accurate intersection ciphertext in the second ciphertext set.
The fuzzy alignment module and the precise alignment module can obviously improve the sharing efficiency of large-scale (hundred million-level) data and ensure the accuracy at the same time. The fuzzy alignment module can exclude most identity information which does not belong to accurate intersection (namely common personnel) between the identity information to be inquired and the identity information to be inquired, so that the data magnitude is reduced rapidly, the accurate alignment speed is increased, and meanwhile, the intersection personnel are not omitted. The position of the accurate intersection ciphertext in the second ciphertext set is obtained through the accurate alignment module, so that the data transmission quantity can be reduced, and the sharing efficiency is further improved.
Preferably, the queried first encryption and decryption module comprises a queried first key negotiation unit, an epidemic situation filter encryption unit and a queried decryption unit;
the inquired first key negotiation unit is used for operating a Diffie-Hellman security key negotiation protocol twice with the inquiry terminal to obtain a first key, and the first key comprises a key A and a key B;
the epidemic situation filter encryption unit is used for generating full permutation and replacement according to the secret key A; generating a mask according to the key B; based on the full permutation, the queried identity filter is permuted to obtain a queried permutation filter; the queried substitution filter and the mask operate according to bits to obtain a ciphertext of the queried filter;
the queried filter decryption unit is used for performing mask removing calculation on the filter intersection ciphertext to obtain mask removing identity intersection; and based on full permutation, performing inverse permutation processing on the mask removing identity intersection to obtain a filter intersection.
Preferably, querying the first encryption and decryption module comprises querying a first key negotiation unit, querying a filter encryption unit and querying a decryption unit;
inquiring a first key negotiation unit, which is used for operating a Diffie-Hellman security key negotiation protocol twice with an inquired terminal to obtain a first key, wherein the first key comprises a key A and a key B;
the inquiry filter encryption unit is used for generating full permutation according to the key A; generating a mask according to the key B; based on the full permutation, carrying out permutation treatment on the identity filter to be queried to obtain a permutation filter to be queried; the permutation filter to be queried and the mask are operated according to bits to obtain a ciphertext of the filter to be queried;
the query decryption unit is used for performing mask removing calculation on the filter intersection ciphertext to obtain mask removing identity intersection; and based on full permutation, performing inverse permutation processing on the mask removing identity intersection to obtain a filter intersection.
Preferably, the queried second encryption module comprises a queried second key negotiation unit, and the queried second key negotiation unit is used for operating a Diffie-Hellman secure key negotiation protocol with the querying terminal once to obtain a second key; the second key is used to encrypt the queried set of identities a second time.
Preferably, querying the second encryption module comprises querying a second key negotiation unit, where the querying the second key negotiation unit is configured to run a Diffie-Hellman secure key negotiation protocol with the queried terminal once to obtain a second key; the second key is used for encrypting the identity set to be queried for the second time.
The encryption is carried out through a symmetric encryption algorithm based on key agreement, so that the efficiency of encrypting data of both sides can be effectively improved, and especially when the data scale is large, the efficiency of sharing the whole sensitive data can be obviously improved.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes instructions for enabling an electronic device (which may be a mobile phone, a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
Various other modifications and changes may be made by those skilled in the art based on the above-described technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.

Claims (9)

1. An epidemic situation information sharing method for protecting user privacy is characterized in that: the method comprises the following steps:
aligning the encrypted to-be-queried identity information of a querying party and the encrypted queried identity information of a queried party to obtain accurate intersection information, wherein the accurate intersection information is an accurate intersection ciphertext or the accurate intersection information is the position of the accurate intersection ciphertext in the encrypted queried identity information;
sending the accurate intersection information to the inquired party;
the inquired party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party;
the method for aligning the encrypted to-be-queried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information comprises the following steps:
the encrypted identity information to be queried and the encrypted queried identity information are aligned in a fuzzy manner to obtain a fuzzy intersection ciphertext, wherein each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information to be queried and at least one encrypted queried identity information;
sending the fuzzy intersection ciphertext to the inquiring party and the inquired party;
receiving a first ciphertext set obtained by the inquiring party based on the fuzzy intersection ciphertext, wherein each encrypted data in the first ciphertext set corresponds to identity information to be inquired;
receiving a second ciphertext set obtained by the inquired party based on the fuzzy intersection ciphertext, wherein each encrypted data in the second ciphertext set corresponds to inquired identity information;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
2. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 1, wherein:
the first ciphertext set may be obtained by:
the inquiring party decrypts the fuzzy intersection ciphertext to obtain a first fuzzy intersection, and each data of the first fuzzy intersection corresponds to at least one identity information to be inquired;
the inquiring party obtains an identity set to be inquired according to the first fuzzy intersection, and conducts second encryption processing on the identity set to be inquired to obtain a first ciphertext set;
the second ciphertext set may be obtained by:
the inquired party decrypts the fuzzy intersection ciphertext to obtain a second fuzzy intersection, and each data of the second fuzzy intersection corresponds to at least one inquired identity information;
and the inquired party obtains an inquired identity set according to the second fuzzy intersection, and carries out second encryption processing on the inquired identity set to obtain a second ciphertext set.
3. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 2, wherein: the position of the inquired identity information in the inquired identity set is the same as the position of the inquired identity information in the second ciphertext set; accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information, including:
judging whether the first ciphertext set and the second ciphertext set are equal according to bits, and enabling the bits with the equal judgment result to correspond to the position in the second ciphertext set to serve as the accurate intersection information;
the inquired party obtains sensitive information according to the accurate intersection information and sends the sensitive information to the inquiring party, and the method comprises the following steps:
the inquired party acquires accurate intersection identity information according to the accurate intersection information and the inquired identity set;
inquiring a sensitive information table according to the accurate intersection identity information to obtain sensitive information corresponding to the accurate intersection between the identity information to be inquired and the inquired identity information;
and sending the sensitive information to the inquiring party.
4. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 1, wherein: before aligning the encrypted to-be-queried identity information of the querying party with the encrypted queried identity information of the queried party, the method further comprises the following steps:
the inquired party generates an inquired identity filter in an off-line mode according to the inquired identity information and the bloom filter, and encrypts the inquired identity filter for the first time to obtain an inquired filter ciphertext; wherein a bit with a value of 1 in the queried identity filter corresponds to at least one queried identity information;
the inquiring party generates an identity filter to be inquired according to the identity information to be inquired and the bloom filter, and encrypts the identity filter to be inquired for the first time to obtain a ciphertext of the filter to be inquired; wherein, a bit with a value of 1 in the identity filter to be queried corresponds to at least one identity information to be queried.
5. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 4, wherein: before the queried identity filter and the identity filter to be queried are encrypted for the first time, the queried party and the querying party perform key agreement for the first time to obtain a first key; and the inquired party and the inquiring party respectively encrypt the inquired identity filter and the to-be-inquired identity filter for the first time based on the first secret key.
6. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 4, wherein: aligning the encrypted to-be-queried identity information of the querying party and the encrypted queried identity information of the queried party to obtain accurate intersection information, wherein the aligning comprises the following steps:
receiving the ciphertext of the filter to be queried;
obtaining the cipher text of the queried filter;
the cipher text of the inquired filter and the cipher text of the to-be-inquired filter are aligned in a fuzzy mode to obtain filter intersection cipher text, and each encrypted data in the filter intersection cipher text corresponds to one bit in the inquired identity filter and one bit in the to-be-inquired identity filter;
sending the filter intersection ciphertext to the inquired party and the inquiring party, and respectively carrying out decryption processing to obtain a filter intersection;
the inquiring party obtains a first ciphertext set based on the filter intersection; each encrypted data in the first ciphertext set corresponds to identity information to be queried;
the inquired party obtains a second ciphertext set based on the filter intersection; each piece of encrypted data in the second ciphertext set corresponds to queried identity information;
receiving the first set of ciphertexts and the second set of ciphertexts;
and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
7. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 6, wherein: the inquiring party obtains a first ciphertext set based on the filter intersection, and the method comprises the following steps:
the inquiring party generates an identity mapping table to be inquired according to the mapping relation between the identity information to be inquired and the position of the identity information to be inquired in the identity filter to be inquired;
the inquiring party inquires the identity mapping table to be inquired according to the filter intersection to obtain an identity set to be inquired, and encrypts the identity set to be inquired for the second time to obtain the first ciphertext set;
the inquired party obtains a second ciphertext set based on the filter intersection, and the second ciphertext set comprises the following steps:
the inquired party generates an inquired identity mapping table in an off-line manner according to the mapping relation between the inquired identity information and the position of the inquired identity information in the inquired identity filter;
and the inquired party inquires the inquired identity mapping table according to the filter intersection to obtain an inquired identity set, and encrypts the inquired identity set for the second time to obtain the second ciphertext set.
8. The epidemic situation information sharing method for protecting the privacy of users as claimed in claim 7, wherein: before encrypting the identity set to be queried and the queried identity set for the second time, the method further comprises the following steps:
the inquiring party and the inquired party perform second key agreement to obtain a second key; the inquiring party and the inquired party respectively encrypt the identity set to be inquired and the inquired identity set for the second time based on the second secret key;
the inquiring party and the inquired party perform the second key agreement, which comprises the following steps: the inquired party and the inquiring party run a Diffie-Hellman secure key agreement protocol once.
9. An epidemic situation information sharing system for protecting user privacy is characterized in that: the method comprises the following steps:
the inquiry terminal is used for acquiring identity information to be inquired; encrypting the identity information to be inquired to obtain encrypted identity information to be inquired and sending the encrypted identity information to the third party terminal; obtaining a first ciphertext set based on a fuzzy intersection ciphertext, and sending the first ciphertext set to a third-party terminal, wherein each piece of encrypted data in the first ciphertext set corresponds to one piece of identity information to be queried; sensitive information corresponding to accurate intersection information between the encrypted to-be-queried identity information and the encrypted to-be-queried identity information is received;
the inquired terminal is used for encrypting the prestored inquired identity information to obtain encrypted inquired identity information and sending the encrypted inquired identity information to the third party terminal; obtaining a second ciphertext set based on the fuzzy intersection ciphertext, and sending the second ciphertext set to a third-party terminal, wherein each piece of encrypted data in the second ciphertext set corresponds to one piece of queried identity information; obtaining sensitive information according to the accurate intersection information and sending the sensitive information to the query terminal;
the third-party terminal is used for aligning the encrypted to-be-queried identity information and the encrypted to-be-queried identity information to obtain accurate intersection information; sending the accurate intersection information to the inquired terminal; wherein, the aligning process of the encrypted to-be-queried identity information and the encrypted queried identity information to obtain accurate intersection information comprises the following steps: the encrypted identity information to be queried and the encrypted queried identity information are aligned in a fuzzy manner to obtain a fuzzy intersection ciphertext, wherein each encrypted data in the fuzzy intersection ciphertext corresponds to at least one encrypted identity information to be queried and at least one encrypted queried identity information; sending the fuzzy intersection ciphertext to the inquiry terminal and the inquired terminal; and receiving the first ciphertext set and the second ciphertext set, and accurately aligning the first ciphertext set and the second ciphertext set to obtain the accurate intersection information.
CN202010584407.9A 2020-06-24 2020-06-24 Epidemic situation information sharing method and system for protecting user privacy Active CN111510464B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010584407.9A CN111510464B (en) 2020-06-24 2020-06-24 Epidemic situation information sharing method and system for protecting user privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010584407.9A CN111510464B (en) 2020-06-24 2020-06-24 Epidemic situation information sharing method and system for protecting user privacy

Publications (2)

Publication Number Publication Date
CN111510464A CN111510464A (en) 2020-08-07
CN111510464B true CN111510464B (en) 2020-10-02

Family

ID=71872212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010584407.9A Active CN111510464B (en) 2020-06-24 2020-06-24 Epidemic situation information sharing method and system for protecting user privacy

Country Status (1)

Country Link
CN (1) CN111510464B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800478B (en) * 2021-04-07 2021-07-06 支付宝(杭州)信息技术有限公司 Method, device and system for determining shared data for protecting private data

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095453A (en) * 2011-07-08 2013-05-08 Sap股份公司 Public-key Encrypted Bloom Filters With Applications To Private Set Intersection
CN104572810A (en) * 2014-11-17 2015-04-29 深圳市光息谷科技发展有限公司 Method for carrying out operation processing on massive files by using bitmap
CN105205406A (en) * 2015-08-26 2015-12-30 中国地质大学(武汉) Intersection calculation method for privacy protection
CN109657489A (en) * 2018-08-03 2019-04-19 湖北工业大学 A kind of safe calculation method of two side of set intersection and system of secret protection
WO2019204711A1 (en) * 2018-04-19 2019-10-24 Google Llc Security measures for determination of private set intersections
CN110442570A (en) * 2019-06-06 2019-11-12 北京左江科技股份有限公司 A kind of BitMap high speed fuzzy search method
CN110727960A (en) * 2019-10-16 2020-01-24 卓尔智联(武汉)研究院有限公司 Data intersection solving device and method based on privacy protection and readable storage medium
CN111159252A (en) * 2019-12-27 2020-05-15 腾讯科技(深圳)有限公司 Transaction execution method and device, computer equipment and storage medium
CN111178538A (en) * 2019-12-17 2020-05-19 杭州睿信数据科技有限公司 Federated learning method and device for vertical data
CN111191282A (en) * 2019-12-25 2020-05-22 苏宁云计算有限公司 Sensitive data management method and system
CN111311018A (en) * 2020-03-04 2020-06-19 苏州远征魂车船技术有限公司 Accurate management and control system of epidemic situation

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095453A (en) * 2011-07-08 2013-05-08 Sap股份公司 Public-key Encrypted Bloom Filters With Applications To Private Set Intersection
CN104572810A (en) * 2014-11-17 2015-04-29 深圳市光息谷科技发展有限公司 Method for carrying out operation processing on massive files by using bitmap
CN105205406A (en) * 2015-08-26 2015-12-30 中国地质大学(武汉) Intersection calculation method for privacy protection
WO2019204711A1 (en) * 2018-04-19 2019-10-24 Google Llc Security measures for determination of private set intersections
CN109657489A (en) * 2018-08-03 2019-04-19 湖北工业大学 A kind of safe calculation method of two side of set intersection and system of secret protection
CN110442570A (en) * 2019-06-06 2019-11-12 北京左江科技股份有限公司 A kind of BitMap high speed fuzzy search method
CN110727960A (en) * 2019-10-16 2020-01-24 卓尔智联(武汉)研究院有限公司 Data intersection solving device and method based on privacy protection and readable storage medium
CN111178538A (en) * 2019-12-17 2020-05-19 杭州睿信数据科技有限公司 Federated learning method and device for vertical data
CN111191282A (en) * 2019-12-25 2020-05-22 苏宁云计算有限公司 Sensitive data management method and system
CN111159252A (en) * 2019-12-27 2020-05-15 腾讯科技(深圳)有限公司 Transaction execution method and device, computer equipment and storage medium
CN111311018A (en) * 2020-03-04 2020-06-19 苏州远征魂车船技术有限公司 Accurate management and control system of epidemic situation

Also Published As

Publication number Publication date
CN111510464A (en) 2020-08-07

Similar Documents

Publication Publication Date Title
US9704159B2 (en) Purchase transaction system with encrypted transaction information
Timothy et al. A hybrid cryptography algorithm for cloud computing security
CN109525386A (en) A method of based on the privately owned intersection of Paillier homomorphic cryptography and
US20040037424A1 (en) Information distribution and processing
CN109614792B (en) Hierarchical file key management method
CN105306194A (en) Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol
Gafsi et al. High securing cryptography system for digital image transmission
Sekar et al. Comparative study of encryption algorithm over big data in cloud systems
CN111510464B (en) Epidemic situation information sharing method and system for protecting user privacy
Chatterjee et al. Cryptography in cloud computing: a basic approach to ensure security in cloud
US20150205970A1 (en) Data encryption using an external arguments encryption algorithm
CN102752112A (en) Authority control method and device based on signed message 1 (SM1)/SM2 algorithm
CN112740615A (en) Multi-party computed key management
CN107317667B (en) Early warning method and early warning device for identity document loss
CN103607273B (en) A kind of data file encipher-decipher method controlled based on time limit
CN110474873B (en) Electronic file access control method and system based on knowledge range encryption
WO2017033843A1 (en) Searchable cryptograph processing system
CN111049738B (en) E-mail data security protection method based on hybrid encryption
US20200169541A1 (en) Systems and methods for encryption
Kaushik et al. Secure cloud data using hybrid cryptographic scheme
Taylor et al. Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security
Sriram et al. Location based encryption-decryption system for android
CN111010386B (en) Privacy protection and data supervision control method based on shared account book
CN111541652B (en) System for improving security of secret information keeping and transmission
Sharma et al. Key sharing technique to preserve integrity and confidentiality

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210922

Address after: 311121 room 210, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Bodun Xiyan Technology Co.,Ltd.

Address before: Room 704, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee before: TONGDUN HOLDINGS Co.,Ltd.

TR01 Transfer of patent right