CN111552978A - Privacy protection set intersection solving method based on DH encryption and Hash table - Google Patents

Privacy protection set intersection solving method based on DH encryption and Hash table Download PDF

Info

Publication number
CN111552978A
CN111552978A CN202010316716.8A CN202010316716A CN111552978A CN 111552978 A CN111552978 A CN 111552978A CN 202010316716 A CN202010316716 A CN 202010316716A CN 111552978 A CN111552978 A CN 111552978A
Authority
CN
China
Prior art keywords
data
hash table
encryption
initiator
participant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010316716.8A
Other languages
Chinese (zh)
Other versions
CN111552978B (en
Inventor
李伟
蔡亮
邱炜伟
张帅
匡立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Qulian Technology Co Ltd
Original Assignee
Hangzhou Qulian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Qulian Technology Co Ltd filed Critical Hangzhou Qulian Technology Co Ltd
Priority to CN202010316716.8A priority Critical patent/CN111552978B/en
Publication of CN111552978A publication Critical patent/CN111552978A/en
Application granted granted Critical
Publication of CN111552978B publication Critical patent/CN111552978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a privacy protection set intersection solving method based on DH encryption and a Hash table, wherein an initiating party initiates an intersection solving request to a participant, and the participant encrypts a data set of the participant by using the same module and different keys and sends the data set to the other participant; then the initiator and the participant encrypt the data sent by the other party by using own keys respectively, generate two hash tables for comparison, find the same elements therein, and finally obtain an intersection. The invention uses the idea of DH cipher key negotiation protocol to encrypt data to ensure the safety of both data, and uses Hash table to improve the intersection solving efficiency. The set elements of both sides are encrypted in one way and are difficult to crack, and because both sides are sequentially encrypted, the set security with a small definition domain can be ensured, and one side is prevented from carrying out comparison attack by acquiring a complete set; the invention does not need the SGX server for assistance, only needs the interaction of the two parties, and reduces the cost of the server.

Description

Privacy protection set intersection solving method based on DH encryption and Hash table
Technical Field
The invention belongs to the field of computer network communication data security and privacy protection, and particularly relates to a private protection set intersection solving method based on DH encryption and a Hash table.
Background
Protecting the privacy of a data set is a natural or even necessary requirement in many scenarios, for example, when the set is the address book of a user or the genome of a genetic diagnosis service user, such input must be protected by means of cryptography. Privacy Preserving Set Intersection (PSI) computation techniques allow two parties holding respective sets to jointly compute the Intersection operation of two sets. At the end of a protocol interaction, one or both parties should get the correct intersection and not get any information in the other party's set outside the intersection.
PSI has many practical application scenarios, such as finding contacts, and when a user registers to use a new service, such as WeChat, nailing, etc., it is a necessary operation in most cases to find out which services have been registered in the same class from the user's existing contacts. This can be done effectively by sending the user's contacts to the service provider, but at the same time the user's contact information, an information that is considered private in most cases, is also exposed to the service provider. Therefore, in this scenario, the PSI protocol is performed with the contact information of the user as the input of one party and all the user information of the service provider as the input of the other party, so as to complete the function of finding the contact, and prevent the information outside the intersection from being leaked to any party. Although the PSI protocol is developed very rapidly and the demand for data privacy protection is increasingly strong, in many application scenarios, an efficient and insecure protocol is still the mainstream choice.
At present, a Baidu MesatEE platform realizes the intersection of privacy protection sets based on a Trusted Execution Environment (TEE) technology, the set intersection is calculated by an SGX (generalized serving gateway) server of intel, and a multi-party set needs to encrypt own data and then sends the encrypted data to the server; but requires an additional SGX server as an intermediary to coordinate and compute the intersection.
Disclosure of Invention
The invention aims to provide a privacy protection set intersection solving method capable of resisting malicious attacks aiming at the defects of the prior art. The method and the device calculate the intersection of the two sets of data on the premise of protecting the security of the two sets of data, so that the data outside the intersection is not acquired by the other side.
The purpose of the invention is realized by the following technical scheme: a privacy protection set intersection solving method based on DH encryption and Hash table is used for an initiator initiating an intersection solving request and a participant participating in the intersection solving request, and comprises the following steps:
(1) the initiator randomly generates a prime number n as an encrypted module and sends a privacy protection set intersection execution request containing the prime number n to the participants; simultaneously, randomly generating a prime number p as an encrypted key, and encrypting the initiator data set M in a one-way encryption mode1The elements in the sequence are encrypted to obtain data K after the first encryption of the initiatorp
Figure BDA0002459682890000021
Therein, modnRepresents the remainder of the division by n; after the encryption is completed, the data K is encryptedpSending the data to a participant;
(2) the participant randomly generates a prime number q as an encryption key, and uses the prime number n sent by the initiator in the step (1) as an encryption module to encrypt the participant data set M in a one-way encryption mode2The elements in the data K are sequentially encrypted to obtain data K after the first encryption of the participantsq
Figure BDA0002459682890000022
After the encryption is completed, the data K is encryptedqSending to the initiator;
(3) the initiator receives the data K encrypted for the first time by the participant in the step (2)qThen, the prime p is used to pair the data KqRe-encrypting to obtain the second encryption of the initiatorThe latter data Kqp
Figure BDA0002459682890000023
For data KqpHash processing is carried out to calculate data KqpHash table of1Size N of (d):
N=max(N1/bucketSize,N2/bucketSize,1)
wherein N is1Is the size of the sender data set, N2Is the size of the participant data set, bucketSize is a hash table1A middle bucket size threshold; calculating key value keyqp
keyqp=KqpmodN
By key value keyqpFor bucket number, data KqpElement mapping to hash table1In (2), the generated hash table1Sending the data to a participant;
(4) the participator receives the data K encrypted for the first time by the initiator in the step (1)pThen, the prime number q is used to pair the data KpThe data K after the second encryption of the participator is obtained by the re-encryptionpq
Figure BDA0002459682890000024
For data KpqHash processing is carried out according to the data KpqHash table of2Size calculation keypq
keypq=KpqmodN
Wherein, the hash table2The size is also N; by key value keypqFor bucket number, data KpqElement mapping to hash table2In (2), the generated hash table2Sending to the initiator;
(5) the initiator receives the hash table sent by the participant in the step (4)2Then, comparing the hash tables generated in the step (3) in sequence1And hash table2Whether the elements in the buckets with the same key value are equal or not; if it is notIf the two elements are equal, the elements of the initiator data set and the participant data set corresponding to the elements in the bucket are intersection elements; if not, the elements in the bucket are not intersection elements; finally obtaining intersection elements; in the same way, the participator receives the hash table sent by the initiator in the step (3)1Then, the hash table generated in the step (4) is compared with the hash table2And comparing to obtain intersection elements.
Further, the prime number n, the prime number p and the prime number q are not less than 2048 bits.
Furthermore, the prime number n, the prime number p and the prime number q are all 2048 bits.
The invention has the beneficial effects that: the invention uses the idea of DH cipher key negotiation protocol to encrypt data to ensure the safety of both data, and uses Hash table to improve the intersection solving efficiency. The set elements of both sides are encrypted in one way and are difficult to crack, and because both sides are sequentially encrypted, the set security with a small definition domain can be ensured, and one side is prevented from carrying out comparison attack by acquiring a complete set; the invention does not need the SGX server for assistance, only needs the interaction of the two parties, and reduces the cost of the server.
Drawings
FIG. 1 is a flow chart of the implementation of the present invention;
FIG. 2 is a schematic diagram of a Hash table generation method;
FIG. 3 is a diagram illustrating the Hash table alignment method.
Detailed Description
A private protection set intersection solving method flow based on DH encryption and Hash table, the execution flow is as shown in figure 1, used for initiating the initiator of the intersection solving request this time and participating in the participant of the intersection solving request this time, including the following steps:
(1) the initiator randomly generates a 2048-bit (decimal) prime number n as an encrypted module, and sends a privacy protection set intersection PSI execution request containing the prime number n to the participants; simultaneously randomly generating a 2048-bit prime number p as an encryption key, and encrypting the initiator data set M in a one-way encryption mode1The elements in the sequence are encrypted to obtain data K after the first encryption of the initiatorpThe method specifically comprises the following steps:
Figure BDA0002459682890000031
therein, modnRepresenting the remainder of division by n, i.e. KpIs composed of
Figure BDA0002459682890000032
The remainder of the division by n; after the encryption is finished, the encrypted data K is sent to the host computerpAnd sending to the participants.
(2) The participant randomly generates a 2048-bit prime number q as an encryption key, and uses the prime number n sent by the initiator in the step (1) as an encryption module to encrypt the participant data set M in a one-way encryption mode2The elements in the data K are sequentially encrypted to obtain data K after the first encryption of the participantsqThe method specifically comprises the following steps:
Figure BDA0002459682890000033
after the encryption is finished, the encrypted data K is sent to the host computerqAnd sending the data to the initiator.
Because p, n and q are large enough prime numbers generated randomly, the original data cannot be reversely deduced according to the encrypted data on the basis of the discrete logarithm difficulty, and the result of the data encrypted for many times is independent of the encryption sequence due to the particularity of the encryption algorithm. When the prime number is generated randomly, an odd number with a given digit is randomly selected, and then whether the odd number is the prime number is judged by a prime number judgment method. If not, reselect. However, given a number x, the number of prime numbers less than x is approximately x/lnx, according to the prime theorem, that is, given a number, the probability of being a prime number is approximately 1/lnx. Even if the given number is an odd number, the probability can only rise to 2/lnx. If the prime requirement is 2048 bits, then an odd number is randomly chosen with a probability of passing the prime test of about 2/2048 × log (e) 0.22%. That is, about 500 times of selection is required to pass the prime number judgment once, and if the number of bits is large, the number of selection is increased, and the efficiency is low. In the invention, the randomly generated prime numbers are preferably 2048 bits which exceed 2048 bits, the calculation efficiency is reduced and are less than 2048 bits, the safety cannot be met, the prime numbers are 1024 bits which are used in the cryptography before, but the prime numbers are attacked by means of calculation power exhaustion, the calculation power required by the long bit length is large, and the 2048 bits are generally used in important occasions at present.
(3) The initiator receives the data K encrypted for the first time by the participant in the step (2)qThen, the prime p is used to pair the data KqThe data K after the second encryption of the initiator is obtained by re-encryptionqpThe method specifically comprises the following steps:
Figure BDA0002459682890000041
adopting the mode of FIG. 2 to encrypt the data K of the initiator for the second timeqpGenerating a hash table1The method specifically comprises the following steps: firstly, for data KqpHash processing is carried out to calculate data KqpHash table of1Size N of (d):
N=max(N1/bucketSize,N2/bucketSize,1)
wherein N is1Is the size of the sender data set, N2Is the size of the participant data set, bucketSize is a hash table1One bucket size threshold (e.g., take 20); then obtaining the key value key by the following formula calculationqp
keyqp=KqpmodN
Finally, key value key is usedqpFor bucket number, data KqpElement mapping to hash table1In (2), the generated hash table1And sending to the participants.
(4) The participator receives the data K encrypted for the first time by the initiator in the step (1)pThen, the prime number q is used to pair the data KpThe data K after the second encryption of the participator is obtained by the re-encryptionpqThe method specifically comprises the following steps:
Figure BDA0002459682890000042
adopting the mode of FIG. 2 to encrypt the data K of the participator for the second timepqGenerating a hash table2The method specifically comprises the following steps: firstly, for data KpqHash processing is carried out according to the data KpqHash table of2Size calculation keypq
keypq=KpqmodN
Wherein, the hash table2The size is also N; finally, key value key is usedpqFor bucket number, data KpqElement mapping to hash table2In (2), the generated hash table2And sending the data to the initiator.
(5) The initiator receives the hash table sent by the participant in the step (4)2Then, the method of fig. 3 and the hash table generated by the initiator in step (3) are adopted1Comparing to obtain intersection elements, specifically: comparing the hash table in sequence1And hash table2Whether the elements in the buckets with the same key value are equal or not; if the two elements are equal, the elements of the initiator data set and the participant data set corresponding to the elements in the bucket are intersection elements; if not, then the elements within the bucket are not intersection elements. In the same way, the participator receives the hash table sent by the initiator in the step (3)1Then, the hash table generated by the participator in the step (4) is compared with the hash table generated by the participator in the step (4)2And comparing to obtain intersection elements.
The invention utilizes the hash table to accelerate the comparison efficiency, and the simplest method for finding out the intersection of the two sets is to use all numbers in the A array to match the numbers in the B array. Assuming that the size of both arrays is n, the temporal complexity of this traversal is O (n ^ 2). This is also the most complex case, with hash tables to solve the problem. That is, hash array a into the hash table, then continue to hash array B into the hash table, the same elements will be mapped into the same bucket, and finally the intersection can be obtained. The temporal complexity is the complexity of hashing all elements, o (n).
The method can be applied in many practical scenarios, and an example is given below (only simple numbers of the same nature are given as examples since the data after specific encryption is tens of bits long):
many mobile phone social APP require to access the mobile phone address book of the new registered user, and through comparing the address book with the registered user of the APP server, the new user is recommended friends who use the APP together. But allowing the APP to access the mobile phone address book of the user exposes all the contact information of the user to the APP service provider, so that a great privacy disclosure problem exists. By running PSI protocols at the APP mobile phone end and the APP server end, the intersection between the mobile phone address book and the registered user set of the server is calculated, and contact person and friend recommendation can be carried out under the condition that user privacy information is not disclosed.
The initiator is an APP server a, and holds a registered user set a {18700000001, 18700000002, 18700000003, 18700000004, 18700000005}, the participant is a new registered user B, and holds an address book data set B {18700000011, 18700000002, 18700000003, 18700000014, 18700000015}, a wants to obtain a mobile phone address book of a new user B to recommend a friend who uses the APP together for the new user B, and the mobile phone terminals of the servers a and B can execute the following steps to obtain a friend set which uses the APP together with B.
The initiator randomly generates a 2048-bit prime number N as a modulus of encryption, randomly generates a 2048-bit prime number P as an encryption key, sends a PSI request (with N sent to the participant, the initiator encrypts with P and N, the encryption result is Ap (10, 11, 13, 21, 19), and sends Ap to the participant
After receiving PSI request, the participator randomly generates 2048-bit prime number Q as encryption key, encrypts Q and N with the encryption result Bq (32, 34, 35, 39, 36), and sends Bq to the initiator
After receiving Bq, the initiator performs encryption again using P and N to obtain twice-encrypted data set Bqp (41, 43, 44, 45, 46), and generates hash table 1 using N-3
Barrel element 41 43 44 45 46
0
1
2
After receiving Ap, the participant encrypts again with Q and N to obtain twice encrypted data sets Apq (51, 43, 44, 55, 56), and generates hash table 2 using N-3
Figure BDA0002459682890000051
Figure BDA0002459682890000061
Then the participator sends a hash table 2 to the initiator, the initiator sends a hash table 1 to the participator, and the participator and the initiator respectively use the following method to compare and calculate the intersection
Comparing elements in the same barrel sequence number
In bucket 0: 45-51 have no equivalent elements
In the barrel 1: 43, 46-43, 5543 is equal to 43, i.e. 43 corresponds to the intersection of the data 3 before encryption
In the barrel 2: 41, 44-44, 5644 is equal to 44, i.e. 44 corresponds to the intersection of the data 4 before encryption
And (c) calculating the intersection (43, 44) of the encrypted data, and then obtaining the corresponding data set (18700000002, 18700000003) before encryption, namely the calculated friend set of the APP commonly used by the b.

Claims (3)

1. A privacy protection set intersection solving method based on DH encryption and Hash table is used for an initiator initiating an intersection solving request and a participant participating in the intersection solving request, and is characterized by comprising the following steps:
(1) the initiator randomly generates a prime number n as an encrypted module and sends a privacy protection set intersection execution request containing the prime number n to the participants; simultaneously, randomly generating a prime number p as an encrypted key, and encrypting the initiator data set M in a one-way encryption mode1The elements in the sequence are encrypted to obtain data K after the first encryption of the initiatorp
Figure FDA0002459682880000011
Therein, modnIs expressed as divided byThe remainder of n; after the encryption is completed, the data K is encryptedpTo participants, etc.
(2) The participant randomly generates a prime number q as an encryption key, and uses the prime number n sent by the initiator in the step (1) as an encryption module to encrypt the participant data set M in a one-way encryption mode2The elements in the data K are sequentially encrypted to obtain data K after the first encryption of the participantsq
Figure FDA0002459682880000012
After the encryption is completed, the data K is encryptedqAnd sending the data to the initiator.
(3) The initiator receives the data K encrypted for the first time by the participant in the step (2)qThen, the prime p is used to pair the data KqThe data K after the second encryption of the initiator is obtained by re-encryptionqp
Figure FDA0002459682880000013
For data KqpHash processing is carried out to calculate data KqpHash table of1Size N of (d):
N=max(N1/bucketSize,N2/bucketSize,1)
wherein N is1Is the size of the sender data set, N2Is the size of the participant data set, bucketSize is a hash table1A middle bucket size threshold; calculating key value keyqp
keyqp=KqpmodN
By key value keyqpFor bucket number, data KqpElement mapping to hash table1In (2), the generated hash table1And sending to the participants.
(4) The participator receives the data K encrypted for the first time by the initiator in the step (1)pThen, the prime number q is used to pair the data KpThe data K after the second encryption of the participator is obtained by the re-encryptionpq
Figure FDA0002459682880000014
For data KpqHash processing is carried out according to the data KpqHash table of2Size calculation keypq
keypq=KpqmodN
Wherein, the hash table2The size is also N; by key value keypqFor bucket number, data KpqElement mapping to hash table2In (2), the generated hash table2And sending the data to the initiator.
(5) The initiator receives the hash table sent by the participant in the step (4)2Then, comparing the hash tables generated in the step (3) in sequence1And hash table2Whether the elements in the buckets with the same key value are equal or not; if the two elements are equal, the elements of the initiator data set and the participant data set corresponding to the elements in the bucket are intersection elements; if not, the elements in the bucket are not intersection elements; finally obtaining intersection elements; in the same way, the participator receives the hash table sent by the initiator in the step (3)1Then, the hash table generated in the step (4) is compared with the hash table2And comparing to obtain intersection elements.
2. The method of claim 1, wherein the prime n, the prime p, and the prime q are no less than 2048 bits.
3. The method of claim 1, wherein the prime n, the prime p, and the prime q are all 2048 bits.
CN202010316716.8A 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table Active CN111552978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010316716.8A CN111552978B (en) 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010316716.8A CN111552978B (en) 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table

Publications (2)

Publication Number Publication Date
CN111552978A true CN111552978A (en) 2020-08-18
CN111552978B CN111552978B (en) 2022-08-23

Family

ID=72000486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010316716.8A Active CN111552978B (en) 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table

Country Status (1)

Country Link
CN (1) CN111552978B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073196A (en) * 2020-11-10 2020-12-11 腾讯科技(深圳)有限公司 Service data processing method and device, electronic equipment and storage medium
CN112312313A (en) * 2020-09-10 2021-02-02 神州融安科技(北京)有限公司 Geographic area entering judgment method, device and system based on PSI
CN112311758A (en) * 2020-09-07 2021-02-02 神州融安科技(北京)有限公司 PSI-based login credential disclosure query method, device and system
CN112632608A (en) * 2020-12-23 2021-04-09 上海同态信息科技有限责任公司 Cooperative processing method for private data based on numerical calculation
CN112671789A (en) * 2020-12-29 2021-04-16 杭州趣链科技有限公司 Data transmission optimization method, device and system based on Chinese remainder theorem
CN112699386A (en) * 2020-12-22 2021-04-23 杭州趣链科技有限公司 Method and equipment for acquiring private data intersection, electronic device and storage medium
CN112989397A (en) * 2021-05-17 2021-06-18 支付宝(杭州)信息技术有限公司 Data processing method and device for resisting side channel attack
CN113312641A (en) * 2021-06-02 2021-08-27 杭州趣链科技有限公司 Multipoint and multiparty data interaction method, system, electronic device and storage medium
CN113472533A (en) * 2021-06-30 2021-10-01 四川新网银行股份有限公司 Data processing method and device based on limited domain key agreement and differential privacy
CN116418602A (en) * 2023-06-09 2023-07-11 武汉大学 Metadata protection anonymous communication method and system based on trusted hardware
CN117454432A (en) * 2023-12-20 2024-01-26 暨南大学 Privacy protection association rule mining method in distributed environment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130010950A1 (en) * 2011-07-08 2013-01-10 Sap Ag Public-Key Encrypted Bloom Filters With Applications To Private Set Intersection
CN105794145A (en) * 2013-11-27 2016-07-20 微软技术许可有限责任公司 Server-aided private set intersection (PSI) with data transfer
CN108737115A (en) * 2018-06-20 2018-11-02 湖北工业大学 A kind of efficient privately owned property set intersection method for solving with secret protection
CN109657489A (en) * 2018-08-03 2019-04-19 湖北工业大学 A kind of safe calculation method of two side of set intersection and system of secret protection
CN110727960A (en) * 2019-10-16 2020-01-24 卓尔智联(武汉)研究院有限公司 Data intersection solving device and method based on privacy protection and readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130010950A1 (en) * 2011-07-08 2013-01-10 Sap Ag Public-Key Encrypted Bloom Filters With Applications To Private Set Intersection
CN105794145A (en) * 2013-11-27 2016-07-20 微软技术许可有限责任公司 Server-aided private set intersection (PSI) with data transfer
CN108737115A (en) * 2018-06-20 2018-11-02 湖北工业大学 A kind of efficient privately owned property set intersection method for solving with secret protection
CN109657489A (en) * 2018-08-03 2019-04-19 湖北工业大学 A kind of safe calculation method of two side of set intersection and system of secret protection
CN110727960A (en) * 2019-10-16 2020-01-24 卓尔智联(武汉)研究院有限公司 Data intersection solving device and method based on privacy protection and readable storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
LIYAN SHEN等: "A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash", 《ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)》 *
XIAOYAN ZHU等: "Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks", 《2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC)》 *
崔泓睿等: "带隐私保护的集合交集计算协议的发展现状综述", 《信息安全与通信保密》 *
李顺东等: "集合相交问题的双方保密计算", 《西安交通大学学报》 *
申立艳等: "隐私保护集合交集计算技术研究综述", 《计算机研究与发展》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311758A (en) * 2020-09-07 2021-02-02 神州融安科技(北京)有限公司 PSI-based login credential disclosure query method, device and system
CN112312313A (en) * 2020-09-10 2021-02-02 神州融安科技(北京)有限公司 Geographic area entering judgment method, device and system based on PSI
CN112073196B (en) * 2020-11-10 2021-02-23 腾讯科技(深圳)有限公司 Service data processing method and device, electronic equipment and storage medium
CN112073196A (en) * 2020-11-10 2020-12-11 腾讯科技(深圳)有限公司 Service data processing method and device, electronic equipment and storage medium
CN112699386A (en) * 2020-12-22 2021-04-23 杭州趣链科技有限公司 Method and equipment for acquiring private data intersection, electronic device and storage medium
CN112699386B (en) * 2020-12-22 2024-06-11 杭州趣链科技有限公司 Method, equipment, electronic device and storage medium for acquiring private data intersection
CN112632608A (en) * 2020-12-23 2021-04-09 上海同态信息科技有限责任公司 Cooperative processing method for private data based on numerical calculation
CN112671789B (en) * 2020-12-29 2022-09-27 杭州趣链科技有限公司 Data transmission optimization method, device and system based on Chinese remainder theorem
CN112671789A (en) * 2020-12-29 2021-04-16 杭州趣链科技有限公司 Data transmission optimization method, device and system based on Chinese remainder theorem
CN112989397A (en) * 2021-05-17 2021-06-18 支付宝(杭州)信息技术有限公司 Data processing method and device for resisting side channel attack
CN113312641A (en) * 2021-06-02 2021-08-27 杭州趣链科技有限公司 Multipoint and multiparty data interaction method, system, electronic device and storage medium
WO2022252595A1 (en) * 2021-06-02 2022-12-08 杭州趣链科技有限公司 Method and system for multi-point multi-party data exchange, electronic apparatus, and storage medium
CN113312641B (en) * 2021-06-02 2023-07-18 杭州趣链科技有限公司 Multi-point multi-party data interaction method, system, electronic device and storage medium
CN113472533A (en) * 2021-06-30 2021-10-01 四川新网银行股份有限公司 Data processing method and device based on limited domain key agreement and differential privacy
CN116418602A (en) * 2023-06-09 2023-07-11 武汉大学 Metadata protection anonymous communication method and system based on trusted hardware
CN116418602B (en) * 2023-06-09 2023-08-25 武汉大学 Metadata protection anonymous communication method and system based on trusted hardware
CN117454432A (en) * 2023-12-20 2024-01-26 暨南大学 Privacy protection association rule mining method in distributed environment
CN117454432B (en) * 2023-12-20 2024-04-09 暨南大学 Privacy protection association rule mining method in distributed environment

Also Published As

Publication number Publication date
CN111552978B (en) 2022-08-23

Similar Documents

Publication Publication Date Title
CN111552978B (en) Privacy protection set intersection solving method based on DH encryption and Hash table
Yang et al. Protecting data privacy and security for cloud computing based on secret sharing
Amin et al. A more secure and privacy‐aware anonymous user authentication scheme for distributed mobile cloud computing environments
CN111034117A (en) Single node multi-party encryption
US11374910B2 (en) Method and apparatus for effecting a data-based activity
KR20050073573A (en) Secure communications
KR102656403B1 (en) Generate keys for use in secure communications
Peng Danger of using fully homomorphic encryption: A look at Microsoft SEAL
Tsai et al. TTP based high-efficient multi-key exchange protocol
KR20220054746A (en) Systems and methods for performing equality and less-than operations on encrypted data using quasi-group operations
US11637817B2 (en) Method and apparatus for effecting a data-based activity
CN107767281A (en) A kind of friend-making matching method for secret protection and system based on two degree of human connections of mobile social networking
Sharma et al. Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords
Taraskin et al. Towards isogeny-based password-authenticated key establishment
Kamil et al. A secure and privacy-preserving lightweight authentication protocol for wireless communications
Ding et al. Further analysis and improvements of a lattice-based anonymous PAKE scheme
WO2020168546A1 (en) Secret key migration method and apparatus
CN114239018A (en) Method and system for determining number of shared data for protecting privacy data
CN114564730A (en) Symmetric encryption-based federal packet statistic calculation method, device and medium
CN111865948A (en) Peer-to-peer cloud authentication and key agreement method, system and computer storage medium based on anonymous identity
CN113836595B (en) Method, device and system for two-party safety comparison
JP2019020717A (en) Enhanced communication security
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
CN113556225A (en) Efficient PSI (program specific information) method based on Hash and key exchange
Sarumi A review of encryption methods for secure data communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant