CN111552978B - Privacy protection set intersection solving method based on DH encryption and Hash table - Google Patents

Privacy protection set intersection solving method based on DH encryption and Hash table Download PDF

Info

Publication number
CN111552978B
CN111552978B CN202010316716.8A CN202010316716A CN111552978B CN 111552978 B CN111552978 B CN 111552978B CN 202010316716 A CN202010316716 A CN 202010316716A CN 111552978 B CN111552978 B CN 111552978B
Authority
CN
China
Prior art keywords
data
hash table
encryption
initiator
participant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010316716.8A
Other languages
Chinese (zh)
Other versions
CN111552978A (en
Inventor
李伟
蔡亮
邱炜伟
张帅
匡立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Qulian Technology Co Ltd
Original Assignee
Hangzhou Qulian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Qulian Technology Co Ltd filed Critical Hangzhou Qulian Technology Co Ltd
Priority to CN202010316716.8A priority Critical patent/CN111552978B/en
Publication of CN111552978A publication Critical patent/CN111552978A/en
Application granted granted Critical
Publication of CN111552978B publication Critical patent/CN111552978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention discloses a privacy protection set intersection solving method based on DH encryption and a Hash table, wherein an initiating party initiates an intersection solving request to a participant, and the participant encrypts a data set of the participant by using the same module and different keys and sends the data set to the other participant; then the initiator and the participant encrypt the data sent by the other party by using own keys respectively, generate two hash tables for comparison, find the same elements therein, and finally obtain an intersection. The invention uses the idea of DH cipher key negotiation protocol to encrypt data to ensure the safety of both data, and uses Hash table to improve the intersection solving efficiency. The set elements of both sides are encrypted in one way and are difficult to crack, and because both sides are sequentially encrypted, the set security with a small definition domain can be ensured, and one side is prevented from carrying out comparison attack by acquiring a complete set; the invention does not need the SGX server for assistance, only needs the interaction of the two parties, and reduces the cost of the server.

Description

Privacy protection set intersection solving method based on DH encryption and Hash table
Technical Field
The invention belongs to the field of computer network communication data security and privacy protection, and particularly relates to a private protection set intersection solving method based on DH encryption and a Hash table.
Background
Protecting the privacy of a data set is a natural or even necessary requirement in many scenarios, for example, when the set is the address book of a user or the genome of a genetic diagnosis service user, such input must be protected by means of cryptography. Privacy Preserving Set Intersection (PSI) computation techniques allow two parties holding respective sets to jointly compute the Intersection operation of two sets. At the end of a protocol interaction, one or both parties should get the correct intersection and not get any information in the other party's set outside the intersection.
PSI has many practical application scenarios, such as finding contacts, and when a user registers to use a new service, such as WeChat, nailing, etc., it is a necessary operation in most cases to find out which services have been registered in the same class from the user's existing contacts. This can be done effectively by sending the user's contacts to the service provider, but at the same time the user's contact information, an information that is considered private in most cases, is also exposed to the service provider. Therefore, in this scenario, the PSI protocol is performed with the contact information of the user as the input of one party and all the user information of the service provider as the input of the other party, so as to complete the function of finding the contact, and prevent the information outside the intersection from being leaked to any party. Although the PSI protocol has been developed very rapidly and the demand for data privacy protection is becoming strong, in many current application scenarios, efficient and insecure protocols are the mainstream choice.
At present, a Baidu Mesatee platform realizes the intersection of privacy protection sets based on a Trusted Execution Environment (TEE) technology, the set intersection is calculated by an SGX (serving gateway) server of intel, and a multi-party set needs to encrypt own data and then sends the encrypted data to a server; but requires an additional SGX server as an intermediary to coordinate and compute the intersection.
Disclosure of Invention
The invention aims to provide a privacy protection set intersection solving method capable of resisting malicious attacks aiming at the defects of the prior art. The method and the device calculate the intersection of the two sets of data on the premise of protecting the security of the two sets of data, so that the data outside the intersection is not acquired by the other side.
The purpose of the invention is realized by the following technical scheme: a privacy protection set intersection solving method based on DH encryption and Hash table is used for an initiator initiating an intersection solving request and a participant participating in the intersection solving request, and comprises the following steps:
(1) the initiator randomly generates a prime number n as an encrypted module and sends a privacy protection set intersection execution request containing the prime number n to the participants; simultaneously, randomly generating a prime number p as an encrypted key, and encrypting the initiator data set M in a one-way encryption mode 1 The elements in the system are sequentially encrypted to obtain data K after the first encryption of the initiator p
Figure GDA0003641267100000021
Wherein mod n represents the remainder of the division by n; after the encryption is completed, the data K is encrypted p Sending to the participant;
(2) randomly generating a prime number q as an encryption key by the participant, using the prime number n sent by the initiator in the step (1) as an encryption module, and using a one-way encryption mode to encrypt the participant data set M 2 The elements in the data K are sequentially encrypted to obtain the data K after the first encryption of the participator q
Figure GDA0003641267100000022
After the encryption is completed, the data K is encrypted q Sending to the initiator;
(3) the initiator receives the data K encrypted for the first time by the participant in the step (2) q Then, the prime p is used to pair the data K q The data K after the second encryption of the initiator is obtained by re-encryption qp
Figure GDA0003641267100000023
For data K qp Hash processing is carried out to calculate data K qp Hash table of 1 Size N of (d):
N=max(N 1 /bucketSize,N 2 /bucketSize,1)
wherein N is 1 Is the size of the sender data set, N 2 Is the size of the participant data set, bucketSize is a hash table 1 A middle bucket size threshold; calculating key value key qp
key qp =K qp mod N
By key value key qp For bucket number, data K qp Element mapping to hash table 1 In (2), the generated hash table 1 Sending the data to a participant;
(4) the participator receives the data K encrypted for the first time by the initiator in the step (1) p Then, the prime number q is used to pair the data K p The data K after the second encryption of the participator is obtained by the re-encryption pq
Figure GDA0003641267100000024
For data K pq Hash processing is carried out according to the data K pq Hash table of 2 Size calculation key pq
key pq =K pq mod N
Wherein, the hash table 2 The size is also N; by key value key pq For bucket number, data K pq Element mapping to hash table 2 In (2), the generated hash table 2 Sending to the initiator;
(5) the initiator receives the hash table sent by the participant in the step (4) 2 Then, comparing the hash tables generated in the step (3) in sequence 1 And hash table 2 Whether the elements in the buckets with the same key value are equal or not; if the two data sets are equal, the elements of the initiator data set and the participant data set corresponding to the elements in the bucket are intersection elements; if not, then theElements in the bucket are not intersection elements; finally obtaining intersection elements; in the same way, the participator receives the hash table sent by the initiator in the step (3) 1 Then, the hash table generated in the step (4) is compared with the hash table 2 And comparing to obtain intersection elements.
Further, the prime number n, the prime number p and the prime number q are not less than 2048 bits.
Furthermore, the prime number n, the prime number p and the prime number q are all 2048 bits.
The invention has the beneficial effects that: the invention uses the idea of DH cipher key negotiation protocol to encrypt data to ensure the safety of both data, and uses Hash table to improve the intersection solving efficiency. The set elements of both sides are encrypted in one way and are difficult to crack, and because both sides are sequentially encrypted, the set security with a small definition domain can be ensured, and one side is prevented from carrying out comparison attack by acquiring a complete set; the invention does not need the SGX server for assistance, only needs the interaction of the two parties, and reduces the cost of the server.
Drawings
FIG. 1 is a flow chart of the implementation of the present invention;
FIG. 2 is a schematic diagram of a Hash table generation method;
FIG. 3 is a diagram illustrating a Hash table matching method.
Detailed Description
A private protection set intersection solving method flow based on DH encryption and Hash table, the execution flow is as shown in figure 1, used for initiating the initiator of the intersection solving request this time and participating in the participant of the intersection solving request this time, including the following steps:
(1) the initiator randomly generates a 2048-bit (decimal) prime number n as an encryption module and sends a privacy protection set intersection PSI execution request containing the prime number n to the participants; simultaneously randomly generating a 2048-bit prime number p as an encryption key, and encrypting the initiator data set M in a one-way encryption mode 1 The elements in the sequence are encrypted to obtain data K after the first encryption of the initiator p The method specifically comprises the following steps:
Figure GDA0003641267100000031
where mod n represents the remainder of the division by n, i.e., K p Is composed of
Figure GDA0003641267100000032
The remainder of the division by n; after the encryption is finished, the encrypted data K is sent to the host computer p And sending the data to the participants.
(2) The participant randomly generates a 2048-bit prime number q as an encryption key, and uses the prime number n sent by the initiator in the step (1) as an encryption module to encrypt the participant data set M in a one-way encryption mode 2 The elements in the data K are sequentially encrypted to obtain data K after the first encryption of the participants q The method specifically comprises the following steps:
Figure GDA0003641267100000033
after the encryption is finished, the encrypted data K is sent to the host computer q And sending the data to the initiator.
Because p, n and q are large enough prime numbers generated randomly, the original data cannot be reversely deduced according to the encrypted data on the basis of the discrete logarithm difficulty, and the result of the data encrypted for many times is independent of the encryption sequence due to the particularity of the encryption algorithm. When the prime number is generated randomly, an odd number with a given digit is randomly selected, and then whether the odd number is the prime number is judged by a prime number judgment method. If not, reselect. However, given a number x, the number of prime numbers less than x is approximately x/lnx, according to the prime theorem, that is, given a number, the probability of being a prime number is approximately 1/lnx. Even if the given number is an odd number, the probability can only rise to 2/lnx. If the prime requirement is 2048 bits, then an odd number is randomly chosen with a probability of passing the prime test of about 2/2048 × log (e) ═ 0.22%. That is, about 500 times of selection is required to pass the prime number judgment once, and if the number of bits is large, the number of selection is increased, and the efficiency is low. In the invention, the randomly generated prime numbers are preferably 2048 bits which exceed 2048 bits, the calculation efficiency is reduced and are less than 2048 bits, the safety cannot be met, the prime numbers are 1024 bits which are used in the cryptography before, but the prime numbers are attacked by means of calculation power exhaustion, the calculation power required by the long bit length is large, and the 2048 bits are generally used in important occasions at present.
(3) The initiator receives the data K encrypted for the first time by the participant in the step (2) q Then, the prime p is used to pair the data K q The data K after the second encryption of the initiator is obtained by re-encryption qp The method specifically comprises the following steps:
Figure GDA0003641267100000041
adopting the mode of FIG. 2 to encrypt the data K of the initiating party for the second time qp Generating a hash table 1 The method specifically comprises the following steps: firstly, for data K qp Hash processing is carried out, and data K is calculated qp Hash table of 1 Size N of (d):
N=max(N 1 /bucketSize,N 2 /bucketSize,1)
wherein N is 1 Is the size of the sender data set, N 2 Is the size of the participant data set, bucketSize is a hash table 1 One bucket size threshold (e.g., take 20); then obtaining the key value key by the following formula calculation qp
key qp =K qp mod N
Finally, key value key is used qp For bucket number, data K qp Element mapping to hash table 1 In (2), the generated hash table 1 And sending the data to the participants.
(4) The participator receives the data K which is encrypted for the first time by the initiator in the step (1) p Then, the prime number q is used to pair the data K p The data K after the second encryption of the participator is obtained by the re-encryption pq The method specifically comprises the following steps:
Figure GDA0003641267100000042
adopting the mode of FIG. 2 to encrypt the data K of the participant for the second time pq Generating a hash table 2 The method specifically comprises the following steps: logarithm at firstAccording to K pq Performing hash processing according to the data K pq Hash table of 2 Size calculation key pq
key pq =K pq mod N
Wherein, the hash table 2 The size is also N; finally, key value key is used pq For bucket number, data K pq Element mapping to hash table 2 In (2), the generated hash table 2 And sending the data to the initiator.
(5) The initiator receives the hash table sent by the participant in the step (4) 2 Then, the method of fig. 3 and the hash table generated by the initiator in step (3) are adopted 1 Comparing and obtaining intersection elements, wherein the intersection elements are as follows: comparing the hash table in sequence 1 And hash table 2 Whether the elements in the buckets with the same key value are equal or not; if the two elements are equal, the elements of the initiator data set and the participant data set corresponding to the elements in the bucket are intersection elements; if not, then the elements within the bucket are not intersection elements. In the same way, the participator receives the hash table sent by the initiator in the step (3) 1 Then, the hash table generated by the participator in the step (4) is compared with the hash table generated by the participator in the step (4) 2 And comparing to obtain intersection elements.
The invention utilizes the hash table to accelerate the comparison efficiency, and the simplest method for finding out the intersection of the two sets is to use all numbers in the A array to match the numbers in the B array. Assuming that the size of both arrays is n, the temporal complexity of this traversal is O (n ^ 2). This is also the most complex case, with hash tables to solve the problem. That is, hash array a into the hash table, then continue to hash array B into the hash table, the same elements will be mapped into the same bucket, and finally the intersection can be obtained. The temporal complexity is the complexity of hashing all elements, o (n).
The method can be applied in many practical scenarios, and an example is given below (only simple numbers of the same nature are given as examples since the data after specific encryption is tens of bits long):
many mobile phone social APP require to access the mobile phone address book of the new registered user, and through comparing the address book with the registered user of the APP server, the new user is recommended friends who use the APP together. However, the fact that the APP is allowed to access the mobile phone address book of the user exposes all contact information of the user to the APP service provider, and a great privacy disclosure problem exists. By operating PSI protocols at the APP mobile phone end and the APP server end, intersection between the mobile phone address book and the server registered user set is calculated, and contact person and friend recommendation can be carried out under the condition that user privacy information is not revealed.
The initiator is an APP server a, and holds a registered user set a {18700000001, 18700000002, 18700000003, 18700000004, 18700000005}, the participant is a new registered user B, and holds an address book data set B {18700000011, 18700000002, 18700000003, 18700000014, 18700000015}, a wants to obtain a mobile phone address book of a new user B to recommend a friend who uses the APP together for the new user B, and the mobile phone terminals of the servers a and B can execute the following steps to obtain a friend set which uses the APP together with B.
The initiator randomly generates a 2048-bit prime number N as a modulus of encryption, randomly generates a 2048-bit prime number P as an encryption key, sends a PSI request (with N sent to the participant, the initiator encrypts with P and N, the encryption result is Ap (10, 11, 13, 21, 19), and sends Ap to the participant
After receiving PSI request, the participator randomly generates 2048-bit prime number Q as encryption key, encrypts Q and N with the encryption result Bq (32, 34, 35, 39, 36), and sends Bq to the initiator
After receiving Bq, the initiator performs encryption again using P and N to obtain twice-encrypted data set Bqp (41, 43, 44, 45, 46), and generates hash table 1 using N-3
Barrel element 41 43 44 45 46
0
1
2
After receiving Ap, the participant encrypts again with Q and N to obtain twice encrypted data sets Apq (51, 43, 44, 55, 56), and generates hash table 2 using N-3
Figure GDA0003641267100000051
Figure GDA0003641267100000061
Then the participator sends a hash table 2 to the initiator, the initiator sends a hash table 1 to the participator, and the participator and the initiator respectively use the following method to compare and calculate the intersection
Comparing elements in the same barrel sequence number
In bucket 0: 45-51 have no equivalent elements
In the barrel 1: 43, 46-43, 5543 is equal to 43, i.e. 43 corresponds to the intersection of the data 3 before encryption
In the barrel 2: 41, 44-44, 5644 is equal to 44, i.e. 44 corresponds to the intersection of the data 4 before encryption
And (4) finding the intersection of the encrypted data (43, 44), and then obtaining the corresponding data set (18700000002, 18700000003) before encryption as the friend set which uses the APP together by the b.

Claims (3)

1. A privacy protection set intersection solving method based on DH encryption and Hash table is used for an initiator initiating an intersection solving request and a participant participating in the intersection solving request, and is characterized by comprising the following steps:
(1) the initiator randomly generates a prime number n as an encrypted module and sends a privacy protection set intersection execution request containing the prime number n to the participants; simultaneously, randomly generating a prime number p as an encrypted key, and encrypting the initiator data set M in a one-way encryption mode 1 The elements in the system are sequentially encrypted to obtain data K after the first encryption of the initiator p
Figure FDA0003641267090000011
Wherein m isod n represents the remainder of the division by n; after the encryption is completed, the data K is encrypted p Sending the data to a participant;
(2) the participant randomly generates a prime number q as an encryption key, and uses the prime number n sent by the initiator in the step (1) as an encryption module to encrypt the participant data set M in a one-way encryption mode 2 The elements in the data K are sequentially encrypted to obtain data K after the first encryption of the participants q
Figure FDA0003641267090000012
After the encryption is completed, the data K is encrypted q Sending to the initiator;
(3) the initiator receives the data K encrypted for the first time by the participant in the step (2) q Then, the prime p is used to pair the data K q The data K after the second encryption of the initiator is obtained by re-encryption qp
Figure FDA0003641267090000013
For data K qp Hash processing is carried out to calculate data K qp Hash table of 1 Size N of (d):
N=max(N 1 /bucketSize,N 2 /bucketSize,1)
wherein N is 1 Is the size of the sender data set, N 2 Is the size of the participant data set, bucketSize is a hash table 1 A middle bucket size threshold; calculating key value key qp
key qp =K qp mod N
By key value key qp For bucket number, data K qp Element mapping to hash table 1 In (2), the generated hash table 1 Sending the data to a participant;
(4) the participator receives the data K encrypted for the first time by the initiator in the step (1) p Then, the prime number q is used to pair the data K p The second encryption is obtained by the second encryption of the participatorThe latter data K pq
Figure FDA0003641267090000014
For data K pq Hash processing is carried out according to the data K pq Hash table of 2 Size calculation key value key pq
key pq =K pq mod N
Wherein, the hash table 2 The size is also N; by key value key pq For bucket number, data K pq Element mapping to hash table 2 In (2), the generated hash table 2 Sending to the initiator;
(5) the initiator receives the hash table sent by the participant in the step (4) 2 Then, comparing the hash tables generated in the step (3) in sequence 1 And hash table 2 Whether elements in the buckets with the same key value are equal or not; if the two elements are equal, the elements of the initiator data set and the participant data set corresponding to the elements in the bucket are intersection elements; if not, the elements in the bucket are not intersection elements; finally obtaining intersection elements; in the same way, the participator receives the hash table sent by the initiator in the step (3) 1 Then, the hash table generated in the step (4) is compared with the hash table 2 And comparing to obtain intersection elements.
2. The method of claim 1, wherein the prime n, the prime p, and the prime q are no less than 2048 bits.
3. The method of claim 1, wherein the prime n, the prime p, and the prime q are all 2048 bits.
CN202010316716.8A 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table Active CN111552978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010316716.8A CN111552978B (en) 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010316716.8A CN111552978B (en) 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table

Publications (2)

Publication Number Publication Date
CN111552978A CN111552978A (en) 2020-08-18
CN111552978B true CN111552978B (en) 2022-08-23

Family

ID=72000486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010316716.8A Active CN111552978B (en) 2020-04-21 2020-04-21 Privacy protection set intersection solving method based on DH encryption and Hash table

Country Status (1)

Country Link
CN (1) CN111552978B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311758A (en) * 2020-09-07 2021-02-02 神州融安科技(北京)有限公司 PSI-based login credential disclosure query method, device and system
CN112312313B (en) * 2020-09-10 2023-07-04 神州融安数字科技(北京)有限公司 PSI-based geographical area entry judging method, device and system
CN112073196B (en) * 2020-11-10 2021-02-23 腾讯科技(深圳)有限公司 Service data processing method and device, electronic equipment and storage medium
CN112632608A (en) * 2020-12-23 2021-04-09 上海同态信息科技有限责任公司 Cooperative processing method for private data based on numerical calculation
CN112671789B (en) * 2020-12-29 2022-09-27 杭州趣链科技有限公司 Data transmission optimization method, device and system based on Chinese remainder theorem
CN112989397B (en) * 2021-05-17 2021-07-30 支付宝(杭州)信息技术有限公司 Data processing method and device for resisting side channel attack
CN113312641B (en) * 2021-06-02 2023-07-18 杭州趣链科技有限公司 Multi-point multi-party data interaction method, system, electronic device and storage medium
CN113472533A (en) * 2021-06-30 2021-10-01 四川新网银行股份有限公司 Data processing method and device based on limited domain key agreement and differential privacy
CN116418602B (en) * 2023-06-09 2023-08-25 武汉大学 Metadata protection anonymous communication method and system based on trusted hardware
CN117454432B (en) * 2023-12-20 2024-04-09 暨南大学 Privacy protection association rule mining method in distributed environment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105794145A (en) * 2013-11-27 2016-07-20 微软技术许可有限责任公司 Server-aided private set intersection (PSI) with data transfer
CN108737115A (en) * 2018-06-20 2018-11-02 湖北工业大学 A kind of efficient privately owned property set intersection method for solving with secret protection
CN109657489A (en) * 2018-08-03 2019-04-19 湖北工业大学 A kind of safe calculation method of two side of set intersection and system of secret protection
CN110727960A (en) * 2019-10-16 2020-01-24 卓尔智联(武汉)研究院有限公司 Data intersection solving device and method based on privacy protection and readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8526603B2 (en) * 2011-07-08 2013-09-03 Sap Ag Public-key encrypted bloom filters with applications to private set intersection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105794145A (en) * 2013-11-27 2016-07-20 微软技术许可有限责任公司 Server-aided private set intersection (PSI) with data transfer
CN108737115A (en) * 2018-06-20 2018-11-02 湖北工业大学 A kind of efficient privately owned property set intersection method for solving with secret protection
CN109657489A (en) * 2018-08-03 2019-04-19 湖北工业大学 A kind of safe calculation method of two side of set intersection and system of secret protection
CN110727960A (en) * 2019-10-16 2020-01-24 卓尔智联(武汉)研究院有限公司 Data intersection solving device and method based on privacy protection and readable storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash;Liyan Shen等;《ICC 2019 - 2019 IEEE International Conference on Communications (ICC)》;20190715;第1-7页 *
Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks;Xiaoyan Zhu等;《2015 IEEE/CIC International Conference on Communications in China (ICCC)》;20160407;第1-6页 *
带隐私保护的集合交集计算协议的发展现状综述;崔泓睿等;《信息安全与通信保密》;20190331;第48-67页 *
隐私保护集合交集计算技术研究综述;申立艳等;《计算机研究与发展》;20171030;第54卷(第10期);第2153-2169页 *
集合相交问题的双方保密计算;李顺东等;《西安交通大学学报》;20061020;第40卷(第10期);第1091-1093,1102页 *

Also Published As

Publication number Publication date
CN111552978A (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN111552978B (en) Privacy protection set intersection solving method based on DH encryption and Hash table
CN111034117A (en) Single node multi-party encryption
KR20050073573A (en) Secure communications
US11374910B2 (en) Method and apparatus for effecting a data-based activity
CN114175572B (en) System and method for performing equal and less operations on encrypted data using a quasi-group operation
Tsai et al. TTP based high-efficient multi-key exchange protocol
WO2020168546A1 (en) Secret key migration method and apparatus
US11637817B2 (en) Method and apparatus for effecting a data-based activity
Ding et al. Further analysis and improvements of a lattice-based anonymous PAKE scheme
Kamil et al. A secure and privacy-preserving lightweight authentication protocol for wireless communications
CN111726225A (en) Outsourcing privacy protection intersection calculation method based on secret sharing
CN114239018A (en) Method and system for determining number of shared data for protecting privacy data
CN114564730A (en) Symmetric encryption-based federal packet statistic calculation method, device and medium
CN114239019A (en) Method, device and system for determining number of shared data for protecting privacy data
CN113556225A (en) Efficient PSI (program specific information) method based on Hash and key exchange
CN106850584A (en) A kind of anonymous authentication method of curstomer-oriented/server network
CN114039785A (en) Data encryption, decryption and processing method, device, equipment and storage medium
CN111865948A (en) Peer-to-peer cloud authentication and key agreement method, system and computer storage medium based on anonymous identity
Li et al. Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
WO2021115591A1 (en) Devices and sharing methods for private set intersection
US10031795B1 (en) Using conversion schemes in public key cryptosystems
CN113836595B (en) Method, device and system for two-party safety comparison
Wang et al. Dynamic threshold changeable multi‐policy secret sharing scheme
JP2019020717A (en) Enhanced communication security
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant