CN113127926A - Method, system, storage medium and computer for analyzing statistical relevance of private data - Google Patents
Method, system, storage medium and computer for analyzing statistical relevance of private data Download PDFInfo
- Publication number
- CN113127926A CN113127926A CN202110270194.7A CN202110270194A CN113127926A CN 113127926 A CN113127926 A CN 113127926A CN 202110270194 A CN202110270194 A CN 202110270194A CN 113127926 A CN113127926 A CN 113127926A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- analyst
- ciphertext
- supervisor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000013475 authorization Methods 0.000 claims abstract description 43
- 238000004364 calculation method Methods 0.000 claims abstract description 43
- 238000010219 correlation analysis Methods 0.000 claims abstract description 21
- 230000008569 process Effects 0.000 claims abstract description 15
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims abstract description 13
- 238000011160 research Methods 0.000 claims description 62
- 230000006870 function Effects 0.000 claims description 17
- 238000012545 processing Methods 0.000 claims description 15
- 238000004458 analytical method Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 4
- 238000005314 correlation function Methods 0.000 claims description 4
- 238000007405 data analysis Methods 0.000 abstract description 3
- 230000007547 defect Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000008092 positive effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention belongs to the technical field of private data analysis and block chain application, and discloses a private data statistics correlation analysis method, a system, a storage medium and a computer, wherein participants register identity information; generating a verification key and a signature key required by authentication according to an RSA signature algorithm; generating different public and private key pairs by using a Paillier encryption system, and publishing zero-knowledge proof parameters in a block chain network; submitting an information query request and authorization information to a blockchain network; the participator uses the parameters provided by the analyst and the parameters published by the supervisor to process data; when the required information is inquired, the obtained authorization information is provided to a block chain network, and the identity is verified through an intelligent contract; and after the ciphertext data on the block chain is obtained, decrypting the ciphertext data through a private key and calculating a related statistical relevance function by using the decrypted information value. According to the invention, the statistic correlation analysis of the private data is carried out on the block chain, so that the data can be monitored and the calculation process is credible.
Description
Technical Field
The invention belongs to the technical field of private data analysis and block chain application, and particularly relates to a private data statistical correlation analysis method, a private data statistical correlation analysis system, a storage medium and a computer.
Background
Currently, as various activities in life are spread in computer networks, some government agencies, enterprises, large enterprise companies, etc. generate a large amount of sensitive data. Researchers expect to obtain more beneficial information from their data, but privacy concerns prevent researchers from mining and analyzing information, and data statistics correlation analysis schemes for privacy protection are compliant.
Due to various requirements on data information, data are analyzed and extracted, and joint calculation of the data is performed, but some privacy problems are also faced. Mainly when data is calculated, no one party is allowed to view other data. Secure multi-party computing is therefore proposed and applied, and a secure multi-party computing protocol allows a group of untrusted data owners to collaborate together to perform an analytical query against their data, while not revealing the entire data set. In the existing data sharing model, data transaction lacks transparency, data owners lose control right and ownership of data, and data safety cannot be guaranteed. For this reason, traceability and non-tamper of data are increased by means of the block chain technique. The method can realize statistical correlation analysis of data while protecting private data, compile a calculation contract according to the calculation requirements of data demand parties, and guarantee calculation and output of a data owner by means of safe multi-party calculation.
Through the above analysis, the problems and defects of the prior art are as follows: in the existing data sharing model, data transaction lacks transparency, a data owner loses control right and ownership of data, and data safety cannot be guaranteed.
The difficulty in solving the above problems and defects is: under the condition that no trusted third party exists, how the participant computer obtains ciphertext data of other participant computers can not reveal the privacy of each participant computer, how fairness in the whole computing process is ensured, and the non-tampering property and traceability of a computing result are ensured, how statistical relevance analysis is realized while privacy data is protected, and how the problem of data supervision is solved. The method solves the problem of how to ensure fairness, safety and low efficiency by the participation of a third party.
The significance of solving the problems and the defects is as follows: under the condition of no centralized service provider, the traditional mode of carrying out privacy calculation by using a server is broken through, and the participators can trust each other to carry out data calculation, so that the traceability, the accuracy and the supervision of the whole calculation process are ensured, and meanwhile, the problems of low efficiency on a chain and increased storage cost cannot be caused.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a method, a system, a storage medium and a computer for analyzing the statistical relevance of private data.
The invention is realized in such a way that a method for analyzing the statistical relevance of private data comprises the following steps:
step one, registering identity information by a participant;
step two, according to RSA signature algorithm, the supervisor generates verification key and signature key (pk) required by authentication*,sk*) (ii) a (ensuring authenticity of identity when a research analyst queries)
Thirdly, the supervisor generates a public and private key pair (Jpk, Jsk) by utilizing the Paillier encryption system, and a zero-knowledge proof parameter ZJAnd published in a blockchain network (Jpk, Z)J) (ii) a (verifying that the data involved in the calculation is the same as the data submitted to the supervisor, enabling data supervision)
Step four, the analyst submits the information inquiry request and the authorization information m to the blockchain networkωThe method comprises a data ciphertext calculation mode; (acquisition of demand data by a research analyst without revealing analyst identity)
Step five, the participator uses the parameters pk, Z provided by the analystYParameters JPk, Z published with supervisorJCarrying out data processing; (according to the needs of the research analystCiphertext processing)
Step six, when the analyst wants to inquire the needed information, the authorization information m obtained in the step two is obtainedωProviding to a blockchain network, verifying the identity of the analyst through the intelligent contract; (verifying the identity of the analyst, ensuring the validity of the identity)
And seventhly, after the research analyst obtains the ciphertext data on the block chain, decrypting the ciphertext data through the private key and calculating a related statistical relevance function by using the decrypted information value. (analyst performs statistical correlation analysis based on ciphertext data)
By combining the technical scheme, the invention has the advantages and positive effects that: the invention designs a scheme for carrying out the correlation analysis of the privacy data statistics by combining a block chain and safe multiparty computation, realizes that the data analysis is completed while the identity information of a data provider and a data analyzer is not leaked, prevents the computation result error caused by malicious input of some participants by storing the computation process and the result on the block chain, and can realize the supervision of a supervision department on the data; the cryptograph calculation is completed without revealing respective data through a homomorphic encryption algorithm, the multi-party calculation is carried out under the chain, and the result is fed back to the block chain, so that the storage cost of the data on the chain is reduced, and the efficiency of the whole system is improved.
Further, in the step one, registering the identity information by the participant specifically includes:
a research analyst generates a public and private key pair (pk, sk) by utilizing a Paillier encryption algorithm and a zero-knowledge proof parameter ZY;
A research analyst needs to register to access the linked data, a supervisor stores the hash value of the user information into a user information pool, and the supervisor maintains one user information pool;
analyst registration identity information MI D ═ { ID, pk, ZY,MiIn which ID is the user's personal information, pk is a public key generated by a research analyst using Paillier, ZYFor zero knowledge proof parameters, MiQuery the analyst for information commands.
Further, in the second step, the specific process of the supervisor generating the verification key and the signature key required for authentication includes:
after registering the information, the manager confirms that the information is a normal research analyst, and feeds back authorization information m to the trusted research analystωAnd the generated signature key sk*The authorization information includes public keys of research analysts, available authorities, authorization deadlines, and the like.
Further, in the fifth step, data processing mainly encrypts data and performs ciphertext calculation through a Paillier encryption algorithm, and each step and processing results of the data processing are provided to a block chain network, so that the traceability and the non-falsification of the data are ensured;
the supervisor obtains the data submitted to the blockchain network by the participating computer, decrypts the ciphertext by using the private key Jsk of the supervisor, sees all circulating data, and verifies through zero knowledge proof that the data provided by the participating computer to the analyst is consistent with the data provided to the supervisor, thereby realizing the supervision of the data.
Further, in the fifth step, the data is processed into some common statistical functions, and the centralized data set summation is calculated as follows:
after receiving the query command, the participating computer encrypts the data by using the public key to obtain a ciphertext Epk(mi) Then ciphertext (E) with the field of query command Mpk(mi) M) submitting to a blockchain network;
through the intelligent contract compiled in advance, the participating calculator can obtain the ciphertext with the query command M; after the participator obtains all the ciphertext data with the query command M, the ciphertext calculation is carried out to obtain Epk=Epk(m1)+Epk(m2)+……+Epk(mn) Will (E)pk,mω) Submitting to a blockchain network, where mωAuthorization information for the supervisor to the research analyst;
by the above process, the sum of the data can be received without actual data in each of the participating calculators, and there may be a plurality of variables in other statistical functions, by which the calculation can also be performed.
Further, the average value calculation:
in a centralized data set byCalculating an average value, and calculating the average value by the following formula for the distributed data set:
further, the fifth step specifically comprises the following steps:
after the participator receives the command, the data is encrypted by using the public key to obtain a ciphertextThen, the ciphertext with the field of the query command M is transmitted(E(ni),M2) Submitting to a blockchain network, where M1,M2Respectively judging data and information fields and judging the number of data calculators participating in the data;
acquisition of a participant computer with a query M by a previously compiled intelligent contract1,M2The ciphertext of (1);
the participating calculator obtains all the query commands M1,M2After the ciphertext data is obtained, ciphertext calculation is carried out to obtain
Will (E)pk,E(n),mω) Submitting to a blockchain network, where mωAuthorization information for the supervisor to the research analyst;
after the ciphertext is obtained, the private key is used for decryption to obtain:
D(E(n))=n1+n2+……+ni;
Further, the authorization information m is verified in the sixth stepωIf all the verification is passed, the block chain network provides the analyst with partial authorization information m according to the query command of the research analystωThe research analyst will decrypt the ciphertext using the private key;
in the first step to the seventh step, a public key pk provided by a research analyst is used for encryption and then transmitted to a block chain; the data on the blockchain can only be decrypted by a research analyst, and the access authority of the research analyst to the blockchain is limited to a specific value due to the authorization of a supervisor, so that the information of the participating computer is not leaked.
Another object of the present invention is to provide a program storage medium for receiving user input, the stored computer program causing an electronic device to execute the method for statistical correlation analysis of private data, comprising the steps of:
step one, registering identity information by a participant;
step two, according to RSA signature algorithm, the supervisor generates verification key and signature key (pk) required by authentication*,sk*);
Thirdly, the supervisor generates a public and private key pair (Jpk, Jsk) by utilizing the Paillier encryption system, and a zero-knowledge proof parameter ZJAnd published in a blockchain network (Jpk, Z)J);
Step four, the analyst submits the information inquiry request and the authorization information m to the blockchain networkωThe method comprises a data ciphertext calculation mode;
step five, the participator uses the parameters pk, Z provided by the analystYParameters Jpk, Z published with supervisorJCarrying out data processing;
step six, when the analyst wants to inquire the needed information, the authorization information m obtained in the step two is obtainedωProviding to a blockchain network, verifying the identity of the analyst through the intelligent contract;
and seventhly, after the research analyst obtains the ciphertext data on the block chain, decrypting the ciphertext data through the private key and calculating a related statistical relevance function by using the decrypted information value.
It is a further object of the invention to provide a computer program product stored on a computer readable medium, comprising a computer readable program for providing a user input interface for implementing said method of statistical relevance analysis of private data when executed on an electronic device.
By combining all the technical schemes, the invention has the advantages and positive effects that: the invention provides a safe multi-party calculation and block chain combined mode, and a scheme capable of carrying out privacy data statistic correlation analysis on the block chain is constructed by utilizing the characteristics of distributed storage, non-tampering property, privacy and the like, so that the data verification and the calculation process credibility are ensured as much as possible. The block chain technology is utilized to increase the transparency and accessibility of data, and a Paillier cryptosystem is used to protect the confidentiality of private data. The invention is designed for a network with multiple participating calculators and research analysts, where the participating calculators join the blockchain network and maintain and share the distributed ledger, and the research analysts do not join the blockchain network. The main body of the privacy data statistical relevance analysis system is a research analyst, a supervisor and a participating calculator, wherein the supervisor and the participating calculator are block link points, the research analyst does not add a block chain network, an intelligent contract is deployed in the block chain network in advance, and the intelligent contract is used for verifying the identity of the research analyst to determine whether to provide on-chain data for the research analyst.
In the invention, a research analyst sends a requirement to a block chain network and requires a participating computer to provide required data information, and each participating computer encrypts the inquired data information and performs ciphertext calculation by using a Paillier cryptosystem. The participating calculators transmit the information processed by the cryptographic system into a blockchain network. The participating computer may be any organization or organization, such as an insurance company, a bank, a health information provider, and so forth. The participating calculators in the blockchain network are also sharers and maintainers of the distributed ledger, thus reading all ciphertext information on the chain. The research analyst is the end-user of the blockchain network and may control access to data on the blockchain through intelligent contracts.
Drawings
Fig. 1 is a flowchart of a method for analyzing statistical relevance of private data according to an embodiment of the present invention.
Fig. 2 is a diagram of a statistical correlation architecture for private data according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Aiming at the problems in the prior art, the invention provides a method for analyzing the statistical relevance of private data, and the invention is described in detail below with reference to the accompanying drawings.
One skilled in the art can also use other steps to implement the statistical correlation analysis method for private data provided by the present invention, and fig. 1 shows that the statistical correlation analysis method for private data provided by the present invention is only one specific embodiment.
As shown in fig. 1, a method for analyzing statistical relevance of private data according to an embodiment of the present invention includes:
s101: the participant registers identity information.
S102: according to the RSA signature algorithm, a supervisor generates an authentication key and a signature key (pk) required by authentication*,sk*)。
S103: the supervisor utilizes Paillier encryption system to generate public and private key pair (Jpk, Jsk), zero knowledge proof parameter ZJAnd published in a blockchain network (Jpk, Z)J)。
S104: the analyst submits information inquiry request and authorization information m to the blockchain networkωThe method comprises a data ciphertext calculation mode and the like.
S105: the participating calculators use the parameters pk, Z provided by the analystsYParameters Jpk, Z published with supervisorJAnd (6) carrying out data processing.
S106: when the analyst wants to inquire the required information, the authorization information m obtained at S102ωThe block chain network is provided, and the identity of the analyst is verified through the intelligent contract.
S107: after the research analyst obtains the ciphertext data on the block chain, the ciphertext data is decrypted through a private key, and the decrypted information value is used for calculating a related statistical relevance function.
In S101 provided by the embodiment of the present invention, the registering of the identity information by the participant specifically includes:
a research analyst generates a public and private key pair (pk, sk) by utilizing a Paillier encryption algorithm and a zero-knowledge proof parameter ZY。
Research analysts must register to access the linked data, supervisors store the hash values of the user information into a user information pool, and supervisors maintain one user information pool.
Analyst registration identity information MI D ═ { ID, pk, ZY,MiIn which ID is the user's personal information, pk is a public key generated by a research analyst using Paillier, ZYFor zero knowledge proof parameters, MiQuery the analyst for information commands.
In S102 provided by the embodiment of the present invention, a specific process of a supervisor generating a verification key and a signature key required for authentication includes:
after registering the information, the manager confirms that the information is a normal research analyst, and feeds back authorization information m to the trusted research analystωAnd the generated signature key sk*The authorization information includesThe research analyst public key, the permissions available, the authorization deadline, etc.
In S105 provided by the embodiment of the present invention, data processing mainly encrypts data and performs ciphertext calculation through a Paillier encryption algorithm, and provides each step and processing result of data processing to a block chain network, so as to ensure that data is traceable and not falsifiable;
the supervisor can obtain the data submitted to the blockchain network by the participating computer, the ciphertext in the data can be decrypted by using the private key Jsk of the supervisor, all circulating data can be seen, and the data provided to the analyst by the participating computer and the data provided to the supervisor are verified to be consistent through zero knowledge proof, so that the data can be supervised.
In S105 provided in the embodiment of the present invention, data processing is performed as some common statistical functions, as follows:
the summation function calculates:
after receiving the query command, the participating computer encrypts the data by using the public key to obtain a ciphertext Epk(mi) Then cipher text (E) with "query command M" fieldpk(mi) M) submitting to a blockchain network;
through the intelligent contract compiled in advance, the participating calculator can obtain the ciphertext with the query command M;
after the participator obtains all the ciphertext data with the 'query command M', the ciphertext calculation is carried out to obtain Epk=Epk(m1)+Epk(m2)+……+Epk(mn) Will (E)pk,mω) Submitting to a blockchain network, where mωAuthorization information given to the research analyst by the supervisor.
Using these three simple steps, the research analyst can receive the sum of the data without the actual data in each of the participating calculators, but in other statistical functions there may be multiple variables, and more statistical functions can be calculated using similar methods.
Calculating an average value function:
in a centralized data setTo pass throughThe average is calculated, which can be calculated for a distributed data set (see table 1) by the following formula:
TABLE 1 distributed data set
The method comprises the following specific steps:
after the participator receives the command, the data is encrypted by using the public key to obtain a ciphertextThen, the ciphertext with the 'query command M' field is encrypted(E(ni),M2) Submit to blockchain network (see Table 2), where M1,M2The field for judging data and information and the field for judging the number of the data-participating calculators are respectively.
Acquisition of a document with a query command M by a pre-compiled intelligent contract participant1,M2"is encrypted; the participating calculator obtains all the data with "query command M1,M2After ciphertext data, ciphertext calculation is carried out to obtainWill (E)pk,E(n),mω) Submitting to a blockchain network, where mωAuthorization information given to the research analyst by the supervisor.
After obtaining the ciphertext, the research analyst decrypts the ciphertext by using the private key to obtain:
D(E(n))=n1+n2+……+ni。
X can be calculated in the same way3And other statistical correlation functions, which are not listed.
TABLE 2 participant data information upload Table
The authentication authorization information m in S106 provided by the embodiment of the inventionωIf all the verification is passed, the block chain network provides the analyst with partial authorization information m according to the query command of the research analystωThe research analyst will decrypt the ciphertext using the private key.
In all S101-S107 provided by the embodiment of the invention, a public key pk provided by a research analyst is adopted for encryption and then transmitted to a block chain; the data on the blockchain can only be decrypted by a research analyst, and the access right of the research analyst to the blockchain is limited to a specific value due to the authorization of a supervisor, so that the information of the participating computer is not leaked. The invention provides a method for joint privacy calculation analysis and provides data security thereof to research analysts.
The technical solution of the present invention is further described with reference to the following specific examples.
A researcher A in a disease control center wants to study the average value, element, of the influence of an element B on human healthThe influence value of the element B on the human body is known, and a supervisor C and a participant P are assumed to exist on a block chain1,P2,P3The data owned by the three are 8, 18 and 7 respectively.
The method comprises the following steps: the research analyst registers identity information.
Researcher a chooses (p is 5, q is 7) to run Paillier cryptosystem to generate public and private key pair (pk is (35, 3), sk is 12), zero proof of knowledge parameter ZARegistering identity information MID (ID)A,pk,ZA,M1,M2In which M is1For the analyst to query the field of the data sum, M2A field to count the number of people participating in a query.
Step two: the supervisor C receives the registration information and verifies the signature through the public key pk of the analyst; generating a verification key and a signature key (pk) required for authentication according to RSA signature algorithm*,sk*). After confirming that the research analyst is a normal research analyst, the supervisor stores the analyst's information in the user information pool and feeds back a signature key sk to the trusted research analyst*And authorization information mω={pk,ZA,M1,M2Time, where time is the authorization deadline.
Step three: supervisor C generates public and private key pairs (Jpk, Jsk) and a zero knowledge proof parameter Z using the same Paillier encryption systemCAnd published in a blockchain network (Jpk, Z)C)。
Step four: the researcher A submits an information query request and authorization information m to the blockchain networkωThe method comprises a data ciphertext calculation mode.
Step five: p1,P2,P3After receiving the authorization information, the public key pk is passed*And verifying the authorization information. After the verification is passed, the encryption calculation is carried out, P1Selecting a random number r1=2
Calculation of Epk(8)=498,EJpk(8),ZA(pk,8),ZC(Jpk,8),
Will { (E)pk(8)=498,EJpk(8),ZA(pk,8),ZC(Jpk,8)),M11Sending to a block chain network;
P2selecting a random number r2Calculate E6 ═ 6pk(18)=314,EJpk(18),ZA(pk,18),ZC(Jpk,18),
Will { (E)pk(18)=314,EJpk(18),ZA(pk,18),ZC(Jpk,8)),M11Sending to a block chain network;
P3selecting a random number r2Calculate E4 ═ 4pk(7)=538,EJpk(7),ZA(pk,7),ZC(Jpk,7),
Will { (E)pk(7)=538,EJpk(7),ZA(pk,7),ZC(Jpk,7)),M11It is sent to the blockchain network.
Due to P1,P2,P3Are all blockchain network nodes, and can acquire other nodes with M11Calculation of ciphertext data of a field, e.g. P1Can calculate (E)pk(8)·Epk(21)·Epk(7)mod 352) 36, acquiring the ciphertext data and obtaining the number of people participating in the calculation, namely 3; after the computation is finished, P1Will { Epk(n)=36,M1}{3,M2It is sent to the blockchain network.
P2,P3And performing ciphertext calculation by adopting the same method and sending the ciphertext to the block chain network.
Supervisor C verifies by zero knowledge proof ZA(pk,8),ZC(Jpk, 8) whether "8" is the same or not, and also verifies P1,P2,P3Finally provided data EpkAnd (n) whether the data are consistent or not is judged to be 36, and the accuracy of the data is ensured.
Step six: a passes the authorization information mωWith M on the acquisition block chain1,M2Ciphertext data { Epk(n)=36,M1},(3,M2}。
(Note: encryption of the number of people participating in the calculation is mainly used in distributed data set calculation, so here the number of people 3 is not encrypted)
Step seven: a acquisition data { Epk(n)=36,M1},{3,M2After that, the average value is obtained by decrypting with the private key sk of 12
Namely:
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110270194.7A CN113127926B (en) | 2021-03-12 | 2021-03-12 | Method, system, storage medium and computer for analyzing statistical correlation of privacy data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110270194.7A CN113127926B (en) | 2021-03-12 | 2021-03-12 | Method, system, storage medium and computer for analyzing statistical correlation of privacy data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113127926A true CN113127926A (en) | 2021-07-16 |
CN113127926B CN113127926B (en) | 2024-01-16 |
Family
ID=76773058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110270194.7A Active CN113127926B (en) | 2021-03-12 | 2021-03-12 | Method, system, storage medium and computer for analyzing statistical correlation of privacy data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113127926B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114004595A (en) * | 2021-11-03 | 2022-02-01 | 上海边界智能科技有限公司 | Block chain-based government affair statistical information management method and system |
CN114172655A (en) * | 2021-11-07 | 2022-03-11 | 西安链融科技有限公司 | Secure multi-party computing data system, method, equipment and data processing terminal |
CN115189886A (en) * | 2022-06-14 | 2022-10-14 | 浙江成功软件开发有限公司 | Multi-party credible data interaction method and device based on block chain |
CN115473739A (en) * | 2022-09-15 | 2022-12-13 | 深圳壹账通智能科技有限公司 | Data processing method, device and equipment based on block chain and storage medium |
CN117032565A (en) * | 2023-07-25 | 2023-11-10 | 苏州申浪信息科技有限公司 | File security management system based on block chain technology |
CN117294482A (en) * | 2023-09-14 | 2023-12-26 | 广电运通集团股份有限公司 | Data verification method and device based on multiparty security privacy calculation |
CN118313008A (en) * | 2024-05-07 | 2024-07-09 | 广州美亿互联信息技术有限公司 | Big data intelligent analysis system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN110717191A (en) * | 2019-10-24 | 2020-01-21 | 兰州理工大学 | Block chain data privacy protection access control method based on searchable attribute encryption |
WO2020024465A1 (en) * | 2018-08-01 | 2020-02-06 | 中国科学院数据与通信保护研究教育中心 | Block chain data traceability method |
CN111797427A (en) * | 2020-06-04 | 2020-10-20 | 中国科学院信息工程研究所 | A blockchain user identity supervision method and system that takes into account privacy protection |
CN112035889A (en) * | 2020-09-03 | 2020-12-04 | 平安壹钱包电子商务有限公司 | Block chain privacy verification method and device for computing outsourcing and computer equipment |
-
2021
- 2021-03-12 CN CN202110270194.7A patent/CN113127926B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
WO2020024465A1 (en) * | 2018-08-01 | 2020-02-06 | 中国科学院数据与通信保护研究教育中心 | Block chain data traceability method |
CN110717191A (en) * | 2019-10-24 | 2020-01-21 | 兰州理工大学 | Block chain data privacy protection access control method based on searchable attribute encryption |
CN111797427A (en) * | 2020-06-04 | 2020-10-20 | 中国科学院信息工程研究所 | A blockchain user identity supervision method and system that takes into account privacy protection |
CN112035889A (en) * | 2020-09-03 | 2020-12-04 | 平安壹钱包电子商务有限公司 | Block chain privacy verification method and device for computing outsourcing and computer equipment |
Non-Patent Citations (1)
Title |
---|
周艺华;李洪明;: "基于区块链的数据管理方案", 信息安全研究, no. 01 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114004595A (en) * | 2021-11-03 | 2022-02-01 | 上海边界智能科技有限公司 | Block chain-based government affair statistical information management method and system |
CN114172655A (en) * | 2021-11-07 | 2022-03-11 | 西安链融科技有限公司 | Secure multi-party computing data system, method, equipment and data processing terminal |
CN114172655B (en) * | 2021-11-07 | 2024-03-08 | 西安链融科技有限公司 | Secure multiparty computing data system, method, equipment and data processing terminal |
CN115189886A (en) * | 2022-06-14 | 2022-10-14 | 浙江成功软件开发有限公司 | Multi-party credible data interaction method and device based on block chain |
CN115473739A (en) * | 2022-09-15 | 2022-12-13 | 深圳壹账通智能科技有限公司 | Data processing method, device and equipment based on block chain and storage medium |
CN117032565A (en) * | 2023-07-25 | 2023-11-10 | 苏州申浪信息科技有限公司 | File security management system based on block chain technology |
CN117032565B (en) * | 2023-07-25 | 2024-06-07 | 申浪信息科技(江苏)有限公司 | File security management system based on block chain technology |
CN117294482A (en) * | 2023-09-14 | 2023-12-26 | 广电运通集团股份有限公司 | Data verification method and device based on multiparty security privacy calculation |
CN118313008A (en) * | 2024-05-07 | 2024-07-09 | 广州美亿互联信息技术有限公司 | Big data intelligent analysis system |
Also Published As
Publication number | Publication date |
---|---|
CN113127926B (en) | 2024-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113127926B (en) | Method, system, storage medium and computer for analyzing statistical correlation of privacy data | |
Sookhak et al. | Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues | |
US20230299938A9 (en) | System for privacy protection during iot secure data sharing and method thereof | |
CN107566116B (en) | Method and apparatus for digital asset weight registration | |
Zhu et al. | TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization | |
Jiang et al. | Attribute-based encryption with blockchain protection scheme for electronic health records | |
Fugkeaw | Enabling trust and privacy-preserving e-KYC system using blockchain | |
Lee et al. | MEXchange: a privacy-preserving blockchain-based framework for health information exchange using ring signature and stealth address | |
US20230336366A1 (en) | Authentication system and method | |
CN113193948A (en) | Multi-party united privacy data statistical analysis method and information data processing terminal | |
Bose et al. | BLIC: A blockchain protocol for manufacturing and supply chain management of ICS | |
Garcia et al. | Blockchain-aided and privacy-preserving data governance in multi-stakeholder applications | |
Zaghloul et al. | $ d $ d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications | |
Sharma et al. | A Framework of Big Data as a Service Platform for Access Control & Privacy Protection Using Blockchain Network | |
Wu et al. | The survey on the development of secure multi-party computing in the blockchain | |
Gao et al. | Blockchain-enabled supervised secure data sharing and delegation scheme in Web3. 0 | |
Patel et al. | Data storage security model for cloud computing | |
Sisodiya et al. | A comprehensive study of Blockchain and its various Applications | |
CN117056984A (en) | Method, system, computer equipment and storage medium for data security calculation | |
Zhang et al. | Attribute based conjunctive keywords search with verifiability and fair payment using blockchain | |
US20230074475A1 (en) | Systems And Methods For Implementing Privacy Layer In CBDC Networks | |
Ou et al. | TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication | |
Meenakshi et al. | Cloud Security Analysis using Blockchain Technology | |
Dong et al. | The secure data sharing and interchange model based on blockchain for single window in trade facilitation | |
Hu et al. | EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an Applicant after: XIDIAN University Applicant after: Xi'an Lianrong Technology Co.,Ltd. Address before: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an Applicant before: XIDIAN University Applicant before: XI'AN XIDIAN LIANRONG TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |