CN113139204A - Medical data privacy protection method using zero-knowledge proof and shuffling algorithm - Google Patents

Medical data privacy protection method using zero-knowledge proof and shuffling algorithm Download PDF

Info

Publication number
CN113139204A
CN113139204A CN202110111577.XA CN202110111577A CN113139204A CN 113139204 A CN113139204 A CN 113139204A CN 202110111577 A CN202110111577 A CN 202110111577A CN 113139204 A CN113139204 A CN 113139204A
Authority
CN
China
Prior art keywords
data
algorithm
shuffling
challenge
verifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110111577.XA
Other languages
Chinese (zh)
Other versions
CN113139204B (en
Inventor
张雪垣
董理
余水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast Digital Economic Development Research Institute
Original Assignee
Southeast Digital Economic Development Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast Digital Economic Development Research Institute filed Critical Southeast Digital Economic Development Research Institute
Priority to CN202110111577.XA priority Critical patent/CN113139204B/en
Publication of CN113139204A publication Critical patent/CN113139204A/en
Application granted granted Critical
Publication of CN113139204B publication Critical patent/CN113139204B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a medical data privacy protection method using zero knowledge certification and a shuffling algorithm, which uses a zero knowledge certification technology and the shuffling algorithm to prevent illegal access and use behaviors of personal medical privacy data when big data are used so as to ensure the security of sensitive privacy data. For example, when large enterprises and government related departments call a large amount of medical data for use, the calling authority of personal privacy information is protected by a zero-knowledge proof technology, and in the process of uploading and using the information, the information is (un) recoverably scrambled by using a shuffling algorithm so as to reduce the risk of data leakage. The invention relates to a medical data privacy protection method using zero knowledge certification and shuffling algorithm, which protects data sensitive information in the stages of data uploading, data use and result feedback; and verifying the legality of the user and guaranteeing the anonymity of the user by using zero knowledge proof.

Description

Medical data privacy protection method using zero-knowledge proof and shuffling algorithm
Technical Field
The invention relates to the technical field, in particular to a medical data privacy protection method by using a zero-knowledge proof and shuffling algorithm.
Background
The existing sensitive database has serious data privacy protection processing deficiency. In the face of the requirement of further reasonably and legally using information in a big data environment, the attack launched by a malicious node is often unable to do so at present; meanwhile, the records and personnel of legal use data can cause commercial and production risks to users if the records and personnel are directly disclosed.
In terms of medical data, databases including personal privacy, such as medical information systems, have recently become key targets for hacking, and thus, there are many cases where information security incidents, such as illegal theft, leakage, and use of medical information, occur. The attack mode is that besides internal reasons such as internal personnel stealing and data loss, network attacks such as external hacker penetration invasion, unauthorized access and interface exposure are more common.
Meanwhile, the common electronic medical system usually has no data encryption, analysis and integration functions, and the core content of the system is the health condition and basic information of individual patients. Once the information is leaked, the privacy of the patient is directly damaged, and a cheater can carry out illegal activities such as telecommunication fraud, false medical advertising marketing and the like with extremely strong pertinence by using the accurate information.
Furthermore, when a legitimate user (a drug enterprise) invokes relevant data for drug development, new drug tracking tests, the user and user behavior (which data is used for which analysis) needs to be recorded. But because of the business confidentiality, the drug enterprises have anonymous requirements. However, the anonymity poses a challenge to supervision, the privacy of patients is difficult to guarantee, and a 'one-cut' protection path for forbidding the data mining industry cannot adapt to the social revolution.
For the above situation, the following protection methods are available: data encryption, access control, trusted third party auditing, data searching, and data anonymization. The following are brief descriptions and disadvantages thereof:
cryptography is a security technique that encrypts an original message through an encryption algorithm into a ciphertext, which is transmitted over a public channel to a recipient, and then decrypts the message into a plain text. However, a complicated encryption algorithm or transmission protocol may greatly affect the transmission rate, and even may not perform data transmission. Furthermore, they require the use of valuable medical resources, which are unavailable.
Access control is a means by which a data system defines user identities and predefined policies to prevent unauthorized users from accessing resources. Various encryption methods are applied, including Symmetric Key Encryption (SKE), Asymmetric Key Encryption (AKE) and attribute-based encryption (ABE). In general, encryption relies on a key. The size and generation mechanism of the key directly affect the security of the cryptographic system. Thus, for cryptographic systems, the key management mechanism determines the life cycle of the security system.
A Trusted Third Party (TTP) with good reputation can correctly introduce unbiased auditing results, thereby realizing the responsibility of the cloud service provider and protecting the legal interests of the cloud users. However, excessive reliance on expected judgment and predefined tags limits their wide spread.
The main methods of searchable encryption include Searchable Symmetric Encryption (SSE) and public key encryption with keyword search (PEKS). It should be noted that the more complex the encryption measures, the more difficult it is to search for data, and the more difficult it is to check the consistency of the search results. If the search results cannot be applied in time, all security and privacy measures are less meaningful.
Data anonymization is to correctly process a single attribute of a new data set while considering distribution characteristics of original data in a data publishing process so as to protect privacy of a patient. However, a disadvantage is that it does not enforce any restrictions on sensitive data, and an attacker can use coherence attacks and background knowledge attacks to identify sensitive data and personal contacts, resulting in loss of privacy.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a medical data privacy protection method using zero knowledge certification and a shuffling algorithm, and through the shuffling algorithm, data sensitive information is protected in the stages of data uploading, data use and result feedback; and verifying the legality of the user and guaranteeing the anonymity of the user by using zero knowledge proof.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
a medical data privacy protection method using zero-knowledge proof and shuffle algorithm includes the following steps:
1) constructing a framework: the system comprises a user side, a hospital side and a medicine enterprise side, wherein the hospital side collects and records the privacy of health data and the like of patients, ensures information ownership right and basic encryption by using private key signatures of the patients, performs restorable basic shuffling on the information of a plurality of patients through a shuffling algorithm, and stores the information into a database; then, a data calling request is put forward, the database extracts related data and then shuffles the data again, and meanwhile, the weak change is ensured not to influence the overall distribution of the data;
2) shuffling: firstly, randomly mapping personal data, then scrambling the personal data by a shuffling algorithm, and finally verifying the scrambling degree and comparing the data distribution of the data by an analyzer to ensure the integrity of the whole body, wherein the algorithm is a 'perfect shuffling method', namely, the algorithm is rotated for a certain number of times;
3) algorithm based on shuffled data: when the health data is needed, the personal health data in the database will go through a shuffling algorithm similar to that in step 2), except that the shuffling machine at this time employs a "non-perfect shuffling" algorithm that does not restore the original sequence. Meanwhile, the analyzer is expanded, and under certain specific conditions, the audited deep learning framework uploaded by the enterprise is allowed to be used, but only the audited result is returned;
4) identity verification based on zero knowledge proof: firstly, a prover makes a commitment to a proposition, the commitment waits for a verifier to provide a challenge and verify, the verifier generates a zero-knowledge proof request, the prover combines a received random number to provide the commitment and returns the commitment to the verifier, the verifier verifies whether the corresponding challenge is correct or not, if the challenge is wrong, the proof fails, if the challenge is correct, the next challenge is carried out until the probability which can be trusted reaches a threshold value, and the proof is successful.
As an improvement, the specific method of the step 4) is as follows:
the prover needs to prove that he/she owns the private identity key pk, and uses the generating function g (a) ═ gaGenerating a public key PK ═ gpkSending the public key and the certification request t, t ═ g (v) to the verifier;
after receiving the request t, the verifier generates a random number c, forms a challenge and sends the challenge to the prover, the prover calculates z as v-c · pk, and returns z to the verifier to respond to the challenge;
the verifier verifies whether the "request" and the "challenge feedback" are consistent, and calculates whether t is consistent with G (z) & PKcAs such. Generating a function g (a) ═ gaThe design may be based on discrete logarithm puzzles or other NPC issues to adjust the trust threshold and number of challenges.
As an improvement, the verifier is not aware of pk, v of the prover, who cannot know in advance the random sequence order of the verifier's random number challenge.
As a refinement, the protocol P (-) for shuffling in step 2) is defined as follows:
random Encoder algorithm Randomizer Encoder, R (·): will be provided with
Figure RE-GDA0003095410840000031
Mapping onto variable-length message vectors
Figure RE-GDA0003095410840000032
The length is m;
shuffler algorithm shuffle, S (-): for multiple message vectors
Figure RE-GDA0003095410840000033
Of (2) element(s)
Figure RE-GDA0003095410840000034
Shuffling to obtain a set of messages Y, n being
Figure RE-GDA0003095410840000035
The number of (2);
as an improvement, and to run certain analysis functions on these messages.
The entire shuffling protocol can be expressed as:
P=(R,S,A);
Figure RE-GDA0003095410840000036
the invention has the following advantages:
the invention protects shuffling algorithm and zero knowledge proof aiming at the storage and utilization modes of sensitive information such as medical data. The information safety is protected and the information precision is reduced by disturbing the information sequence, so that the risk of utilizing the information even after being stolen is ensured to be controlled; meanwhile, the requirements of legal groups, users, units and the like on legally and anonymously calling the data are met, and the behaviors of the groups, the users, the units and the like are protected; the called data is not transmitted outside and is further shuffled and disordered, so that the sensitive information leakage hazard is effectively reduced.
Drawings
Fig. 1 is a schematic diagram of a privacy protection method framework of the present invention.
Figure 2 is a schematic diagram of the shuffle-based data upload framework of the present invention.
Figure 3 is a diagram of the shuffle-based data call framework of the present invention.
FIG. 4 is a timing diagram of the zero knowledge authentication mechanism of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
With reference to fig. 1-4, a method for protecting privacy of medical data by using zero knowledge certification and a shuffling algorithm, which uses a zero knowledge certification technology and a shuffling algorithm to prevent illegal access and use behaviors of private medical data when big data are used, so as to ensure the security of sensitive private data. For example, when a large enterprise and a government-related department call a large amount of medical data for use, the call authority of personal privacy information (such as real-time position, medical consumption, disease history, income details and the like) is protected by a zero-knowledge proof technology (namely, the access call record authority is subjected to zero-knowledge proof verification by a database), and in the process of uploading and using the information, the information is (or is not) subjected to recoverable scrambling by using a shuffling algorithm so as to reduce the leakage risk of the data.
As shown in fig. 1, this is a basic framework diagram divided into three major ends, which is composed of a user (patient) end, a hospital (data center) end, and a medicine enterprise (enterprise government, etc.);
the medical unit is used as a data center for explanation, the hospital side collects and records the privacy of the health data and the like of the patient, and the patient uses a private key signature to ensure the information ownership and basic encryption. The information from multiple patients is then restorable, base shuffled (scrambled) by a shuffling algorithm and saved to a database. For the medicine enterprise, identity verification of zero knowledge proof is needed to be carried out on the database before the database is accessed, and the legal identity of the user is verified (public key distribution and registration are completed in advance) under the condition that identity information of the user is not exposed; and then, a data calling request is put forward, the database extracts related data and then shuffles the data again, and meanwhile, the weak change is ensured not to influence the overall distribution of the data. The specific data does not leave the data center.
As shown in fig. 2, the health data of the user is entered into the database via a basic shuffling protocol. Firstly, random mapping is carried out on personal data, then the random mapping is carried out in a shuffling algorithm for scrambling, and finally the scrambling degree and the comparison of data distribution are verified through an analyzer, so that the integrity of the whole body is ensured. Note that the algorithm here is "perfect shuffle," i.e., the original data can be recovered through a certain number of rounds, but the number parameter is customized by the user. The specific shuffling algorithm consists of the following three parts.
Figure RE-GDA0003095410840000041
Figure RE-GDA0003095410840000042
Figure RE-GDA0003095410840000043
Figure RE-GDA0003095410840000051
Wherein,
Figure RE-GDA0003095410840000052
data representing one user, X being its set and the set size being n;
Figure RE-GDA0003095410840000053
to represent
Figure RE-GDA0003095410840000054
The length of the mapped vector is m, and the set is represented by Y;
Figure RE-GDA0003095410840000055
a data field, of size k, referring to user data;
Figure RE-GDA0003095410840000056
is a natural number set; λ is a probability parameter representing a change probability during data mapping; num is the parameter of perfect shuffling times;
Figure RE-GDA0003095410840000057
the histogram information vector is used for measuring the change degree of the data before and after shuffling; ber (λ) represents randomizing data with a probability of λ; uniform (·) represents a function that takes values randomly from a defined range;
Figure RE-GDA0003095410840000058
represents the counting operation, is initially 0 when z [ i ]]==ypqWhen the condition is satisfied, the counter is added with 1, q belongs to [ m ]],p∈[n]Indicating the count range of the counter.
When the health data is needed, the personal health data in the database is subjected to a shuffling step similar to the algorithm described above, as shown in figure 3. Except that the shuffler machine at this point employs a "non-perfect shuffle" algorithm that does not restore the original sequence. Meanwhile, the analyzer is expanded, and allows the audited deep learning framework uploaded by the enterprise to be used under certain conditions, but only the result which is also audited is returned.
As shown in FIG. 4, the identity authentication mechanism based on zero knowledge proof mainly comprises the steps of 01-04, and 05-09, which are the request and execution of the subsequent drug enterprises for data call. The certification process is mainly used for guaranteeing the external anonymity of the medicine enterprises, and the medicine enterprises do not anonymize the database (proved by zero knowledge). Note that the timing diagram is shown only once here, and in fact it is challenging to reach a threshold with a probability that can be trusted to confirm the proof was successful.
The prover needs to prove that he/she owns the private identity key pk, and uses the generating function g (a) ═ gaGenerating a public key PK ═ gpkThe public key and the certification request t, t ═ g (v) are transmitted to the verifier. After receiving the request t, the verifier generates a random number c, forms a challenge and sends the challenge to the prover. The prover calculates z-v-c · pk, returns z to the verifier in response to the challenge. The verifier verifies whether the "request" and the "challenge feedback" are consistent, and calculates whether t is consistent with G (z) & PKcAs such. Generating a function g (a) ═ gaThe design may be based on discrete logarithm puzzles or other NPC issues to adjust the trust threshold and number of challenges.
In this process, the verifier does not know pk, v of the prover, and the prover cannot know the random sequence order of the random number challenge of the verifier in advance. Let the confidence threshold be σ and the challenge number be numcIf the confidence probability obtained after each battle selection is eta, then
Figure RE-GDA0003095410840000059
Then, the prover proves success.
The present invention and its embodiments have been described above, and the description is not intended to be limiting, and the drawings are only one embodiment of the present invention, and the actual structure is not limited thereto. In summary, those skilled in the art should appreciate that they can readily use the disclosed conception and specific embodiments as a basis for designing or modifying other structures for carrying out the same purposes of the present invention without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (4)

1. A medical data privacy protection method using zero-knowledge proof and shuffle algorithm is characterized in that: the method comprises the following specific steps:
1) constructing a framework: the system comprises a user side, a hospital side and a medicine enterprise side, wherein the hospital side collects and records the privacy of health data and the like of patients, ensures information ownership right and basic encryption by using private key signatures of the patients, performs restorable basic shuffling on the information of a plurality of patients through a shuffling algorithm, and stores the information into a database; then, a data calling request is put forward, the database extracts related data and then shuffles the data again, and meanwhile, the weak change is ensured not to influence the overall distribution of the data;
2) shuffling: firstly, randomly mapping personal data, then scrambling the personal data by a shuffling algorithm, and finally verifying the scrambling degree and comparing the data distribution of the data by an analyzer to ensure the integrity of the whole body, wherein the algorithm is a 'perfect shuffling method', namely, the algorithm is rotated for a certain number of times;
3) algorithm based on shuffled data: when the health data is needed, the personal health data in the database will go through a shuffling algorithm similar to that in step 2), except that the shuffling machine at this time employs a "non-perfect shuffling" algorithm that does not restore the original sequence. Meanwhile, the analyzer is expanded, and under certain specific conditions, the audited deep learning framework uploaded by the enterprise is allowed to be used, but only the audited result is returned;
4) identity verification based on zero knowledge proof: firstly, a prover makes a commitment to a proposition, the commitment waits for a verifier to provide a challenge and verify, the verifier generates a zero-knowledge proof request, the prover combines a received random number to provide the commitment and returns the commitment to the verifier, the verifier verifies whether the corresponding challenge is correct or not, if the challenge is wrong, the proof fails, if the challenge is correct, the next challenge is carried out until the probability which can be trusted reaches a threshold value, and the proof is successful.
2. The method of privacy protection of medical data using zero-knowledge proof and shuffle algorithm of claim 1, wherein: the specific method of the step 4) comprises the following steps:
the prover needs to prove that he/she owns the private identity key pk, and uses the generating function g (a) ═ gaGenerating a public key PK ═ gpkSending the public key and the certification request t, t ═ g (v) to the verifier;
after receiving the request t, the verifier generates a random number c, forms a challenge and sends the challenge to the prover, the prover calculates z as v-c · pk, and returns z to the verifier to respond to the challenge;
the verifier verifies whether the "request" and the "challenge feedback" are consistent, and calculates whether t is consistent with G (z) & PKcAs such. Generating a function g (a) ═ gaThe design may be based on discrete logarithm puzzles or other NPC issues to adjust the trust threshold and number of challenges.
3. The method of privacy protection of medical data using zero-knowledge proof and shuffle algorithm of claim 2, wherein: the verifier does not know pk, v of the prover, who cannot know in advance the random sequence order of the verifier's random number challenge.
4. The method of privacy protection of medical data using zero-knowledge proof and shuffle algorithm of claim 1, wherein: the shuffling protocol P (-) in the step 2) is defined as follows:
random Encoder algorithm Randomizer Encoder, R (·): will be provided with
Figure FDA0002919101020000011
Mapping onto variable-length message vectors
Figure FDA0002919101020000012
The length is m;
shuffler algorithm shuffle, S (-): for multiple message vectors
Figure FDA0002919101020000013
Of (2) element(s)
Figure FDA0002919101020000014
Shuffling to obtain a set of messages Y, n being
Figure FDA0002919101020000015
The number of (2);
analyzer algorithm Analyzer, a (·): it takes as input all outgoing messages of S (-) and runs some analysis functions on these messages.
The entire shuffling protocol can be expressed as:
P=(R,S,A);
Figure FDA0002919101020000021
CN202110111577.XA 2021-01-27 2021-01-27 Medical data privacy protection method using zero-knowledge proof and shuffling algorithm Active CN113139204B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110111577.XA CN113139204B (en) 2021-01-27 2021-01-27 Medical data privacy protection method using zero-knowledge proof and shuffling algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110111577.XA CN113139204B (en) 2021-01-27 2021-01-27 Medical data privacy protection method using zero-knowledge proof and shuffling algorithm

Publications (2)

Publication Number Publication Date
CN113139204A true CN113139204A (en) 2021-07-20
CN113139204B CN113139204B (en) 2022-09-30

Family

ID=76811195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110111577.XA Active CN113139204B (en) 2021-01-27 2021-01-27 Medical data privacy protection method using zero-knowledge proof and shuffling algorithm

Country Status (1)

Country Link
CN (1) CN113139204B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113641975A (en) * 2021-10-18 2021-11-12 国网电子商务有限公司 Identity registration method, identity verification method, device and system
CN114021164A (en) * 2021-10-29 2022-02-08 河南大学 Block chain-based credit investigation system privacy protection method
CN115801285A (en) * 2022-12-02 2023-03-14 北京国脉互联信息科技有限公司 Policy application method and system based on zero-knowledge proof and computer storage medium
WO2023092320A1 (en) * 2021-11-24 2023-06-01 Intel Corporation In-memory protection for neural networks

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2550259A1 (en) * 2000-03-24 2001-10-04 Dategrity Corporation Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
GB0406722D0 (en) * 2004-03-25 2004-04-28 Cryptomathic As A volting system with full accountability
EP1633077A2 (en) * 2000-03-24 2006-03-08 Dategrity Corporation Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
CN101131773A (en) * 2001-03-24 2008-02-27 沃特黑尔公司 Verifiable secret shuffles and their application to electronic voting
US20080144813A1 (en) * 2005-02-28 2008-06-19 Jun Furukawa Shuffle-Decrypting Legitimacy Certifying Apparatus and Method, Shuffle-Decrypting Verifying Apparatus and Method, Program, and Recording Medium
CN107426176A (en) * 2017-06-12 2017-12-01 东南大学 It is a kind of to support to obscure transmission method under the safe water with Zero Knowledge
CN110781521A (en) * 2018-12-06 2020-02-11 山东大学 Intelligent contract authentication data privacy protection method and system based on zero-knowledge proof
CN111246468A (en) * 2020-01-14 2020-06-05 华南理工大学 Data quality perception incentive method aiming at privacy protection in group perception

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2550259A1 (en) * 2000-03-24 2001-10-04 Dategrity Corporation Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
EP1633077A2 (en) * 2000-03-24 2006-03-08 Dategrity Corporation Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
CN101131773A (en) * 2001-03-24 2008-02-27 沃特黑尔公司 Verifiable secret shuffles and their application to electronic voting
GB0406722D0 (en) * 2004-03-25 2004-04-28 Cryptomathic As A volting system with full accountability
US20080144813A1 (en) * 2005-02-28 2008-06-19 Jun Furukawa Shuffle-Decrypting Legitimacy Certifying Apparatus and Method, Shuffle-Decrypting Verifying Apparatus and Method, Program, and Recording Medium
CN107426176A (en) * 2017-06-12 2017-12-01 东南大学 It is a kind of to support to obscure transmission method under the safe water with Zero Knowledge
CN110781521A (en) * 2018-12-06 2020-02-11 山东大学 Intelligent contract authentication data privacy protection method and system based on zero-knowledge proof
CN111246468A (en) * 2020-01-14 2020-06-05 华南理工大学 Data quality perception incentive method aiming at privacy protection in group perception

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113641975A (en) * 2021-10-18 2021-11-12 国网电子商务有限公司 Identity registration method, identity verification method, device and system
CN114021164A (en) * 2021-10-29 2022-02-08 河南大学 Block chain-based credit investigation system privacy protection method
CN114021164B (en) * 2021-10-29 2024-02-13 河南大学 Credit system privacy protection method based on block chain
WO2023092320A1 (en) * 2021-11-24 2023-06-01 Intel Corporation In-memory protection for neural networks
CN115801285A (en) * 2022-12-02 2023-03-14 北京国脉互联信息科技有限公司 Policy application method and system based on zero-knowledge proof and computer storage medium

Also Published As

Publication number Publication date
CN113139204B (en) 2022-09-30

Similar Documents

Publication Publication Date Title
CN113139204B (en) Medical data privacy protection method using zero-knowledge proof and shuffling algorithm
Ramachandran et al. Using blockchain and smart contracts for secure data provenance management
Kaaniche et al. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Huang et al. Blockchain-based multiple groups data sharing with anonymity and traceability
Denning et al. Data security
Khaliq et al. A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy
CN109829333B (en) OpenID-based key information protection method and system
Cheng et al. Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption
Yan et al. Integrity audit of shared cloud data with identity tracking
Jayaraman et al. RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud
Allard et al. MET 𝔸 P: revisiting Privacy-Preserving Data Publishing using secure devices
Franchi et al. Information and password attacks on social networks: An argument for cryptography
CN113507704A (en) Mobile crowd sensing privacy protection method based on double attribute decision
Wang et al. Insider collusion attack on privacy-preserving kernel-based data mining systems
Wiefling et al. Privacy considerations for risk-based authentication systems
CN112037870A (en) Double-server light searchable encryption method and system supporting data partitioning
Said et al. A multi-factor authentication-based framework for identity management in cloud applications
Kumar et al. Freedom of privacy: anonymous data collection with respondent-defined privacy protection
Hao et al. Robust and secure federated learning against hybrid attacks: a generic architecture
Hicks et al. Vams: Verifiable auditing of access to confidential data
Garofalo et al. PIVOT: PrIVate and effective cOntact Tracing
Du et al. Secure and verifiable keyword search in multiple clouds
CN114124392B (en) Data controlled circulation method, system, device and medium supporting access control
Huang et al. Achieving data privacy on hybrid cloud
Zhang et al. CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant