CN114629717B - Data processing method, device, system, equipment and storage medium - Google Patents

Data processing method, device, system, equipment and storage medium Download PDF

Info

Publication number
CN114629717B
CN114629717B CN202210337935.3A CN202210337935A CN114629717B CN 114629717 B CN114629717 B CN 114629717B CN 202210337935 A CN202210337935 A CN 202210337935A CN 114629717 B CN114629717 B CN 114629717B
Authority
CN
China
Prior art keywords
data
mapping
party
matrix filter
service data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210337935.3A
Other languages
Chinese (zh)
Other versions
CN114629717A (en
Inventor
牛永川
毛云龙
吴烨
段伟民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Douyin Vision Co Ltd
Original Assignee
Douyin Vision Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Douyin Vision Co Ltd filed Critical Douyin Vision Co Ltd
Priority to CN202210337935.3A priority Critical patent/CN114629717B/en
Publication of CN114629717A publication Critical patent/CN114629717A/en
Priority to PCT/CN2023/079076 priority patent/WO2023185360A1/en
Application granted granted Critical
Publication of CN114629717B publication Critical patent/CN114629717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Abstract

The present disclosure provides a data processing method, apparatus, system, device, and storage medium, receiving a matrix filter from a second data party; the matrix filter encrypts a second service data set based on a reserved first encryption mode for a second data party, performs data interaction with the second data party for a first element in the first service data set based on the reserved first encryption mode and a preset key exchange protocol to obtain to-be-verified data corresponding to the first element, maps the to-be-verified data corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element, and determines whether the first element belongs to an intersection of the first service data set and the second service data set based on the mapping result corresponding to the first element. The first encryption mode based on reservation and the preset key exchange protocol ensure the data security of both communication parties, reduce the calculation cost and improve the calculation efficiency.

Description

Data processing method, device, system, equipment and storage medium
Technical Field
The present disclosure relates to the field of data processing, and in particular, to a data processing method, apparatus, system, device, and storage medium.
Background
Along with the development of information technology, the arrival of the big data age brings convenience to the life of people and threatens the information security of individuals, and the privacy security of personal data has become the focus of attention of the whole people.
In the related art, the privacy leakage problem of the set intersection operation under the set-size symmetric scene is solved by the privacy set intersection query protocol of the careless pseudo-random function, however, aiming at the set-size asymmetric scene, the calculation cost for solving the privacy leakage problem in the set intersection determination by the protocol is large, so that the technical problem of solving the privacy leakage problem of the set intersection operation under the set-size asymmetric scene on the premise of avoiding the large calculation cost is urgent to solve at present.
Disclosure of Invention
In order to solve the technical problems, embodiments of the present disclosure provide a data processing method, apparatus, system, device, and storage medium.
In a first aspect, the present disclosure provides a data processing method, the method comprising:
receiving a matrix filter from a second party; the matrix filter encrypts and generates a second service data set for the second data party based on the reserved first encryption mode;
Based on a reserved first encryption mode and a preset key exchange protocol, performing data interaction on a first element and a second data party in a first service data set to obtain data to be verified, wherein the data to be verified corresponds to the first element; the first element is any element in a first service data set, and the element in the first service data set is a pre-collected user data sample;
mapping the data to be verified corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element;
determining whether the first element belongs to an intersection of the first service data set and the second service data set based on a mapping result corresponding to the first element; wherein the intersection is used for user crowd portrayal analysis.
In an optional implementation manner, based on a reserved first encryption mode and a preset key exchange protocol, performing data interaction with a second data party for a first element in a first service data set to obtain data to be verified corresponding to the first element, including:
encrypting a first element in a first service data set based on a first curve mapping function and a first secret index to obtain first encrypted data corresponding to the first element; wherein the first secret index is pre-generated;
Transmitting the first encrypted data corresponding to the first element to a second party; the second data side is used for encrypting the first encrypted data again based on the second secret index to generate second encrypted data corresponding to the first element; wherein the second secret exponent is pre-generated by the second party;
receiving second encrypted data corresponding to the first element, and decrypting the second encrypted data by using the first secret index to obtain first decrypted data corresponding to the first element;
mapping the first decryption data corresponding to the first element into a one-dimensional vector based on a first dimension-reduction mapping function, and determining the one-dimensional vector as data to be verified corresponding to the first element; the one-dimensional vector comprises a plurality of sub-elements obtained by dividing the first decryption data according to a preset bit length.
In an optional implementation manner, in the matrix filter, mapping the data to be verified corresponding to the first element to obtain a mapping result corresponding to the first element, where the mapping result includes:
mapping the data to be verified corresponding to the first element into a matrix filter, and determining the mapping position of the first element in the matrix filter;
respectively determining the corresponding numerical values of the mapping positions in the matrix filter as the mapping results corresponding to the first elements;
Correspondingly, based on the mapping result corresponding to the first element, determining whether the first element belongs to the intersection of the first service data set and the second service data set includes:
and if the mapping result corresponding to the first element is determined to meet the preset condition, determining that the first element belongs to an intersection of the first service data set and the second service data set.
In an alternative embodiment, the first service data set and the second service data set respectively include one or more of an audio data sample, a video data sample, an image data sample and a text data sample.
In a second aspect, the present disclosure further provides a data processing method, the method including:
encrypting the second element in the second service data set based on the reserved first encryption mode to obtain encrypted data corresponding to the second element;
generating a matrix filter based on the encrypted data corresponding to the second element;
transmitting the matrix filter to a first data party; wherein the matrix filter is for determining an intersection of a first set of traffic data and a second set of traffic data for the first party.
In an optional implementation manner, encrypting the second element in the second service data set based on the reserved first encryption mode to obtain encrypted data corresponding to the second element, including:
Respectively encrypting the second elements in the second service data set based on the first curve mapping function, the first dimension-reduction mapping function and the second secret index to obtain encrypted data respectively corresponding to the second elements; wherein the second secret exponent is pre-generated.
In an optional implementation manner, encrypting the second element in the second service data set based on the first curve mapping function, the first dimension-reduction mapping function and the second secret exponent to obtain encrypted data corresponding to the second element, including:
encrypting the second element in the second service data set based on the first curve mapping function and the second secret index to obtain third encrypted data corresponding to the second element;
and mapping the third encrypted data into a one-dimensional vector based on the first dimension-reduction mapping function, and determining the one-dimensional vector as the encrypted data corresponding to the second element.
In an optional implementation manner, encrypting the second element in the second service data set based on the first curve mapping function and the second secret exponent to obtain third encrypted data corresponding to the second element, including:
mapping a second element in the second service data set to a curve corresponding to the first curve mapping function to obtain a two-dimensional coordinate corresponding to the second element;
And determining a value obtained by multiplying the two-dimensional coordinates corresponding to the second element by the second secret index as third encrypted data corresponding to the second element.
In an alternative embodiment, the first service data set and the second service data set respectively include one or more of an audio data sample, a video data sample, an image data sample and a text data sample.
In a third aspect, the present disclosure also provides a data processing apparatus for application to a first data party, the apparatus comprising:
a receiving module for receiving a matrix filter from a second party; the matrix filter is generated by encrypting the second service data set based on a reserved first encryption mode;
the interaction module is used for carrying out data interaction on a first element and a second data party in a first service data set based on a reserved first encryption mode and a preset key exchange protocol to obtain data to be verified, wherein the data to be verified corresponds to the first element; the first element is any element in a first service data set, and the element in the first service data set is a pre-collected user data sample;
the mapping module is used for mapping the data to be verified corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element;
The determining module is used for determining whether the first element belongs to an intersection of the first service data set and the second service data set based on a mapping result corresponding to the first element; wherein the intersection is used for user crowd portrayal analysis.
In a fourth aspect, the present disclosure also provides a data processing apparatus for application to a second data party, the apparatus comprising:
the encryption module is used for encrypting the second elements in the second service data set based on the reserved encryption mode respectively to obtain encrypted data corresponding to the second elements;
the generation module is used for generating a matrix filter based on the encrypted data corresponding to the second element;
the sending module is used for sending the matrix filter to the first data party; wherein the matrix filter is for determining an intersection of a first set of traffic data and a second set of traffic data for the first party.
In a fifth aspect, the present disclosure also provides a data processing system, the system comprising a first data party and a second data party;
the second data side is used for encrypting the second element in the second service data set based on the reserved first encryption mode to obtain encrypted data corresponding to the second element, generating a matrix filter based on the encrypted data corresponding to the second element, and sending the matrix filter to the first data side;
The first data side is used for carrying out data interaction with the second data side aiming at a first element in the first service data set based on a reserved first encryption mode and a preset key exchange protocol to obtain data to be verified, which correspond to the first element in the first service data set, respectively, mapping the data to be verified, which correspond to the first element, in the matrix filter to obtain a mapping result, which corresponds to the first element, and determining whether the first element belongs to an intersection of the first service data set and the second service data set based on the mapping result, which corresponds to the first element; wherein the intersection is used for user crowd portrayal analysis.
In a sixth aspect, the present disclosure provides a computer readable storage medium having instructions stored therein, which when run on a terminal device, cause the terminal device to implement the above-described method.
In a seventh aspect, the present disclosure provides a data processing apparatus comprising: the computer program comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the method when executing the computer program.
In an eighth aspect, the present disclosure provides a computer program product comprising computer programs/instructions which when executed by a processor implement the above-mentioned method.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has at least the following advantages:
in the method for collecting intersection provided by the embodiment of the disclosure, a first data party receives a matrix filter from a second data party; the matrix filter encrypts a second service data set for a second data party based on a reserved first encryption mode, and performs data interaction with the second data party for a first element in the first service data set based on the reserved first encryption mode and a preset key exchange protocol to obtain to-be-verified data corresponding to the first element; the method comprises the steps that a first element is any element in a first service data set, the element in the first service data set is a user data sample acquired in advance, data to be verified corresponding to the first element is mapped in a matrix filter to obtain a mapping result corresponding to the first element, and whether the first element belongs to an intersection of the first service data set and a second service data set is determined based on the mapping result corresponding to the first element; wherein the intersection is used for user crowd portrayal analysis. The data security of both communication parties is guaranteed by the first encryption mode based on reservation and the preset key exchange protocol, and meanwhile, the data security is guaranteed by the first encryption mode based on reservation and the preset key exchange protocol, so that the data security is not required to be improved by increasing the computational complexity for determining the set intersection, and the privacy leakage problem of the set intersection operation under the asymmetric scene of the set size can be solved on the premise of avoiding large computational expense.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic diagram of a data processing system according to an embodiment of the present disclosure;
FIG. 2 is a data interaction diagram of a data process provided by an embodiment of the present disclosure;
fig. 3 is a data interaction diagram of a first element and a second data party in a first service data set according to an embodiment of the present disclosure;
FIG. 4 is a flowchart of a data processing method according to an embodiment of the present disclosure;
FIG. 5 is a flowchart of another data processing method according to an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of a data processing apparatus according to an embodiment of the disclosure;
FIG. 7 is a schematic diagram of another data processing apparatus according to an embodiment of the present disclosure;
Fig. 8 is a schematic structural diagram of data processing according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
The privacy protection set intersection inquiry protocol is a privacy protection technology for protecting set intersection operation, ensures that two parties with respective sets obtain intersections of the two sets through cooperative calculation, but can not acquire other information outside the intersections, such as searching contact scenes, when a new user registers a new application, a client can make intersection operation between a mobile phone number of a friend address book of the new registered user and a mobile phone number of a registered user at a server, and an intersection result can be used for prompting the new user to carry out friend pull new or friend recommendation, so that information of other contacts outside the intersections can not be acquired in the process.
The present disclosure provides a data processing method, firstly, a second data party encrypts a second element in a second service data set based on a reserved first encryption mode to obtain encrypted data corresponding to the second element, generates a matrix filter based on the encrypted data corresponding to the second element, and sends the matrix filter to a first data party, the first data party performs data interaction with the second data party based on the reserved first encryption mode and a preset key exchange protocol for the first element in the first service data set to obtain to-be-verified data corresponding to the first element, maps the to-be-verified data corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element, and determines whether the first element belongs to an intersection of the first service data set and the second service data set based on the mapping result corresponding to the first element.
To facilitate an understanding of the overall aspects, the present disclosure first introduces a data processing system, specifically, the data processing system includes a first data party and a second data party, and referring to fig. 1, a schematic structural diagram of a data processing system is provided for an embodiment of the present disclosure.
Wherein data processing system 100 comprises a first data party 101 and a second data party 102.
Specifically, the second data side 102 is configured to encrypt a second element in the second service data set based on the reserved first encryption manner, obtain encrypted data corresponding to the second element, generate a matrix filter based on the encrypted data corresponding to the second element, and send the matrix filter to the first data side.
The first data party 101 is configured to perform data interaction with respect to a first element in the first service data set and a second data party based on a reserved first encryption manner and a preset key exchange protocol, obtain to-be-verified data corresponding to the first element, and map to-be-verified data corresponding to the first element in the matrix filter based on the matrix filter and to-be-verified data corresponding to the first element in the first service data set, obtain a mapping result corresponding to the first element, and determine whether the first element belongs to an intersection of the first service data set and the second service data set.
In the embodiment of the disclosure, the second data party encrypts the second element in the second service data set based on the reserved first encryption mode to obtain corresponding encrypted data, generates a matrix filter based on the encrypted data, and sends the matrix filter to the first data party.
After receiving a matrix filter sent by a second data party, a first data party firstly carries out data interaction on a first element in a first service data set and the second data party based on a reserved first encryption mode and a preset key exchange protocol to obtain data to be verified corresponding to the first element, then sequentially inputs the data to be verified corresponding to the first element into the matrix filter to map, so as to obtain a mapping result corresponding to the first element, and whether the first element belongs to an intersection of the first service data set and the second service data set is determined.
In the data processing system provided by the embodiment of the disclosure, the first encryption mode based on reservation and the preset key exchange protocol are completed, so that the intersection security of the first data party and the second data party is ensured, and meanwhile, the calculation cost is reduced.
Based on the description of the data processing system, the present disclosure further provides a data processing method, and referring to fig. 2, a data interaction diagram of the data processing method provided for an embodiment of the present disclosure includes:
s201: the second data party encrypts second elements in the second service data set based on the reserved first encryption mode to obtain encrypted data corresponding to the second elements, and generates a matrix filter based on the encrypted data corresponding to the second elements.
Wherein the second data party refers to the sender of the data; the reserved first encryption mode refers to that plaintext data of a data owner are processed and converted into ciphertext data through a corresponding algorithm, so that the data privacy security of the data owner is ensured.
In an alternative embodiment, the reserved first encryption manner may be implemented based on a first curve mapping function and a second secret index, which is not limited in this disclosure, specifically, the second data party maps the second element in the second service data set to a curve corresponding to the first curve mapping function, generates a corresponding two-dimensional coordinate, multiplies the two-dimensional coordinate by the second secret index to obtain corresponding encrypted data, maps the encrypted data into a one-dimensional vector based on the first dimension-reduction mapping function, determines the one-dimensional vector as the encrypted data corresponding to the second element in the second service data set, and finally generates a matrix filter based on the encrypted data, where the second secret index is generated by the second data party.
It should be noted that: the first curve mapping function needs to satisfy interchangeability, such as a secp256k1 curve, and the disclosure is not limited in any way herein.
Illustratively, the matrix filter is constructed as follows:
Firstly, constructing a matrix D of m rows and w columns by a second data party, wherein each element is 1 bit, initializing each element in the matrix D as A, then encrypting the second element in a second service data set through a reserved first encryption mode to obtain third encrypted data corresponding to the second element, and mapping the third encrypted data into a one-dimensional vector v based on a first dimension-reduction mapping function, wherein v comprises w elements such as v 1 ,v 2 ...v w The length of each element can be set according to a preset bit length, such asBits, and then setting certain elements of matrix D to B, i.e. D, based on the value of vector v i[v[i]] =B,i∈[1,w]Generating matrix filters, e.g. v 1 =10, then the tenth element of the first column of matrix D is set to B.
It should be noted that: the values of A and B are not equal.
In addition, to ensure the correctness and safety of the set intersection, taking 1 as a and 0 as b, the parameters m and w of the matrix D may be selected as follows.
Since the probability of a position 1 in any column of matrix D isThus D 1[v[1]] ||D 2[v[2]] ...‖D w[v[w]] The probability of containing k bits 1 is +.> For elements x outside the intersection, D should be guaranteed 1[v[1]] ||D 2[v[2]] ...||D w[v[w]] At least 1 bit 1 is included with a non-negligible probability, only the following formula is guaranteed to hold:
Wherein, m: the number of rows of matrix D; w: the number of columns of matrix D; a||b: a and b processes are operated in cascade; negl (·): a statistically negligible function; sigma: and (5) counting safety parameters.
S202: the second data party sends the matrix filter to the first data party.
S203: the first data party performs data interaction with the second data party aiming at a first element in the first service data set based on the reserved first encryption mode and a preset key exchange protocol to obtain data to be verified corresponding to the first element.
The first data party is a data receiving party; the preset key exchange protocol can enable the two communication parties to generate a common session key, so that data security in the data interaction process is guaranteed, for example, alice generates a secret index E, E.G is calculated and sent to Bob, bob generates a secret index F, F.G is calculated and sent to Alice, and Alice and Bob respectively calculate and obtain a shared key E.F.G.
In order to more clearly describe the generation process of the data to be verified, referring to fig. 3, a data interaction diagram between a first element and a second data party in a first service data set provided for an embodiment of the present disclosure includes:
s301: calculating beta.H G (x i ) For a first element x in a first set of traffic data i Based on a first curve mapping function H G (. Cndot.) and first secretEncrypting the first element by using the exponent beta to obtain first encrypted data beta.H corresponding to the first element G (x i ) Wherein the first secret exponent β is provided by the first party.
S302: beta.H G (x i ) To the second party.
S303: calculating alpha, beta, H G (x i ) The second data party receives the first encrypted data beta.H sent by the first data party G (x i ) Then, the first encrypted data beta.H is based on the second secret exponent alpha G (x i ) Re-encrypting to obtain second encrypted data alpha, beta, H G (x i ) Wherein the second secret exponent α is provided by the second party.
S304: alpha, beta, H G (x i ) To the first party.
S305: calculating to obtain alpha.H G (x i ) Since the first secret exponent β is provided by the first party, the first party receives the second encrypted data α·β·h transmitted by the second party G (x i ) Thereafter, the second encrypted data α·β·h can be subjected to the first secret exponent β G (x i ) Decrypting to obtain the first element x i Corresponding first decrypted data alpha.H G (x i )。
S306: calculating F (alpha.H) G (x i ) Based on a first dimension-reduction function F (·) to decrypt the first data a·h G (x i ) Mapped to a one-dimensional vector F (alpha.H) G (x i ) And determining the one-dimensional vector as data to be verified corresponding to the first element, wherein the one-dimensional vector comprises a plurality of sub-elements obtained by dividing the first decrypted data according to a preset bit length.
Wherein H is G (. Cndot.): a first curve mapping function and satisfying an exchangeable condition for mapping any element to a point on the first curve to generate a two-dimensional coordinate; beta: a first secret exponent and provided by a first data party; alpha: a second secret exponent and provided by a second data party; f (.): the first dimension-reduction mapping function is used for converting the two-dimensional coordinates into one-dimensional numerical values.
S204: the first data party maps the data to be verified corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element, and determines whether the first element belongs to an intersection of the first service data set and the second service data set based on the mapping result corresponding to the first element.
Specifically, the first data party inputs data to be verified corresponding to a first element in the first service data set into a matrix filter for mapping to obtain a mapping result corresponding to the first element, if the mapping result corresponding to the first element meets a preset condition, the first element is determined to belong to an intersection of the first service data set and the second service data set, and if the mapping result corresponding to the first element does not meet the preset condition, the first element is determined not to belong to the intersection of the first service data set and the second service data set.
The preset condition is a value set by the second data party when the matrix filter is generated.
In the data processing method provided by the embodiment of the disclosure, the second data party encrypts the second element in the second service data set based on the reserved first encryption mode to obtain encrypted data corresponding to the second element, and generates a matrix filter based on the encrypted data of the second element and sends the matrix filter to the first data party, after the first data party receives the matrix filter, the first data party performs data interaction on the first element and the second data party in the first service data set based on the reserved first encryption mode and a preset key exchange protocol to obtain data to be verified, the first data party maps the data to be verified corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element, and based on the mapping result corresponding to the first element, whether the first element belongs to an intersection of the first service data set and the second service data set is determined.
Based on this, the embodiment of the disclosure further provides a data processing method, referring to fig. 4, which is a flowchart of the data processing method provided for the embodiment of the disclosure, and is applied to the first data side, where the method includes:
s401: a matrix filter is received from a second party.
The matrix filter encrypts the second service data set based on the reserved first encryption method for the second data party.
S402: based on the reserved first encryption mode and a preset key exchange protocol, data interaction is performed on a first element and a second data party in a first service data set, and to-be-verified data corresponding to the first element is obtained.
The first element is any element in a first service data set, and the element in the first service data set is a pre-collected user data sample; the first encryption mode is used for encrypting a first element in the first service data set to obtain first encrypted data corresponding to the first element; the preset key exchange protocol is used for protecting security such as Diffie-Hellman key exchange protocol in the process of data interaction between the first data party and the second data party.
It should be noted that the first element may be one data, such as a user ID, or may be a plurality of data, such as a name, an identification card number, a phone, a home address, etc., which is not limited in this disclosure.
In an alternative implementation manner, a first element in a first service data set is encrypted based on a first curve mapping function curve and a first secret index to obtain first encrypted data corresponding to the first element, the first encrypted data is sent to a second data party, the second data party encrypts the first encrypted data corresponding to the first element again based on the second secret index to generate second encrypted data corresponding to the first element, the second encrypted data corresponding to the first element is returned to the first data party, the first data party decrypts the second encrypted data corresponding to the first element by using the first secret index after receiving the second encrypted data corresponding to the first element, the first decrypted data corresponding to the first element is obtained, finally, the first decrypted data corresponding to the first element is mapped into a one-dimensional vector based on a first dimension-reducing mapping function, and the one-dimensional vector is used as data to be verified corresponding to the first element.
It should be noted that, the first secret index is pre-generated by the first data party, the second secret index is pre-generated by the second data party, and the one-dimensional vector includes a plurality of sub-elements obtained by dividing the first decrypted data according to a preset bit length.
S403: and mapping the data to be verified corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element.
In an alternative embodiment, the data to be verified corresponding to the first element is mapped to the matrix filter, the mapping position of the first element in the matrix filter is determined, and the numerical value corresponding to each mapping position in the matrix filter is determined as the mapping result corresponding to the first element. For example, taking a first element H in the first service data set as an example, it is assumed that the first element H performs data interaction with the second data party based on the reserved first encryption manner and the preset key exchange protocol, and the obtained corresponding data to be verified is a one-dimensional vector H, where H includes w subelements, i.e., H 1 ,h 1 ...h w The length of each element can be set toThen h is 1 ,h 1 ...h w Respectively inputting the mapping results into a matrix filter to obtain mapping results corresponding to the first element H, namely: d (D) 1[h[1]] ,D 2[h[2]] ...D w[h[w]]
S404: based on the mapping result corresponding to the first element, it is determined whether the first element belongs to an intersection of the first set of traffic data and the second set of traffic data.
The intersection can be used for user crowd portrayal analysis, for example, a user image data sample in a first service data set and a user text data sample in a second service data set, a multidimensional feature of a user can be obtained by acquiring the intersection of the first service data set and the second service data set, and based on the feature, it can be determined that a certain part of the users are suitable for advertisement pushing and the like.
In an alternative embodiment, if the mapping result corresponding to the first element meets a preset condition, determining that the first element belongs to an intersection of the first service data set, and if the mapping result corresponding to the first element does not meet the preset condition, determining that the first element does not belong to the intersection of the first service data set, wherein the preset condition is a value set by the second data party when generating the matrix filter. It should be noted that: the first service data set and the second service data set respectively comprise one or more of an audio data sample, a video data sample, an image data sample and a text data sample.
In a data processing method provided by an embodiment of the present disclosure, a first data party receives a matrix filter from a second data party; the matrix filter encrypts a second service data set for a second data party based on a reserved first encryption mode, and performs data interaction with the second data party for a first element in the first service data set based on the reserved first encryption mode and a preset key exchange protocol to obtain to-be-verified data corresponding to the first element; the method comprises the steps that a first element is any element in a first service data set, the element in the first service data set is a user data sample acquired in advance, data to be verified corresponding to the first element is mapped in a matrix filter to obtain a mapping result corresponding to the first element, and whether the first element belongs to an intersection of the first service data set and a second service data set is determined based on the mapping result corresponding to the first element; the intersection is used for user crowd portrait analysis, and because the key exchange protocol is used in the method, the privacy information of the first element of the first data party is effectively protected, in the data interaction process, only the first data party can obtain the result of the intersection, any information outside the intersection of the second data party can not be obtained, meanwhile, the data to be verified corresponding to the first element in the first business data set is verified by combining the matrix filter, and the accuracy in the process of determining the intersection of the sets is ensured.
In order to facilitate further understanding of a data processing method provided by an embodiment of the present disclosure, an embodiment of the present disclosure further provides a data processing method, and referring to fig. 5, another flowchart of the data processing method provided by the embodiment of the present disclosure is applied to a second data party, where the method includes:
s501: and encrypting the second element in the second service data set based on the reserved first encryption mode to obtain encrypted data corresponding to the second element.
In an optional implementation manner, encryption processing is performed on a second element in the second service data set based on the first curve mapping function, the first dimension-reduction mapping function and the second secret index to obtain encrypted data corresponding to the second element, wherein the second secret index is generated in advance by a second data party.
In another alternative embodiment, the second element in the second service data set is encrypted based on the first curve mapping function and the second secret index to obtain third encrypted data corresponding to the second element, and then the third encrypted data is mapped into a one-dimensional vector based on the first dimension-reduction mapping function, and the one-dimensional vector is determined to be the encrypted data corresponding to the second element.
In yet another optional implementation manner, mapping the second element in the second service data set to a curve corresponding to the first curve mapping function to obtain a two-dimensional coordinate corresponding to the second element; and determining a value obtained by multiplying the two-dimensional coordinates corresponding to the second element by the second secret index as third encrypted data corresponding to the second element, mapping the third encrypted data into a one-dimensional vector based on the first dimension reduction mapping function, and determining the one-dimensional vector as encrypted data corresponding to the second element.
S502: a matrix filter is generated based on the encrypted data corresponding to the second element.
Specifically, the encrypted data corresponding to the second element in the second service data set is respectively substituted into a pre-generated matrix, and certain elements of the matrix are set to be preset numerical values at corresponding positions to generate a matrix filter.
For example, the rows and columns of the matrix are determined according to the corresponding algorithm, a matrix of 100 rows and 128 columns is constructed according to the rows and columns of the matrix, each element in the matrix is 1 bit, and each element in the matrix is initialized to 1, for the second element E in the second service data set, the second element E contains information such as name, phone, identification number, address, etc., for the element E, the E is firstly encrypted by means of step S501 to obtain a one-dimensional vector E of E, wherein E contains 128 elements, namely E 1 ,e 1 ...e 128 Length 7 of each element, then according to e 1 ,e 1 ...e 128 Is 0 at the corresponding position of the matrix, e 1 If the value of (2) is 8, then the value of the first column of the matrix, row 8, is set to 0, and so on through all elements of e, to generate a matrix filter.
S503: the matrix filter is sent to the first data party.
Wherein the matrix filter is for determining an intersection of a first set of traffic data and a second set of traffic data for the first party.
It should be noted that: the first service data set and the second service data set respectively comprise one or more of an audio data sample, a video data sample, an image data sample and a text data sample.
In the data processing method provided by the embodiment of the disclosure, the second data party encrypts the second element in the second service data set based on the reserved first encryption mode to obtain the encrypted data corresponding to the second element, generates the matrix filter based on the encrypted data corresponding to the second element, and finally sends the matrix filter to the first data party, wherein the matrix filter is used for determining the intersection of the first service data set and the second service data set of the first data party, and the privacy information of the second element in the second service data set of the second data party can be effectively protected due to the fact that the data of the second data party is encrypted to generate the matrix filter, meanwhile, the parameter size of the matrix filter is reduced, the communication cost is reduced, and the communication efficiency is improved.
Corresponding to the above method embodiment, the present disclosure further provides a data processing apparatus, and referring to fig. 6, which is a schematic structural diagram of the data processing apparatus provided in the embodiment of the present disclosure, and specifically, the apparatus includes:
a receiving module 601, configured to receive a matrix filter from a second data party; the matrix filter is generated by encrypting the second service data set based on the reserved first encryption mode.
The interaction module 602 is configured to perform data interaction with respect to a first element and a second data party in a first service data set based on a reserved first encryption manner and a preset key exchange protocol, so as to obtain data to be verified corresponding to the first element; the first element is any element in the first service data set, and the element in the first service data set is a pre-collected user data sample.
The mapping module 603 is configured to map, in the matrix filter, data to be verified corresponding to the first element, to obtain a mapping result corresponding to the first element.
A determining module 604, configured to determine an intersection of the first service data set and the second service data set based on the matrix filter and the data to be verified corresponding to the first element in the first service data set.
In an alternative embodiment, the interaction module 602 includes:
the first encryption sub-module is used for encrypting the first element in the first service data set based on the first curve mapping function and the first secret index to obtain first encrypted data corresponding to the first element; wherein the first secret index is pre-generated;
the sending sub-module is used for sending the first encrypted data corresponding to the first element to the second data party; the second data side is used for encrypting the first encrypted data again based on the second secret index to generate second encrypted data corresponding to the first element; wherein the second secret exponent is pre-generated by the second party;
the decryption sub-module is used for receiving the second encrypted data corresponding to the first element, and decrypting the second encrypted data by utilizing the first secret index to obtain first decrypted data corresponding to the first element;
the first mapping sub-module is used for mapping the first decryption data corresponding to the first element into a one-dimensional vector based on the first dimension-reduction mapping function, and determining the one-dimensional vector as the data to be verified corresponding to the first element; the one-dimensional vector comprises a plurality of sub-elements obtained by dividing the first decryption data according to a preset bit length.
In an alternative embodiment, the mapping module 603 includes:
the first mapping submodule is used for mapping the data to be verified corresponding to the first element into the matrix filter and determining the mapping position of the first element in the matrix filter;
the first determining submodule is used for determining the numerical values corresponding to the mapping positions in the matrix filter as mapping results corresponding to the first elements;
correspondingly, the determining module is specifically configured to:
and if the mapping result corresponding to the first element is determined to meet the preset condition, determining that the first element belongs to an intersection of the first service data set and the second service data set.
In an alternative embodiment, the first service data set and the second service data set respectively include one or more of an audio data sample, a video data sample, an image data sample and a text data sample.
In addition, an embodiment of the present disclosure further provides a data processing apparatus, with reference to fig. 7, which is a schematic structural diagram of another data processing apparatus provided in an embodiment of the present disclosure, and specifically, the apparatus includes:
the encryption module 701 is configured to encrypt second elements in the second service data set based on the reserved first encryption manner, so as to obtain encrypted data corresponding to the second elements respectively.
A generating module 702, configured to generate a matrix filter based on the encrypted data corresponding to the second element.
A transmitting module 703, configured to transmit the matrix filter to a first data party; wherein the matrix filter is for determining an intersection of a first set of traffic data and a second set of traffic data for the first party.
In an alternative embodiment, the encryption module 701 includes:
the second encryption sub-module is used for respectively carrying out encryption processing on second elements in the second service data set based on the first curve mapping function, the first dimension-reduction mapping function and the second secret index to obtain encrypted data corresponding to the second elements; wherein the second secret exponent is pre-generated.
In an alternative embodiment, the second encryption sub-module includes:
the third encryption sub-module is used for encrypting the second element in the second service data set based on the first curve mapping function and the second secret index to obtain third encrypted data corresponding to the second element;
and the second determining submodule is used for mapping the third encrypted data into one-dimensional vectors based on the first dimension-reduction mapping function and determining the one-dimensional vectors into encrypted data corresponding to the second element.
In an alternative embodiment, the third encryption sub-module includes:
the second mapping sub-module is used for mapping the second element in the second service data set to the curve corresponding to the first curve mapping function to obtain the two-dimensional coordinate corresponding to the second element;
and the third determining submodule is used for determining a value obtained by multiplying the two-dimensional coordinate corresponding to the second element by the second secret exponent as third encrypted data corresponding to the second element.
In an alternative embodiment, the first service data set and the second service data set respectively include one or more of an audio data sample, a video data sample, an image data sample and a text data sample.
In the embodiment of the disclosure, the first data party determines the set intersection through the reserved first encryption mode and the preset key exchange protocol, so that the security of the data in the set intersection determination process is ensured, the communication overhead is not required to be increased to ensure the security of the data, and the communication overhead is reduced.
In addition to the above methods and apparatuses, the embodiments of the present disclosure further provide a data processing medium, where an instruction is stored in a computer readable storage medium, and when the instruction is executed on a terminal device, the instruction causes the terminal device to implement the data processing method according to the embodiments of the present disclosure.
The disclosed embodiments also provide a computer program product comprising computer programs/instructions which, when executed by a processor, implement the data processing method according to the disclosed embodiments.
In addition, an embodiment of the present disclosure further provides a data processing apparatus, as shown in fig. 8, which may include:
a processor 801, a memory 802, an input device 803, and an output device 804. The number of processors 801 in the data processing device may be one or more, one processor being exemplified in fig. 8. In some embodiments of the present disclosure, the processor 801, memory 802, input device 803, and output device 804 may be connected by a bus or other means, with bus connections being exemplified in fig. 8.
The memory 802 may be used to store software programs and modules, and the processor 801 executes various functional applications of the data processing apparatus and data processing by executing the software programs and modules stored in the memory 802. The memory 802 may mainly include a storage program area that may store an operating system, application programs required for at least one function, and the like, and a storage data area. In addition, memory 802 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. The input means 803 may be used to receive input digital or character information and to generate signal inputs related to user settings and function control of the data processing apparatus.
In particular, in this embodiment, the processor 801 loads executable files corresponding to the processes of one or more application programs into the memory 802 according to the following instructions, and the processor 801 executes the application programs stored in the memory 802, thereby implementing the various functions of the data processing apparatus described above.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is merely a specific embodiment of the disclosure to enable one skilled in the art to understand or practice the disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown and described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (13)

1. A method of data processing, the method comprising:
receiving a matrix filter from a second party; the matrix filter encrypts a second service data set based on a reserved first encryption mode for the second data party;
based on the reserved first encryption mode and a preset key exchange protocol, performing data interaction with the second data party aiming at a first element in a first service data set to obtain data to be verified corresponding to the first element; wherein, the first element is any element in the first service data set, and the element in the first service data set is a pre-collected user data sample;
Mapping the data to be verified corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element; comprising the following steps:
mapping the data to be verified corresponding to the first element into the matrix filter, and determining the mapping position of the first element in the matrix filter;
determining the numerical values corresponding to the mapping positions in the matrix filter as mapping results corresponding to the first elements;
determining whether the first element belongs to an intersection of the first service data set and the second service data set based on a mapping result corresponding to the first element; wherein the intersection is used for user crowd portrayal analysis; comprising the following steps:
if the mapping result corresponding to the first element is determined to meet the preset condition, determining that the first element belongs to an intersection of the first service data set and the second service data set; the preset condition is a numerical value set by the second data party when the matrix filter is generated.
2. The method according to claim 1, wherein the performing data interaction with the second data party for a first element in a first service data set based on the reserved first encryption manner and a preset key exchange protocol to obtain data to be verified corresponding to the first element includes:
Encrypting a first element in a first service data set based on a first curve mapping function and a first secret index to obtain first encrypted data corresponding to the first element; wherein the first secret exponent is pre-generated;
transmitting the first encrypted data corresponding to the first element to a second data party; the second data party is used for encrypting the first encrypted data again based on a second secret index to generate second encrypted data corresponding to the first element; wherein the second secret exponent is pre-generated by the second party;
receiving second encrypted data corresponding to the first element, and decrypting the second encrypted data by using the first secret index to obtain first decrypted data corresponding to the first element;
mapping the first decrypted data corresponding to the first element into a one-dimensional vector based on a first dimension-reduction mapping function, and determining the one-dimensional vector as data to be verified corresponding to the first element; the one-dimensional vector comprises a plurality of sub-elements obtained by dividing the first decryption data according to a preset bit length.
3. The method of claim 1, wherein the first set of business data and the second set of business data each comprise one or more of an audio data sample, a video data sample, an image data sample, and a text data sample.
4. A method of data processing, the method comprising:
encrypting a second element in a second service data set based on a reserved first encryption mode to obtain encrypted data corresponding to the second element;
generating a matrix filter based on the encrypted data corresponding to the second element; transmitting the matrix filter to a first data party; wherein the matrix filter is configured to determine an intersection of a first set of traffic data and a second set of traffic data for the first data party.
5. The method of claim 4, wherein encrypting the second element in the second service data set based on the first encryption manner of subscription to obtain the encrypted data corresponding to the second element comprises:
respectively encrypting second elements in a second service data set based on a first curve mapping function, a first dimension-reduction mapping function and a second secret index to obtain encrypted data corresponding to the second elements; wherein the second secret exponent is pre-generated.
6. The method of claim 5, wherein encrypting the second element in the second service data set based on the first curve mapping function, the first dimension-reduction mapping function, and the second secret exponent to obtain encrypted data corresponding to the second element, comprises:
Encrypting a second element in a second service data set based on a first curve mapping function and a second secret index to obtain third encrypted data corresponding to the second element;
and mapping the third encrypted data into a one-dimensional vector based on a first dimension-reduction mapping function, and determining the one-dimensional vector as the encrypted data corresponding to the second element.
7. The method of claim 6, wherein encrypting the second element in the second service data set based on the first curve mapping function and the second secret exponent to obtain the third encrypted data corresponding to the second element, comprises:
mapping a second element in a second service data set to a curve corresponding to the first curve mapping function to obtain a two-dimensional coordinate corresponding to the second element;
and determining a value obtained by multiplying the two-dimensional coordinates corresponding to the second element by the second secret index as third encrypted data corresponding to the second element.
8. The method of claim 4, wherein the first set of business data and the second set of business data each comprise one or more of an audio data sample, a video data sample, an image data sample, and a text data sample.
9. A data processing apparatus, the apparatus comprising:
a receiving module for receiving a matrix filter from a second party; the matrix filter is generated by encrypting the second service data set based on a reserved first encryption mode;
the interaction module is used for carrying out data interaction with the second data party aiming at a first element in a first service data set based on the first encryption mode and a preset key exchange protocol to obtain data to be verified corresponding to the first element; wherein, the first element is any element in the first service data set, and the element in the first service data set is a pre-collected user data sample;
the mapping module is used for mapping the data to be verified corresponding to the first element in the matrix filter to obtain a mapping result corresponding to the first element;
a determining module, configured to determine, based on a mapping result corresponding to the first element, whether the first element belongs to an intersection of the first service data set and the second service data set; wherein the intersection is used for user crowd portrayal analysis;
the mapping module comprises:
The first mapping submodule is used for mapping the data to be verified corresponding to the first element into the matrix filter and determining the mapping position of the first element in the matrix filter;
the first determining submodule is used for determining the numerical values corresponding to the mapping positions in the matrix filter as mapping results corresponding to the first elements;
correspondingly, the determining module is specifically configured to:
if the mapping result corresponding to the first element is determined to meet the preset condition, determining that the first element belongs to an intersection of the first service data set and the second service data set; the preset condition is a numerical value set by the second data party when the matrix filter is generated.
10. A data processing apparatus, the apparatus being applied to a second party, the apparatus comprising:
the encryption module is used for encrypting the second element in the second service data set based on the reserved first encryption mode to obtain encrypted data corresponding to the second element;
the generation module is used for generating a matrix filter based on the encrypted data corresponding to the second element;
a transmitting module, configured to transmit the matrix filter to a first data party; wherein the matrix filter is configured to determine an intersection of the first set of traffic data and the second set of traffic data for the first party of data.
11. A data processing system, the system comprising a first data party and a second data party;
the second data party is configured to encrypt a second element in a second service data set based on a reserved first encryption manner, obtain encrypted data corresponding to the second element, generate a matrix filter based on the encrypted data corresponding to the second element, and send the matrix filter to the first data party;
the first data side is configured to perform data interaction with the second data side for a first element in a first service data set based on the first encryption manner and a preset key exchange protocol, obtain data to be verified corresponding to the first element in the first service data set, map the data to be verified corresponding to the first element into the matrix filter, determine a mapping position of the first element in the matrix filter, determine values corresponding to the mapping positions in the matrix filter as mapping results corresponding to the first element, and determine that the first element belongs to an intersection of the first service data set and the second service data set if it is determined that the mapping results corresponding to the first element meet preset conditions; the preset condition is a numerical value set by the second data party when the matrix filter is generated, and the intersection is used for user crowd portrait analysis.
12. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein instructions, which when run on a terminal device, cause the terminal device to implement the method according to any of claims 1-8.
13. A data processing apparatus, comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1-8 when the computer program is executed.
CN202210337935.3A 2022-03-31 2022-03-31 Data processing method, device, system, equipment and storage medium Active CN114629717B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210337935.3A CN114629717B (en) 2022-03-31 2022-03-31 Data processing method, device, system, equipment and storage medium
PCT/CN2023/079076 WO2023185360A1 (en) 2022-03-31 2023-03-01 Data processing method, apparatus, system and device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210337935.3A CN114629717B (en) 2022-03-31 2022-03-31 Data processing method, device, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114629717A CN114629717A (en) 2022-06-14
CN114629717B true CN114629717B (en) 2023-12-05

Family

ID=81906184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210337935.3A Active CN114629717B (en) 2022-03-31 2022-03-31 Data processing method, device, system, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN114629717B (en)
WO (1) WO2023185360A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114629717B (en) * 2022-03-31 2023-12-05 抖音视界有限公司 Data processing method, device, system, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10635824B1 (en) * 2015-03-20 2020-04-28 EMC IP Holding Company LLC Methods and apparatus for private set membership using aggregation for reduced communications
CN111931207A (en) * 2020-08-07 2020-11-13 北京百度网讯科技有限公司 Method, device and equipment for obtaining privacy set intersection and storage medium
CN113343305A (en) * 2021-06-29 2021-09-03 招商局金融科技有限公司 Intersection calculation method, device and equipment of private data and storage medium
CN114239018A (en) * 2021-12-16 2022-03-25 支付宝(杭州)信息技术有限公司 Method and system for determining number of shared data for protecting privacy data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016122513A1 (en) * 2015-01-29 2016-08-04 Hewlett Packard Enterprise Development Lp Data analytics on encrypted data elements
US10904225B2 (en) * 2018-05-07 2021-01-26 Microsoft Technology Licensing, Llc Computing a private set intersection
CN110324321B (en) * 2019-06-18 2021-07-13 创新先进技术有限公司 Data processing method and device
CN114629717B (en) * 2022-03-31 2023-12-05 抖音视界有限公司 Data processing method, device, system, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10635824B1 (en) * 2015-03-20 2020-04-28 EMC IP Holding Company LLC Methods and apparatus for private set membership using aggregation for reduced communications
CN111931207A (en) * 2020-08-07 2020-11-13 北京百度网讯科技有限公司 Method, device and equipment for obtaining privacy set intersection and storage medium
CN113343305A (en) * 2021-06-29 2021-09-03 招商局金融科技有限公司 Intersection calculation method, device and equipment of private data and storage medium
CN114239018A (en) * 2021-12-16 2022-03-25 支付宝(杭州)信息技术有限公司 Method and system for determining number of shared data for protecting privacy data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向隐私保护的集合交集计算综述;魏立斐 等;计算机研究与发展;1782-1799 *

Also Published As

Publication number Publication date
CN114629717A (en) 2022-06-14
WO2023185360A1 (en) 2023-10-05

Similar Documents

Publication Publication Date Title
CN107196926B (en) Cloud outsourcing privacy set comparison method and device
CN110008717B (en) Decision tree classification service system and method supporting privacy protection
US10903976B2 (en) End-to-end secure operations using a query matrix
CN107145791B (en) K-means clustering method and system with privacy protection function
CN1773905B (en) Method, equipment and system for generating anonymous common key in safety communication system
CN111510281B (en) Homomorphic encryption method and device
Liu et al. An efficient privacy-preserving outsourced computation over public data
Deng et al. A flexible privacy-preserving data sharing scheme in cloud-assisted IoT
CN112003696B (en) SM9 key generation method, system, electronic equipment, device and storage medium
CN113518092A (en) Set intersection method for realizing multi-party privacy
Elhadad Data sharing using proxy re-encryption based on DNA computing
CN111555880A (en) Data collision method and device, storage medium and electronic equipment
CN114629717B (en) Data processing method, device, system, equipment and storage medium
Deng et al. Policy-based broadcast access authorization for flexible data sharing in clouds
Karati et al. Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment
CN112380404B (en) Data filtering method, device and system
CN113901512A (en) Data sharing method and system
CN112231309A (en) Method, device, terminal equipment and medium for removing duplicate of longitudinal federal data statistics
CN114374518B (en) PSI (program specific information) intersection information acquisition method and device with intersection counting function and storage medium
US10356056B2 (en) Method and system for privacy-preserving order statistics in a star network
CN115599959A (en) Data sharing method, device, equipment and storage medium
CN107872312B (en) Method, device, equipment and system for dynamically generating symmetric key
Song et al. Traceable and privacy-preserving non-interactive data sharing in mobile crowdsensing
Swetha et al. Security on mobile cloud computing using cipher text policy and attribute based encryption scheme
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant before: Tiktok vision (Beijing) Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant after: Tiktok vision (Beijing) Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant