CN110474764A - Ciphertext data set intersection calculation method, device, system, client, server and medium - Google Patents
Ciphertext data set intersection calculation method, device, system, client, server and medium Download PDFInfo
- Publication number
- CN110474764A CN110474764A CN201910644183.3A CN201910644183A CN110474764A CN 110474764 A CN110474764 A CN 110474764A CN 201910644183 A CN201910644183 A CN 201910644183A CN 110474764 A CN110474764 A CN 110474764A
- Authority
- CN
- China
- Prior art keywords
- data set
- ciphertext data
- user
- intersection
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of ciphertext data set intersection calculation method, device, system, client, server and media, the described method includes: according to the public key of user, clear data collection is encrypted, obtains ciphertext data set, and ciphertext data set is sent to server;According to the authority levels that user selects, the authorization message of the authority levels is generated;Authorization message is sent to server, so that server is according to ciphertext data set and authorization message, median collection is calculated, according to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection calculating, the intersection of ciphertext data set is generated, and ciphertext data set intersection is sent to the client of relative users;Receive the ciphertext data set intersection that server is sent;According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, clear data collection intersection is obtained.The present invention significantly improves flexibility under the premise of ensuring safety.
Description
Technical field
The present invention relates to a kind of ciphertext data set intersection calculation method, device, system, client, server and media, belong to
In data security arts.
Background technique
Cloud storage is a critical services in cloud computing, not only facilitates data backup, data sharing, prevents data from losing
It loses, the carrying cost of data can also be effectively reduced.With cloud storage technology development and in recent years data leak accident frequency
Hair, user focus more on the safety of data in cloud storage.
The data that enterprise and user upload on cloud may be confidential data, such as personal file and medical records.It will count
It can effectively improve the safety of data according to upload after encryption, but also therefore destroy the original structure and features of data.Therefore,
Ciphertext data calculate and are difficult.Since data mining, duplicate file are examined, set intersection meter involved in genetic test
It calculates, for obtaining data characteristics or label to classify, therefore, it is necessary to realize to carry out set intersection calculating to encryption data.
It is that two sides calculate agreement and multi-party calculating agreement respectively currently, there is two major classes encrypted data set intersection calculation method.
The former, such as patent document (publication number: CN109657489A, publication date on April 19th, 2019), it is desirable that user directly participates in counting
It calculates, it is desirable that user has enough computing capabilitys, and is inconvenient to be converted into the version on cloud.The latter, such as patent document are (open
Number: CN105812141A, publication date: on July 27th, 2016), it will be uploaded in Cloud Server after data encryption for multiple users,
And authorization is provided, set intersection calculating is carried out by Cloud Server, and encrypted calculated result is returned into user, user is at this
Ground is decrypted.But the authorization that user provides in such method can make Cloud Server freely to all numbers of the user
According to set intersection calculating is carried out, fine-grained authorization cannot achieve, i.e., Cloud Server can not be allowed only to operate to partial data,
Also the user for carrying out set intersection calculating can not be specified.For example, the upload encryption per family of the first user, second user and third
On gene data to Cloud Server, the first user wishes that (technology needs to use set intersection with second user progress paternity test
Collection calculates), it is therefore desirable to submission licenses to Cloud Server, but can not forbid Cloud Server by the data of oneself with third user's
Data carry out set intersection operation.
Summary of the invention
In view of this, the present invention provides a kind of ciphertext data set intersection calculation method, device, computer equipment and storages
Medium, can choose user allows server to operate and specify progress ciphertext data set friendship to specified ciphertext data set
The user that collection calculates significantly improves flexibility under the premise of ensuring safety.
The first purpose of this invention is to provide a kind of ciphertext data set intersection calculation method, applied to client.
Second object of the present invention is to provide a kind of ciphertext data set intersection calculation method, applied to server.
Third object of the present invention is to provide a kind of ciphertext data set intersection computing device, applied to client.
Fourth object of the present invention is to provide a kind of ciphertext data set intersection computing device, applied to server.
Of the invention the 5th is designed to provide a kind of ciphertext data set intersection computing system.
Of the invention the 6th is designed to provide a kind of client.
Of the invention the 7th is designed to provide a kind of server.
Of the invention the 8th is designed to provide a kind of storage medium.
The first purpose of this invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection calculation method is applied to client, which comprises
Generate the public key and private key of user;
According to clear data collection and public key that user inputs, clear data collection is encrypted, ciphertext data set is obtained, and
Ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
According to the authority levels that user selects, the authorization message of the authority levels is generated;
Authorization message is sent to server, so that server obtains ciphertext data set from ciphertext database, according to ciphertext
Median collection is calculated in data set and authorization message, according to the median collection for two users for meeting authority levels, by this two
The ciphertext data set of a user carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to phase
Using the client at family;
Receive the ciphertext data set intersection that server is sent;
According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, is obtained in plain text
Data set intersection.
Further, the authority levels selected according to user, generate the authorization message of the rank, specifically include:
When user selects the first authority levels, the private key of the user is obtained, calculates the authorization message of the first authority levels,
Such as following formula:
Wherein, yiFor an element in the private key of user i, w is system parameter;
When user selects the second authority levels, the private key of the user and the public key of designated user are obtained, second is calculated and awards
The other authorization message of power level, such as following formula:
Wherein, yiAnd ziFor two elements in the private key of user i,WithFor two in the public key of designated user j
Element;
When user selects third authority levels, the private key of the user and each ciphertext number of specified ciphertext data set are obtained
According to, the authorization message of calculating third authority levels, such as following formula:
Wherein, yiFor an element in the private key of user i, CI, 2To specify each ciphertext data in ciphertext data set
One element;
When user selects four authority levels, the private key of the user, the public key of designated user and specified ciphertext number are obtained
According to each ciphertext data of collection, the authorization message of the 4th authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i,For an element in the public key of designated user j, CI, 2
For an element for specifying each ciphertext data in ciphertext data set, w is system parameter;
First authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and all users
Carry out intersection calculating;Second authority levels, which refer to, allows server by the ciphertext number of all ciphertext data sets and designated user
Intersection calculating is carried out according to collection;The third authority levels, which refer to, allows server by the close of specified ciphertext data set and all users
Literary data set carries out intersection calculating;4th authority levels, which refer to, allows server by the close of specified ciphertext data set and designated user
Literary data set carries out intersection calculating.
Second object of the present invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection calculation method is applied to server, which comprises
The ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database;
Receive the authorization message that client is sent;Wherein, the authorization message is the authority levels institute that is selected according to user
The authorization message of the authority levels generated;
Ciphertext data set is obtained from ciphertext database, and median collection is calculated according to ciphertext data set and authorization message;
According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection
It calculates, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
Further, described according to ciphertext data set and authorization message, median collection is calculated, specifically includes:
When user selects the first authority levels, according to the authorization message of ciphertext data set and the first authority levels, calculate
Obtain median collection;Wherein, median concentrates the calculating such as following formula of each median:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the ciphertext data set of user i, Td1, iFor user i
The first authority levels authorization message, TiThe each median concentrated for the median of user i;
When user selects the second authority levels, according to the authorization message of ciphertext data set and the second authority levels, calculate
Obtain median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, CI, 2、CI, 3And CI, 4For three elements of each ciphertext data in the ciphertext data set of user i, Td2, i, jA、
Td2, i, jB is two elements of the authorization message of the second authority levels of user i, and Ti is in each of median concentration of user i
Between be worth;
When user selects third authority levels, according to the authorization message of ciphertext data set and third authority levels, calculate
Obtain median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the specified ciphertext data set of user i,For
The authorization message of the third authority levels of user i, DiFor each clear data that the clear data of user i is concentrated, TiFor user i
Median concentrate each median;
When user selects four authority levels, according to the authorization message of ciphertext data set and the 4th authority levels, calculate
Obtain median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, CI, 3And CI, 4For three elements of each ciphertext data in the specified ciphertext data set of user i,For
The authorization message of the 4th authority levels of user i,For an element in the public key of designated user j, TiFor the centre of user i
It is worth each median concentrated;
First authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and all users
Carry out intersection calculating;Second authority levels, which refer to, allows server by the ciphertext number of all ciphertext data sets and designated user
Intersection calculating is carried out according to collection;The third authority levels, which refer to, allows server by the close of specified ciphertext data set and all users
Literary data set carries out intersection calculating;4th authority levels, which refer to, allows server by the close of specified ciphertext data set and designated user
Literary data set carries out intersection calculating.
Third object of the present invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection computing device, is applied to client, and described device includes:
First generation module, for generating the public key and private key of user;
Encrypting module, clear data collection and public key for being inputted according to user, encrypts clear data collection, obtains
Ciphertext data set, and ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server
In;
Second generation module, the authority levels for being selected according to user, generates the authorization message of the authority levels;
Sending module, for authorization message to be sent to server, so that server obtains ciphertext number from ciphertext database
Median collection is calculated according to ciphertext data set and authorization message according to collection, according in two users for meeting authority levels
Between be worth collection, the ciphertext data set of the two users is subjected to intersection calculating, generates the intersection of ciphertext data set, and by ciphertext data set
Intersection is sent to the client of relative users;
Receiving module, for receiving the ciphertext data set intersection of server end transmission;
Deciphering module, the intersection of ciphertext data set and private key for being inputted according to user carry out ciphertext data set intersection
Decryption, obtains clear data collection intersection.
Fourth object of the present invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection computing device, is applied to server, and described device includes:
Ciphertext data set for receiving the ciphertext data set of client transmission, and is stored in ciphertext by the first receiving module
In database;
Second receiving module, for receiving the authorization message of client transmission;Wherein, the authorization message is according to user
The authorization message of the authority levels of the selection authority levels generated;
First computing module, for obtaining ciphertext data set from ciphertext database, according to ciphertext data set and authorization message,
Median collection is calculated;
Second computing module, for the median collection according to two users for meeting authority levels, by the two users'
Ciphertext data set carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to relative users
Client.
5th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection computing system, including multiple client and a server, the multiple client
It is connected respectively with server;
The client, for executing the above-mentioned ciphertext data set intersection calculation method applied to client;
The server, for executing the above-mentioned ciphertext data set intersection calculation method applied to server.
6th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of client, including processor and for the memory of storage processor executable program, the processor
When executing the program of memory storage, the above-mentioned ciphertext data set intersection calculation method applied to client is realized.
7th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of server, including processor and for the memory of storage processor executable program, the processor
When executing the program of memory storage, the above-mentioned ciphertext data set intersection calculation method applied to server is realized.
8th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of storage medium is stored with program, when described program is executed by processor, realizes that above-mentioned ciphertext data set is handed over
Collect calculation method.
The present invention have compared with the existing technology it is following the utility model has the advantages that
1, the ciphertext data set of user is stored in server by special clear data collection cipher mode by the present invention
In ciphertext database, if server does not obtain the authorization of user, it can not be decrypted and be calculated with data set intersection, if server
The authorization for obtaining user, then the data set intersection that can carry out appropriate level calculate;This method is ensuring data safety storage
Under the premise of, fine-grained authorization can be carried out, that is, Cloud Server is allowed only to operate to specified ciphertext data set, or specified progress
The user that ciphertext data set intersection calculates.
2, the ciphertext data outsourcing form that the present invention takes, on the one hand can be convenient data backup, data sharing, prevents from counting
It according to loss, on the other hand saves and cost is locally stored, carry out the intersection of ciphertext data set on the server and calculate, solve native client
The problem for holding computing capability deficiency, can be calculated under the premise of ensuring data safety, and be decrypted in local client
It carries out, effectively prevent data leak.
3, the present invention is based on prejudgementing character bilinear Diffie-Hellman and computational bilinear Diffie-Hellman are false
If example, effectively ensure Information Security.
4, the present invention can be connected with most of ciphertext databases, and can choose user allows server close to specifying
Literary data set carries out the user operated and specified progress ciphertext data set intersection calculates, significantly improves flexibility.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
The structure shown according to these attached drawings obtains other attached drawings.
Fig. 1 is the flow chart of the ciphertext data set intersection calculation method of the embodiment of the present invention 1.
Fig. 2 is the public key of the user of the embodiment of the present invention 1 and the flow chart that private key calculates.
Fig. 3 is the flow chart that the data set of the embodiment of the present invention 1 encrypts.
Fig. 4 is the schematic diagram of the first authority levels of the embodiment of the present invention 1.
Fig. 5 is the schematic diagram of the second authority levels of the embodiment of the present invention 1.
Fig. 6 is the schematic diagram of the third authority levels of the embodiment of the present invention 1.
Fig. 7 is the schematic diagram of the 4th authority levels of the embodiment of the present invention 1.
Fig. 8 is the flow chart that the authorization message of the embodiment of the present invention 1 generates.
Fig. 9 is the flow chart of the ciphertext data set intersection calculation method of the embodiment of the present invention 2.
Figure 10 is the flow chart that the median collection of the embodiment of the present invention 2 calculates.
Figure 11 is the flow chart that the intersection of the embodiment of the present invention 2 calculates.
Figure 12 is the structural block diagram of the ciphertext data set intersection computing system of the embodiment of the present invention 3.
Figure 13 is the flow chart that the ciphertext data set of the embodiment of the present invention 3 is decrypted.
Figure 14 is the structural block diagram of the client of the embodiment of the present invention 3.
Figure 15 is the structural block diagram of the server of the embodiment of the present invention 3.
Figure 16 is the structural block diagram of the ciphertext data set intersection computing device of the embodiment of the present invention 4.
Figure 17 is the structural block diagram of the ciphertext data set intersection computing device of the embodiment of the present invention 5.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiments of the present invention, instead of all the embodiments, based on the embodiments of the present invention, ordinary skill people
Member's every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment 1:
As shown in Figure 1, present embodiments providing a kind of ciphertext data set intersection calculation method, this method is applied to client
End, comprising the following steps:
S101, the public key and private key for generating user.
Each user uses a client, for some user i, what the public key and private key of the user i was all used by it
Client generates, as shown in Fig. 2, specifically including:
After S1011, user i start client and select registration, client generates random number
S1012, client calculate the public key of user iWith private key (xi, yi, zi)。
S102, the clear data collection and public key inputted according to user, encrypt clear data collection, obtain ciphertext data
Collection, and ciphertext data set is sent to server.
As shown in figure 3, step S102 specifically includes the following steps:
S1021, user i input clear data collection D=(D1..., Dn) and public keyTo client, visitor
The public key of family end acquisition user iWith clear data collection D=(D1..., Dn)。
S1022, to each data D in clear data collection Di(1≤i≤n), client generate random number
The corresponding ciphertext C of each clear data in S1023, calculating client clear data collection Di, Ci=(CI, 1, CI, 2,
CI, 3, CI, 4, CI, 5)。
Whole clear data encryptions finish to obtain ciphertext data set C=(C1..., Cn), each of ciphertext data set C is close
Literary data are Ci(1≤i≤n)。
Ciphertext data set is sent to server by S1024, client, and server is in the ciphertext number for receiving client transmission
After collection, ciphertext data set is stored in ciphertext database.
S103, the authority levels selected according to user, generate the authorization message of the authority levels.
After user issues ciphertext data set intersection computation requests by user end to server, it can choose four authorizations
Rank is as follows:
1) the first authority levels: server is allowed to hand over all ciphertext data sets and the ciphertext data set of all users
Collection calculates, as shown in figure 4, by taking three users as an example, three users are respectively the first user, second user and third user, the
The ciphertext data set of one user both can carry out intersection calculating with the ciphertext data set of second user, can also be with third user's
Ciphertext data set carries out intersection calculating.
2) the second authority levels: server is allowed to hand over the ciphertext data set of all ciphertext data sets and designated user
Collection calculates, as shown in figure 5, by taking three users as an example, three users are respectively the first user, second user and third user,
Middle second user is designated user, and the ciphertext data set of the first user may only carry out intersection with the ciphertext data set of second user
It calculates, it is not possible to carry out intersection calculating with the ciphertext data set of third user.
3) third authority levels: server is allowed to hand over specified ciphertext data set and the ciphertext data set of all users
Collection calculates, as shown in fig. 6, by taking three users as an example, three users are respectively the first user, second user and third user,
In the partial document (such as file 1, file 2) of the first user be specified file, specify ciphertext data set both can be with accordingly
Intersection calculating is carried out with the ciphertext data set of second user, intersection calculating can also be carried out with the ciphertext data set of third user,
First user remaining paper (the corresponding ciphertext data set of such as file n) both cannot with the ciphertext data set of second user into
Row intersection calculates, and also cannot carry out intersection calculating with the ciphertext data set of third user.
4) the 4th authority levels: server is allowed to hand over the ciphertext data set of specified ciphertext data set and designated user
Collection calculates, as shown in fig. 7, by taking three users as an example, three users are respectively the first user, second user and third user,
In the first user partial document (such as file 1, file 2) be specified file, second user is designated user, the first user's
Specified file specifies ciphertext data set that may only carry out intersection calculating with the ciphertext data set of second user accordingly, it is not possible to
The ciphertext data set of third user carries out intersection calculating, remaining paper (the corresponding ciphertext data of such as file n) of the first user
Collection both cannot carry out intersection calculating with the ciphertext data set of second user, also cannot with the ciphertext data set of third user into
Row intersection calculates.
As shown in figure 8, step S103 specifically includes the following steps:
If S1031, user i select the first authority levels, client obtains the private key of user i, calculates the first authority levels
Authorization message, such as following formula:
Wherein, yiFor an element in the private key of user i, w is system parameter.
If S1032, user i select the second authority levels, client obtains the private key of user i and the public key of designated user j,
Calculate the authorization message of the second authority levels, such as following formula:
Wherein, yiAnd ziFor two elements in the private key of user i,WithFor two in the public key of designated user j
Element.
If S1033, user i select third authority levels, client obtains the private key and specified ciphertext data set of user i
Each ciphertext data Ci, the authorization message of third authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i, CI, 2To specify each ciphertext data in ciphertext data set
One element.
If S1034, user i select the 4th authority levels, client obtain the private key of user i, designated user j public key and
Each ciphertext data C of specified ciphertext data seti, the authorization message of the 4th authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i,For an element in the public key of designated user j, CI, 2
For an element for specifying each ciphertext data in ciphertext data set, w is system parameter.
S104, authorization message is sent to server.
The authorization message of the selected authority levels of user is sent to server by client, and server is receiving authorization
After information, ciphertext data set is obtained from ciphertext database, median collection is calculated according to ciphertext data set and authorization message,
According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection calculating, it is raw
At ciphertext data set intersection, and ciphertext data set intersection is sent to the client of relative users.
S105, the ciphertext data set intersection that server is sent is received.
S106, the ciphertext data set intersection according to user's input and private key, are decrypted ciphertext data set intersection, obtain
Clear data collection intersection.
As shown in figure 9, step S106 is specifically included:
S1061, user i input the intersection of ciphertext data and private key (xi, yi, zi) client is arrived, client obtains user i's
Private key, and from the ciphertext database of server 1302 obtain user i ciphertext data set;
S1062, client calculate each in the intersection of ciphertext data according to the user i ciphertext data intersection inputted and private key
Ciphertext data Ci(1≤i≤n) corresponding clear data Di, such as following formula:
After whole ciphertext data decipherings, clear data intersection D=(D is obtained1..., Dn), to be shown to user i.
Embodiment 2:
As shown in Figure 10, a kind of ciphertext data set intersection calculation method is present embodiments provided, this method is applied to service
Device, comprising the following steps:
S1001, the ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database.
The clear data collection and public key that client is inputted according to user, encrypt clear data collection, obtain ciphertext number
It is sent to server according to collection, and by ciphertext data set, server is after the ciphertext data set for receiving client transmission, by ciphertext
Data set is stored in ciphertext database.
S1002, the authorization message that client is sent is received.
It, as described in Example 1, can after user issues ciphertext data set intersection computation requests by user end to server
To select four authority levels (the first authority levels, the second authority levels, third authority levels and the 4th authority levels), according to
The authority levels of user's selection, generate the authorization message of the authority levels, and authorization message is sent to server, by server
It receives.
S1003, ciphertext data set is obtained from ciphertext database, according to ciphertext data set and authorization message, be calculated
Between be worth collection.
As shown in figure 11, step S1003 specifically includes the following steps:
If S10031, user select the first authority levels, i.e. authorization message of the authorization message for the first authority levels, service
Median collection is calculated according to the authorization message of ciphertext data set and the first authority levels in device.
For some user i, value calculates such as following formula among it:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the ciphertext data set of user i, Td1, iFor user i
The first authority levels authorization message, TiThe each median concentrated for the median of user i;
After all ciphertext data for the ciphertext data set for having handled user i, the median collection of user i is obtained.
If S10032, user select the second authority levels, i.e. authorization message of the authorization message for the second authority levels, service
Median collection is calculated according to the authorization message of ciphertext data set and the second authority levels in device.
For some user i, value calculates such as following formula among it:
In formula, CI, 2CI, 3And CI, 4For three elements of each ciphertext data in the ciphertext data set of user i, Td2, i, jA、
Td2, i, jB is two elements of the authorization message of the second authority levels of user i, TiIn each of median concentration for user i
Between be worth;
After all ciphertext data for the ciphertext data set for having handled user i, the median collection of user i is obtained.
If S10033, user select third authority levels, i.e. authorization message of the authorization message for third authority levels, service
Median collection is calculated according to the authorization message of ciphertext data set and third authority levels in device.
For some user i, value calculates such as following formula among it:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the specified ciphertext data set of user i,For
The authorization message of the third authority levels of user i, DiFor each clear data that the clear data of user i is concentrated, TiFor user i
Median concentrate each median;
After all ciphertext data for the specified ciphertext data set for having handled user i, the median collection of user i is obtained.
If the authorization message that S10034, user's the 4th authority levels of selection, i.e. authorization message are the 4th authority levels, according to
Median collection is calculated in the authorization message of ciphertext data set and the 4th authority levels.
For some user i, value calculates such as following formula among it:
In formula, CI, 3And CI, 4For three elements of each ciphertext data in the specified ciphertext data set of user i,For
The authorization message of the 4th authority levels of user i,For an element in the public key of designated user j, TiFor the centre of user i
It is worth each median concentrated;
After all ciphertext data for the specified ciphertext data set for having handled user i, the median collection of user i is obtained.
S1004, according to meet authority levels two users median collection, by the ciphertext data set of the two users into
Row intersection calculates, and generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
As shown in figure 12, step S1004 specifically includes the following steps:
S10041, traversal meet the median collection of two users of authority levels, will be close corresponding to equal median
Text is stored respectively in respective calculated result list, generates the intersection of ciphertext data set.
Assuming that two users for meeting authority levels are respectively user i and user j, it is every in the ciphertext data set of user j
A ciphertext data are Cj, calculate and may refer to the step S102 of above-described embodiment 1, during each of the median of user j is concentrated
Between value be Tj, calculating may refer to above-mentioned steps S903, and this is no longer going to repeat them.
Server maintains two calculated result list L being initially empty1With L2, to each of the ciphertext data set of user i
Ciphertext data CiWith each ciphertext data C in the ciphertext data set of user ji, by the centre of the median collection of user i and user j
The median that value is concentrated compares one by one, if Ti=Tj, then by CiIt is stored in L1, by CjIt is stored in L2, by L1And L2As ciphertext data set
Intersection.
S10042, the client that ciphertext data set intersection is sent to relative users.
After all comparing, by L1It is sent to the client of user i, by L2It is sent to the client of user j, user i's
The ciphertext data set intersection of user i is decrypted in client, the client of user j to the ciphertext data set intersection of user j into
Row decryption.
It will be understood by those skilled in the art that realizing that all or part of the steps in the method for above-described embodiment 1~2 can be with
Relevant hardware is instructed to complete by program, corresponding program can store in computer readable storage medium.
It should be noted that although describing the method operation of above-described embodiment 1~2 in the accompanying drawings with particular order, this
These operations must be executed in this particular order by not requiring that or implying, or is had to carry out and operated just shown in whole
It is able to achieve desired result.On the contrary, the step of describing can change and execute sequence.Additionally or alternatively, it is convenient to omit certain
Multiple steps are merged into a step and executed, and/or a step is decomposed into execution of multiple steps by step.
Embodiment 3:
As shown in figure 13, a kind of ciphertext data set intersection computing system is present embodiments provided, which includes n client
End 1301 and a server 1302, the n function having the same of client 1301, but used by different users, i.e., shared n
A user, and each user uses a client 1301, n client 1301 can not communicate between each other, and respectively with clothes
Business device 1302 is connected and communicates.
The client 1301, for generating the public key and private key of user;According to the clear data collection and public affairs of user's input
Key encrypts clear data collection, obtains ciphertext data set, and ciphertext data set is sent to server 1302;According to
The authority levels of family selection, generate the authorization message of the authority levels;Authorization message is sent to server 1302;Receive service
The ciphertext data set intersection that device 1302 is sent;According to the ciphertext data set intersection of user's input and private key, ciphertext data set is handed over
Collection is decrypted, and obtains clear data collection intersection.
User can also obtain the ciphertext number of the user by client 1301 from the ciphertext database of server 1302
According to collection, then user inputs ciphertext data set and private key, the ciphertext data set and private key that client is inputted according to user, to ciphertext
Data set is decrypted, and obtains clear data collection, to be shown to user.
The server 1302 receives the ciphertext data set that client 1301 is sent, and ciphertext data set is stored in close
In literary database;The authorization message that client 1301 is sent is received, which is the authority levels institute that selects according to user
The authorization message of the authority levels generated;Ciphertext data set is obtained from ciphertext database, is believed according to ciphertext data set and authorization
Breath, is calculated median collection;According to the median collection for two users for meeting authority levels, by the ciphertext number of the two users
Intersection calculating is carried out according to collection, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users
1301。
As shown in figure 14, the client 1301 can be computer, mobile phone, tablet computer etc., first processor
13011, the components such as first memory 13012, input unit 13013, display unit 13014, transmission module 13015, first deposits
Reservoir 13012, input unit 13013, display unit 13014 and transmission module 13015 respectively with 13011 phase of first processor
Even, first memory 13012 can be used for storing computer program, and first processor 13011 is stored in the first storage by operation
When computer program in device 13012, to realize the function of above-mentioned client 1301.
As shown in figure 15, the server 1302 include the first processor 13022 connected by system bus 13021,
First memory and network interface 13023;Wherein, first processor 13022 is for providing calculating and control ability, the first storage
Device includes non-volatile memory medium 13024 and built-in storage 13025, which is stored with operation
System, computer program and database, the built-in storage 13025 are operating system and computer in non-volatile memory medium
The operation of program provides environment and realizes the function of above-mentioned server 1302 when computer program is executed by first processor 13022
Energy.
Embodiment 4:
As shown in figure 16, a kind of ciphertext data set intersection computing device is present embodiments provided, which is applied to client
End, including the first generation module 1601, encrypting module 1602, the second generation module 1603, sending module 1604, receiving module
1605 and deciphering module 1606, the concrete function of modules it is as follows:
First generation module 1601, for generating the public key and private key of user.
The encrypting module 1602, clear data collection and public key for being inputted according to user carry out clear data collection
Encryption, obtain ciphertext data set, and ciphertext data set is sent to server so that server ciphertext data set is stored in it is close
In literary database.
Second generation module 1603, the authority levels for being selected according to user, generates the authorization of the authority levels
Information.
The sending module 1604, for authorization message to be sent to server, so that server is obtained from ciphertext database
Ciphertext data set is taken, according to ciphertext data set and authorization message, median collection is calculated, according to meeting two of authority levels
The ciphertext data set of the two users is carried out intersection calculating, generates the intersection of ciphertext data set, and will be close by the median collection of user
Literary data set intersection is sent to user.
The receiving module 1605, for receiving the ciphertext data set intersection of server end transmission;
The deciphering module 1606, the intersection of ciphertext data set and public key for being inputted according to user, to ciphertext data set
Intersection is decrypted, and obtains clear data collection intersection.
The specific implementation of modules may refer to above-described embodiment 1 in the present embodiment, and this is no longer going to repeat them.
Embodiment 5:
As shown in figure 17, a kind of ciphertext data set intersection computing device is present embodiments provided, which is applied to service
Device, including the first receiving module 1701, the first receiving module 1702, the first computing module 1703 and the second computing module 1704,
The concrete function of modules is as follows:
First receiving module 1701 for receiving the ciphertext data set of client transmission, and ciphertext data set is deposited
Storage is in ciphertext database.
Second receiving module 1702, for receiving the authorization message of client transmission;Wherein, the authorization message is
According to the authorization message of the authority levels authority levels generated of user's selection.
First computing module 1703, for obtaining ciphertext data set from ciphertext database, according to ciphertext data set and
Median collection is calculated in authorization message.
Second computing module 1704, for according to meet authority levels two users median collection, by this two
The ciphertext data set of a user carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to phase
Using the client at family.
The specific implementation of modules may refer to above-described embodiment 2 in the present embodiment, and this is no longer going to repeat them.
It should be noted that the device that above-described embodiment 4~5 provides only is illustrated with the division of above-mentioned each functional module
Illustrate, in practical applications, can according to need and be completed by different functional modules above-mentioned function distribution, i.e., by internal junction
Structure is divided into different functional modules, to complete all or part of the functions described above.
It is appreciated that term " first ", " second " used in the device of above-described embodiment 4~5 etc. can be used for describing
Various units, but these units should not be limited by these terms.These terms are only used to by first module and another block region
Point.For example, without departing from the scope of the invention, the first computing module can be known as the second computing module,
And similarly, the second computing module can be known as to the first computing module, the first computing module and the second computing module are both
Computing module, but it is not same computing module.
Embodiment 6:
A kind of storage medium is present embodiments provided, which is computer readable storage medium, is stored with meter
Calculation machine program when described program is executed by processor, when processor executes the computer program of memory storage, realizes above-mentioned reality
The ciphertext data set intersection calculation method of example 1 is applied, as follows:
Generate the public key and private key of user;
According to clear data collection and public key that user inputs, clear data collection is encrypted, ciphertext data set is obtained, and
Ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
According to the authority levels that user selects, the authorization message of the authority levels is generated;
Authorization message is sent to server, so that server obtains ciphertext data set from ciphertext database, according to ciphertext
Median collection is calculated in data set and authorization message, according to the median collection for two users for meeting authority levels, by this two
The ciphertext data set of a user carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to phase
Using the client at family;
Receive the ciphertext data set intersection that server is sent;
According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, is obtained in plain text
Data set intersection.
Embodiment 7:
A kind of storage medium is present embodiments provided, which is computer readable storage medium, is stored with meter
Calculation machine program when described program is executed by processor, when processor executes the computer program of memory storage, realizes above-mentioned reality
The ciphertext data set intersection calculation method of example 2 is applied, as follows:
The ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database;
Receive the authorization message that client is sent;Wherein, the authorization message is the authority levels institute that is selected according to user
The authorization message of the authority levels generated;
Ciphertext data set is obtained from ciphertext database, and median collection is calculated according to ciphertext data set and authorization message;
According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection
It calculates, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
Storage medium in above-described embodiment 6~7 can be disk, CD, computer storage, read-only memory
(ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), USB flash disk, mobile hard disk
Equal media.
In conclusion the ciphertext data set of user is stored in by the present invention by special clear data collection cipher mode
In the ciphertext database of server, if server does not obtain the authorization of user, it can not be decrypted and be calculated with data set intersection,
If server obtains the authorization of user, the data set intersection that can carry out appropriate level is calculated;This method is ensuring data peace
Under the premise of full storage, fine-grained authorization can be carried out, that is, Cloud Server is allowed only to operate to specified ciphertext data set, or
The specified user for carrying out the intersection of ciphertext data set and calculating.
The above, only the invention patent preferred embodiment, but the scope of protection of the patent of the present invention is not limited to
This, anyone skilled in the art is in the range disclosed in the invention patent, according to the present invention the skill of patent
Art scheme and its inventive concept are subject to equivalent substitution or change, belong to the scope of protection of the patent of the present invention.
Claims (10)
1. a kind of ciphertext data set intersection calculation method is applied to client, which is characterized in that the described method includes:
Generate the public key and private key of user;
According to clear data collection and public key that user inputs, clear data collection is encrypted, obtains ciphertext data set, and will be close
Literary data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
According to the authority levels that user selects, the authorization message of the authority levels is generated;
Authorization message is sent to server, so that server obtains ciphertext data set from ciphertext database, according to ciphertext data
Collection and authorization message, are calculated median collection, according to the median collection for two users for meeting authority levels, the two are used
The ciphertext data set at family carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to and is mutually applied
The client at family;
Receive the ciphertext data set intersection that server is sent;
According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, clear data is obtained
Collect intersection.
2. ciphertext data set intersection calculation method according to claim 1, which is characterized in that it is described according to user selection
Authority levels generate the authorization message of the rank, specifically include:
When user selects the first authority levels, the private key of the user is obtained, calculates the authorization message of the first authority levels, it is as follows
Formula:
Wherein, yiFor an element in the private key of user i, w is system parameter;
When user selects the second authority levels, the private key of the user and the public key of designated user are obtained, calculates the second authorization grade
Other authorization message, such as following formula:
Wherein, yiAnd ziFor two elements in the private key of user i,WithFor two elements in the public key of designated user j;
When user selects third authority levels, the private key of the user and each ciphertext data of specified ciphertext data set are obtained,
The authorization message of third authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i, Ci,2For a member for specifying each ciphertext data in ciphertext data set
Element;
When user selects four authority levels, the private key of the user, the public key of designated user and specified ciphertext data set are obtained
Each ciphertext data, calculate the 4th authority levels authorization message, such as following formula:
Wherein, yiFor an element in the private key of user i,For an element in the public key of designated user j, Ci,2It is specified
An element of each ciphertext data in ciphertext data set, w is system parameter;
First authority levels, which refer to, allows server to carry out all ciphertext data sets and the ciphertext data set of all users
Intersection calculates;Second authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and designated user
Carry out intersection calculating;The third authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and all users
Intersection calculating is carried out according to collection;4th authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and designated user
Intersection calculating is carried out according to collection.
3. a kind of ciphertext data set intersection calculation method is applied to server, which is characterized in that the described method includes:
The ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database;
Receive the authorization message that client is sent;Wherein, the authorization message is generated by the authority levels selected according to user
The authority levels authorization message;
Ciphertext data set is obtained from ciphertext database, and median collection is calculated according to ciphertext data set and authorization message;
According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection meter
It calculates, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
4. ciphertext data set intersection calculation method according to claim 3, which is characterized in that described according to ciphertext data set
And authorization message, median collection is calculated, specifically includes:
When user selects the first authority levels, according to the authorization message of ciphertext data set and the first authority levels, it is calculated
Median collection;Wherein, median concentrates the calculating such as following formula of each median:
Ti=Ci,4⊕H2(e(Ci,2,Td1,i))
In formula, Ci,2And Ci,4For two elements of each ciphertext data in the ciphertext data set of user i, Td1,iIt is the of user i
The authorization message of one authority levels, TiThe each median concentrated for the median of user i;
When user selects the second authority levels, according to the authorization message of ciphertext data set and the second authority levels, it is calculated
Median collection;Wherein, median concentrates each middle-value calculating such as following formula:
Ti=Ci,4⊕H2(Si)
In formula, Ci,2、Ci,3And Ci,4For three elements of each ciphertext data in the ciphertext data set of user i, Td2,i,jA、Td2,i, jB is two elements of the authorization message of the second authority levels of user i, TiThe each median concentrated for the median of user i;
When user selects third authority levels, according to the authorization message of ciphertext data set and third authority levels, it is calculated
Median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, Ci,2And Ci,4For two elements of each ciphertext data in the specified ciphertext data set of user i,For user i
Third authority levels authorization message, DiFor each clear data that the clear data of user i is concentrated, TiFor the centre of user i
It is worth each median concentrated;
When user selects four authority levels, according to the authorization message of ciphertext data set and the 4th authority levels, it is calculated
Median collection;Wherein, median concentrates each middle-value calculating such as following formula:
Ti=Ci,4⊕H2(Si)
In formula, Ci,3And Ci,4For three elements of each ciphertext data in the specified ciphertext data set of user i,For user i
The 4th authority levels authorization message,For an element in the public key of designated user j, TiFor the median collection of user i
In each median;
First authority levels, which refer to, allows server to carry out all ciphertext data sets and the ciphertext data set of all users
Intersection calculates;Second authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and designated user
Carry out intersection calculating;The third authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and all users
Intersection calculating is carried out according to collection;4th authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and designated user
Intersection calculating is carried out according to collection.
5. a kind of ciphertext data set intersection computing device, it is applied to client, which is characterized in that described device includes:
First generation module, for generating the public key and private key of user;
Encrypting module, clear data collection and public key for being inputted according to user, encrypts clear data collection, obtains ciphertext
Data set, and ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
Second generation module, the authority levels for being selected according to user, generates the authorization message of the authority levels;
Sending module, for authorization message to be sent to server, so that server obtains ciphertext data set from ciphertext database,
According to ciphertext data set and authorization message, median collection is calculated, according to the median for two users for meeting authority levels
The ciphertext data set of the two users is carried out intersection calculating by collection, generates the intersection of ciphertext data set, and by ciphertext data set intersection
It is sent to the client of relative users;
Receiving module, for receiving the ciphertext data set intersection of server end transmission;
Deciphering module, the intersection of ciphertext data set and private key for being inputted according to user, is decrypted ciphertext data set intersection,
Obtain clear data collection intersection.
6. a kind of ciphertext data set intersection computing device, it is applied to server, which is characterized in that described device includes:
Ciphertext data set for receiving the ciphertext data set of client transmission, and is stored in ciphertext data by the first receiving module
In library;
Second receiving module, for receiving the authorization message of client transmission;Wherein, the authorization message is to be selected according to user
The authority levels authority levels generated authorization message;
First computing module, according to ciphertext data set and authorization message, is calculated for obtaining ciphertext data set from ciphertext database
Obtain median collection;
Second computing module, for the median collection according to two users for meeting authority levels, by the ciphertext of the two users
Data set carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users
End.
7. a kind of ciphertext data set intersection computing system, which is characterized in that described more including multiple client and a server
A client is connected with server respectively;
The client requires the described in any item ciphertext data set intersection calculation methods of 1-2 for perform claim;
The server requires the described in any item ciphertext data set intersection calculation methods of 3-4 for perform claim.
8. a kind of client, including processor and for the memory of storage processor executable program, which is characterized in that institute
When stating the program of processor execution memory storage, realize that the described in any item ciphertext data set intersections of claim 1-2 calculate
Method.
9. a kind of server, including processor and for the memory of storage processor executable program, which is characterized in that institute
When stating the program of processor execution memory storage, realize that the described in any item ciphertext data set intersections of claim 3-4 calculate
Method.
10. a kind of storage medium, is stored with program, which is characterized in that when described program is executed by processor, realize claim
The described in any item ciphertext data set intersection calculation methods of 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910644183.3A CN110474764B (en) | 2019-07-17 | 2019-07-17 | Ciphertext data set intersection calculation method, device, system, client, server and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910644183.3A CN110474764B (en) | 2019-07-17 | 2019-07-17 | Ciphertext data set intersection calculation method, device, system, client, server and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110474764A true CN110474764A (en) | 2019-11-19 |
CN110474764B CN110474764B (en) | 2021-03-26 |
Family
ID=68509596
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910644183.3A Active CN110474764B (en) | 2019-07-17 | 2019-07-17 | Ciphertext data set intersection calculation method, device, system, client, server and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110474764B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887089A (en) * | 2021-01-25 | 2021-06-01 | 华南农业大学 | Ciphertext similarity calculation method, device and system and storage medium |
CN113132345A (en) * | 2021-03-04 | 2021-07-16 | 北京航空航天大学 | Agent privacy set intersection method with searchable function |
WO2021218618A1 (en) * | 2020-04-26 | 2021-11-04 | 华为技术有限公司 | Data processing method, apparatus and system, device, and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107122449A (en) * | 2017-04-25 | 2017-09-01 | 安徽大学 | File classification method and system based on public key encryption in multi-user environment |
CN108132977A (en) * | 2017-12-12 | 2018-06-08 | 华南农业大学 | Ciphertext database querying method and system based on vertical division |
US20180294952A1 (en) * | 2017-04-10 | 2018-10-11 | City University Of Hong Kong | Method for operating a distributed key-value store |
CN109088721A (en) * | 2018-10-02 | 2018-12-25 | 复旦大学 | One kind, which can entrust, takes off sequence encryption method |
CN109246098A (en) * | 2018-08-31 | 2019-01-18 | 桂林电子科技大学 | A method of support the synchronous ciphertext of backup server to compare |
CN109902501A (en) * | 2019-03-19 | 2019-06-18 | 中国海洋大学 | A kind of structuring encryption method and system carrying out equality test based on cloud service platform |
CN109981614A (en) * | 2019-03-12 | 2019-07-05 | 华南农业大学 | Data ciphering method, decryption method, querying method and device based on user group |
-
2019
- 2019-07-17 CN CN201910644183.3A patent/CN110474764B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180294952A1 (en) * | 2017-04-10 | 2018-10-11 | City University Of Hong Kong | Method for operating a distributed key-value store |
CN107122449A (en) * | 2017-04-25 | 2017-09-01 | 安徽大学 | File classification method and system based on public key encryption in multi-user environment |
CN108132977A (en) * | 2017-12-12 | 2018-06-08 | 华南农业大学 | Ciphertext database querying method and system based on vertical division |
CN109246098A (en) * | 2018-08-31 | 2019-01-18 | 桂林电子科技大学 | A method of support the synchronous ciphertext of backup server to compare |
CN109088721A (en) * | 2018-10-02 | 2018-12-25 | 复旦大学 | One kind, which can entrust, takes off sequence encryption method |
CN109981614A (en) * | 2019-03-12 | 2019-07-05 | 华南农业大学 | Data ciphering method, decryption method, querying method and device based on user group |
CN109902501A (en) * | 2019-03-19 | 2019-06-18 | 中国海洋大学 | A kind of structuring encryption method and system carrying out equality test based on cloud service platform |
Non-Patent Citations (2)
Title |
---|
SHA MA ET AL: "《Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization》", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 * |
YAN XU ET AL: "《Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks》", 《IEEEACCESS SPECIAL SECTION ON RECENT ADVANCES ON RADIO 05ACCESS01 AND SECURITY METHODS IN 5G NETWORKS》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021218618A1 (en) * | 2020-04-26 | 2021-11-04 | 华为技术有限公司 | Data processing method, apparatus and system, device, and medium |
CN112887089A (en) * | 2021-01-25 | 2021-06-01 | 华南农业大学 | Ciphertext similarity calculation method, device and system and storage medium |
CN113132345A (en) * | 2021-03-04 | 2021-07-16 | 北京航空航天大学 | Agent privacy set intersection method with searchable function |
Also Published As
Publication number | Publication date |
---|---|
CN110474764B (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun | Privacy protection and data security in cloud computing: a survey, challenges, and solutions | |
Vijayakumar et al. | RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption | |
Tong et al. | Cloud-assisted mobile-access of health data with privacy and auditability | |
Wang et al. | Security-aware and privacy-preserving personal health record sharing using consortium blockchain | |
CN110061845A (en) | Block chain data ciphering method, device, computer equipment and storage medium | |
Ogiela et al. | Secure information management using linguistic threshold approach | |
CN109214201B (en) | Data sharing method, terminal equipment and computer readable storage medium | |
Xie et al. | An efficient learning framework for federated XGBoost using secret sharing and distributed optimization | |
CN110474764A (en) | Ciphertext data set intersection calculation method, device, system, client, server and medium | |
Qiu et al. | Categorical quantum cryptography for access control in cloud computing | |
Suresh et al. | Securing personal health record system in cloud using user usage based encryption | |
Ali et al. | Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing | |
CN115473715B (en) | Forward secure ciphertext equivalent test public key encryption method, device, system and medium | |
Hong et al. | Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems | |
Zhang et al. | A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain | |
Kibiwott et al. | Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey. | |
Kanna et al. | An improved privacy aware secure multi-cloud model with proliferate ElGamal encryption for big data storage | |
Yang et al. | Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage | |
Kumar et al. | Data security and encryption technique for cloud storage | |
Zhao et al. | Libertas: Privacy-preserving computation for decentralised personal data stores | |
Kang et al. | Quasi-optimal data placement for secure multi-tenant data federation on the cloud | |
CN115544572A (en) | Multi-party privacy data and financial privacy data processing method based on privacy protection | |
CN115599959A (en) | Data sharing method, device, equipment and storage medium | |
Jayashri et al. | Secured file transmission in knowledge management-cloud | |
Shi et al. | AUDITEM: toward an automated and efficient data integrity verification model using blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |