[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110474764A - Ciphertext data set intersection calculation method, device, system, client, server and medium - Google Patents

Ciphertext data set intersection calculation method, device, system, client, server and medium Download PDF

Info

Publication number
CN110474764A
CN110474764A CN201910644183.3A CN201910644183A CN110474764A CN 110474764 A CN110474764 A CN 110474764A CN 201910644183 A CN201910644183 A CN 201910644183A CN 110474764 A CN110474764 A CN 110474764A
Authority
CN
China
Prior art keywords
data set
ciphertext data
user
intersection
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910644183.3A
Other languages
Chinese (zh)
Other versions
CN110474764B (en
Inventor
黄琼
王元昊
肖媚燕
苗莹
刘文博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Agricultural University
Original Assignee
South China Agricultural University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Agricultural University filed Critical South China Agricultural University
Priority to CN201910644183.3A priority Critical patent/CN110474764B/en
Publication of CN110474764A publication Critical patent/CN110474764A/en
Application granted granted Critical
Publication of CN110474764B publication Critical patent/CN110474764B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of ciphertext data set intersection calculation method, device, system, client, server and media, the described method includes: according to the public key of user, clear data collection is encrypted, obtains ciphertext data set, and ciphertext data set is sent to server;According to the authority levels that user selects, the authorization message of the authority levels is generated;Authorization message is sent to server, so that server is according to ciphertext data set and authorization message, median collection is calculated, according to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection calculating, the intersection of ciphertext data set is generated, and ciphertext data set intersection is sent to the client of relative users;Receive the ciphertext data set intersection that server is sent;According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, clear data collection intersection is obtained.The present invention significantly improves flexibility under the premise of ensuring safety.

Description

Ciphertext data set intersection calculation method, device, system, client, server and medium
Technical field
The present invention relates to a kind of ciphertext data set intersection calculation method, device, system, client, server and media, belong to In data security arts.
Background technique
Cloud storage is a critical services in cloud computing, not only facilitates data backup, data sharing, prevents data from losing It loses, the carrying cost of data can also be effectively reduced.With cloud storage technology development and in recent years data leak accident frequency Hair, user focus more on the safety of data in cloud storage.
The data that enterprise and user upload on cloud may be confidential data, such as personal file and medical records.It will count It can effectively improve the safety of data according to upload after encryption, but also therefore destroy the original structure and features of data.Therefore, Ciphertext data calculate and are difficult.Since data mining, duplicate file are examined, set intersection meter involved in genetic test It calculates, for obtaining data characteristics or label to classify, therefore, it is necessary to realize to carry out set intersection calculating to encryption data.
It is that two sides calculate agreement and multi-party calculating agreement respectively currently, there is two major classes encrypted data set intersection calculation method. The former, such as patent document (publication number: CN109657489A, publication date on April 19th, 2019), it is desirable that user directly participates in counting It calculates, it is desirable that user has enough computing capabilitys, and is inconvenient to be converted into the version on cloud.The latter, such as patent document are (open Number: CN105812141A, publication date: on July 27th, 2016), it will be uploaded in Cloud Server after data encryption for multiple users, And authorization is provided, set intersection calculating is carried out by Cloud Server, and encrypted calculated result is returned into user, user is at this Ground is decrypted.But the authorization that user provides in such method can make Cloud Server freely to all numbers of the user According to set intersection calculating is carried out, fine-grained authorization cannot achieve, i.e., Cloud Server can not be allowed only to operate to partial data, Also the user for carrying out set intersection calculating can not be specified.For example, the upload encryption per family of the first user, second user and third On gene data to Cloud Server, the first user wishes that (technology needs to use set intersection with second user progress paternity test Collection calculates), it is therefore desirable to submission licenses to Cloud Server, but can not forbid Cloud Server by the data of oneself with third user's Data carry out set intersection operation.
Summary of the invention
In view of this, the present invention provides a kind of ciphertext data set intersection calculation method, device, computer equipment and storages Medium, can choose user allows server to operate and specify progress ciphertext data set friendship to specified ciphertext data set The user that collection calculates significantly improves flexibility under the premise of ensuring safety.
The first purpose of this invention is to provide a kind of ciphertext data set intersection calculation method, applied to client.
Second object of the present invention is to provide a kind of ciphertext data set intersection calculation method, applied to server.
Third object of the present invention is to provide a kind of ciphertext data set intersection computing device, applied to client.
Fourth object of the present invention is to provide a kind of ciphertext data set intersection computing device, applied to server.
Of the invention the 5th is designed to provide a kind of ciphertext data set intersection computing system.
Of the invention the 6th is designed to provide a kind of client.
Of the invention the 7th is designed to provide a kind of server.
Of the invention the 8th is designed to provide a kind of storage medium.
The first purpose of this invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection calculation method is applied to client, which comprises
Generate the public key and private key of user;
According to clear data collection and public key that user inputs, clear data collection is encrypted, ciphertext data set is obtained, and Ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
According to the authority levels that user selects, the authorization message of the authority levels is generated;
Authorization message is sent to server, so that server obtains ciphertext data set from ciphertext database, according to ciphertext Median collection is calculated in data set and authorization message, according to the median collection for two users for meeting authority levels, by this two The ciphertext data set of a user carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to phase Using the client at family;
Receive the ciphertext data set intersection that server is sent;
According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, is obtained in plain text Data set intersection.
Further, the authority levels selected according to user, generate the authorization message of the rank, specifically include:
When user selects the first authority levels, the private key of the user is obtained, calculates the authorization message of the first authority levels, Such as following formula:
Wherein, yiFor an element in the private key of user i, w is system parameter;
When user selects the second authority levels, the private key of the user and the public key of designated user are obtained, second is calculated and awards The other authorization message of power level, such as following formula:
Wherein, yiAnd ziFor two elements in the private key of user i,WithFor two in the public key of designated user j Element;
When user selects third authority levels, the private key of the user and each ciphertext number of specified ciphertext data set are obtained According to, the authorization message of calculating third authority levels, such as following formula:
Wherein, yiFor an element in the private key of user i, CI, 2To specify each ciphertext data in ciphertext data set One element;
When user selects four authority levels, the private key of the user, the public key of designated user and specified ciphertext number are obtained According to each ciphertext data of collection, the authorization message of the 4th authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i,For an element in the public key of designated user j, CI, 2 For an element for specifying each ciphertext data in ciphertext data set, w is system parameter;
First authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and all users Carry out intersection calculating;Second authority levels, which refer to, allows server by the ciphertext number of all ciphertext data sets and designated user Intersection calculating is carried out according to collection;The third authority levels, which refer to, allows server by the close of specified ciphertext data set and all users Literary data set carries out intersection calculating;4th authority levels, which refer to, allows server by the close of specified ciphertext data set and designated user Literary data set carries out intersection calculating.
Second object of the present invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection calculation method is applied to server, which comprises
The ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database;
Receive the authorization message that client is sent;Wherein, the authorization message is the authority levels institute that is selected according to user The authorization message of the authority levels generated;
Ciphertext data set is obtained from ciphertext database, and median collection is calculated according to ciphertext data set and authorization message;
According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection It calculates, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
Further, described according to ciphertext data set and authorization message, median collection is calculated, specifically includes:
When user selects the first authority levels, according to the authorization message of ciphertext data set and the first authority levels, calculate Obtain median collection;Wherein, median concentrates the calculating such as following formula of each median:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the ciphertext data set of user i, Td1, iFor user i The first authority levels authorization message, TiThe each median concentrated for the median of user i;
When user selects the second authority levels, according to the authorization message of ciphertext data set and the second authority levels, calculate Obtain median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, CI, 2、CI, 3And CI, 4For three elements of each ciphertext data in the ciphertext data set of user i, Td2, i, jA、 Td2, i, jB is two elements of the authorization message of the second authority levels of user i, and Ti is in each of median concentration of user i Between be worth;
When user selects third authority levels, according to the authorization message of ciphertext data set and third authority levels, calculate Obtain median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the specified ciphertext data set of user i,For The authorization message of the third authority levels of user i, DiFor each clear data that the clear data of user i is concentrated, TiFor user i Median concentrate each median;
When user selects four authority levels, according to the authorization message of ciphertext data set and the 4th authority levels, calculate Obtain median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, CI, 3And CI, 4For three elements of each ciphertext data in the specified ciphertext data set of user i,For The authorization message of the 4th authority levels of user i,For an element in the public key of designated user j, TiFor the centre of user i It is worth each median concentrated;
First authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and all users Carry out intersection calculating;Second authority levels, which refer to, allows server by the ciphertext number of all ciphertext data sets and designated user Intersection calculating is carried out according to collection;The third authority levels, which refer to, allows server by the close of specified ciphertext data set and all users Literary data set carries out intersection calculating;4th authority levels, which refer to, allows server by the close of specified ciphertext data set and designated user Literary data set carries out intersection calculating.
Third object of the present invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection computing device, is applied to client, and described device includes:
First generation module, for generating the public key and private key of user;
Encrypting module, clear data collection and public key for being inputted according to user, encrypts clear data collection, obtains Ciphertext data set, and ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server In;
Second generation module, the authority levels for being selected according to user, generates the authorization message of the authority levels;
Sending module, for authorization message to be sent to server, so that server obtains ciphertext number from ciphertext database Median collection is calculated according to ciphertext data set and authorization message according to collection, according in two users for meeting authority levels Between be worth collection, the ciphertext data set of the two users is subjected to intersection calculating, generates the intersection of ciphertext data set, and by ciphertext data set Intersection is sent to the client of relative users;
Receiving module, for receiving the ciphertext data set intersection of server end transmission;
Deciphering module, the intersection of ciphertext data set and private key for being inputted according to user carry out ciphertext data set intersection Decryption, obtains clear data collection intersection.
Fourth object of the present invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection computing device, is applied to server, and described device includes:
Ciphertext data set for receiving the ciphertext data set of client transmission, and is stored in ciphertext by the first receiving module In database;
Second receiving module, for receiving the authorization message of client transmission;Wherein, the authorization message is according to user The authorization message of the authority levels of the selection authority levels generated;
First computing module, for obtaining ciphertext data set from ciphertext database, according to ciphertext data set and authorization message, Median collection is calculated;
Second computing module, for the median collection according to two users for meeting authority levels, by the two users' Ciphertext data set carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to relative users Client.
5th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of ciphertext data set intersection computing system, including multiple client and a server, the multiple client It is connected respectively with server;
The client, for executing the above-mentioned ciphertext data set intersection calculation method applied to client;
The server, for executing the above-mentioned ciphertext data set intersection calculation method applied to server.
6th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of client, including processor and for the memory of storage processor executable program, the processor When executing the program of memory storage, the above-mentioned ciphertext data set intersection calculation method applied to client is realized.
7th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of server, including processor and for the memory of storage processor executable program, the processor When executing the program of memory storage, the above-mentioned ciphertext data set intersection calculation method applied to server is realized.
8th purpose of the invention can be reached by adopting the following technical scheme that:
A kind of storage medium is stored with program, when described program is executed by processor, realizes that above-mentioned ciphertext data set is handed over Collect calculation method.
The present invention have compared with the existing technology it is following the utility model has the advantages that
1, the ciphertext data set of user is stored in server by special clear data collection cipher mode by the present invention In ciphertext database, if server does not obtain the authorization of user, it can not be decrypted and be calculated with data set intersection, if server The authorization for obtaining user, then the data set intersection that can carry out appropriate level calculate;This method is ensuring data safety storage Under the premise of, fine-grained authorization can be carried out, that is, Cloud Server is allowed only to operate to specified ciphertext data set, or specified progress The user that ciphertext data set intersection calculates.
2, the ciphertext data outsourcing form that the present invention takes, on the one hand can be convenient data backup, data sharing, prevents from counting It according to loss, on the other hand saves and cost is locally stored, carry out the intersection of ciphertext data set on the server and calculate, solve native client The problem for holding computing capability deficiency, can be calculated under the premise of ensuring data safety, and be decrypted in local client It carries out, effectively prevent data leak.
3, the present invention is based on prejudgementing character bilinear Diffie-Hellman and computational bilinear Diffie-Hellman are false If example, effectively ensure Information Security.
4, the present invention can be connected with most of ciphertext databases, and can choose user allows server close to specifying Literary data set carries out the user operated and specified progress ciphertext data set intersection calculates, significantly improves flexibility.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with The structure shown according to these attached drawings obtains other attached drawings.
Fig. 1 is the flow chart of the ciphertext data set intersection calculation method of the embodiment of the present invention 1.
Fig. 2 is the public key of the user of the embodiment of the present invention 1 and the flow chart that private key calculates.
Fig. 3 is the flow chart that the data set of the embodiment of the present invention 1 encrypts.
Fig. 4 is the schematic diagram of the first authority levels of the embodiment of the present invention 1.
Fig. 5 is the schematic diagram of the second authority levels of the embodiment of the present invention 1.
Fig. 6 is the schematic diagram of the third authority levels of the embodiment of the present invention 1.
Fig. 7 is the schematic diagram of the 4th authority levels of the embodiment of the present invention 1.
Fig. 8 is the flow chart that the authorization message of the embodiment of the present invention 1 generates.
Fig. 9 is the flow chart of the ciphertext data set intersection calculation method of the embodiment of the present invention 2.
Figure 10 is the flow chart that the median collection of the embodiment of the present invention 2 calculates.
Figure 11 is the flow chart that the intersection of the embodiment of the present invention 2 calculates.
Figure 12 is the structural block diagram of the ciphertext data set intersection computing system of the embodiment of the present invention 3.
Figure 13 is the flow chart that the ciphertext data set of the embodiment of the present invention 3 is decrypted.
Figure 14 is the structural block diagram of the client of the embodiment of the present invention 3.
Figure 15 is the structural block diagram of the server of the embodiment of the present invention 3.
Figure 16 is the structural block diagram of the ciphertext data set intersection computing device of the embodiment of the present invention 4.
Figure 17 is the structural block diagram of the ciphertext data set intersection computing device of the embodiment of the present invention 5.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiments of the present invention, instead of all the embodiments, based on the embodiments of the present invention, ordinary skill people Member's every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment 1:
As shown in Figure 1, present embodiments providing a kind of ciphertext data set intersection calculation method, this method is applied to client End, comprising the following steps:
S101, the public key and private key for generating user.
Each user uses a client, for some user i, what the public key and private key of the user i was all used by it Client generates, as shown in Fig. 2, specifically including:
After S1011, user i start client and select registration, client generates random number
S1012, client calculate the public key of user iWith private key (xi, yi, zi)。
S102, the clear data collection and public key inputted according to user, encrypt clear data collection, obtain ciphertext data Collection, and ciphertext data set is sent to server.
As shown in figure 3, step S102 specifically includes the following steps:
S1021, user i input clear data collection D=(D1..., Dn) and public keyTo client, visitor The public key of family end acquisition user iWith clear data collection D=(D1..., Dn)。
S1022, to each data D in clear data collection Di(1≤i≤n), client generate random number
The corresponding ciphertext C of each clear data in S1023, calculating client clear data collection Di, Ci=(CI, 1, CI, 2, CI, 3, CI, 4, CI, 5)。
Whole clear data encryptions finish to obtain ciphertext data set C=(C1..., Cn), each of ciphertext data set C is close Literary data are Ci(1≤i≤n)。
Ciphertext data set is sent to server by S1024, client, and server is in the ciphertext number for receiving client transmission After collection, ciphertext data set is stored in ciphertext database.
S103, the authority levels selected according to user, generate the authorization message of the authority levels.
After user issues ciphertext data set intersection computation requests by user end to server, it can choose four authorizations Rank is as follows:
1) the first authority levels: server is allowed to hand over all ciphertext data sets and the ciphertext data set of all users Collection calculates, as shown in figure 4, by taking three users as an example, three users are respectively the first user, second user and third user, the The ciphertext data set of one user both can carry out intersection calculating with the ciphertext data set of second user, can also be with third user's Ciphertext data set carries out intersection calculating.
2) the second authority levels: server is allowed to hand over the ciphertext data set of all ciphertext data sets and designated user Collection calculates, as shown in figure 5, by taking three users as an example, three users are respectively the first user, second user and third user, Middle second user is designated user, and the ciphertext data set of the first user may only carry out intersection with the ciphertext data set of second user It calculates, it is not possible to carry out intersection calculating with the ciphertext data set of third user.
3) third authority levels: server is allowed to hand over specified ciphertext data set and the ciphertext data set of all users Collection calculates, as shown in fig. 6, by taking three users as an example, three users are respectively the first user, second user and third user, In the partial document (such as file 1, file 2) of the first user be specified file, specify ciphertext data set both can be with accordingly Intersection calculating is carried out with the ciphertext data set of second user, intersection calculating can also be carried out with the ciphertext data set of third user, First user remaining paper (the corresponding ciphertext data set of such as file n) both cannot with the ciphertext data set of second user into Row intersection calculates, and also cannot carry out intersection calculating with the ciphertext data set of third user.
4) the 4th authority levels: server is allowed to hand over the ciphertext data set of specified ciphertext data set and designated user Collection calculates, as shown in fig. 7, by taking three users as an example, three users are respectively the first user, second user and third user, In the first user partial document (such as file 1, file 2) be specified file, second user is designated user, the first user's Specified file specifies ciphertext data set that may only carry out intersection calculating with the ciphertext data set of second user accordingly, it is not possible to The ciphertext data set of third user carries out intersection calculating, remaining paper (the corresponding ciphertext data of such as file n) of the first user Collection both cannot carry out intersection calculating with the ciphertext data set of second user, also cannot with the ciphertext data set of third user into Row intersection calculates.
As shown in figure 8, step S103 specifically includes the following steps:
If S1031, user i select the first authority levels, client obtains the private key of user i, calculates the first authority levels Authorization message, such as following formula:
Wherein, yiFor an element in the private key of user i, w is system parameter.
If S1032, user i select the second authority levels, client obtains the private key of user i and the public key of designated user j, Calculate the authorization message of the second authority levels, such as following formula:
Wherein, yiAnd ziFor two elements in the private key of user i,WithFor two in the public key of designated user j Element.
If S1033, user i select third authority levels, client obtains the private key and specified ciphertext data set of user i Each ciphertext data Ci, the authorization message of third authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i, CI, 2To specify each ciphertext data in ciphertext data set One element.
If S1034, user i select the 4th authority levels, client obtain the private key of user i, designated user j public key and Each ciphertext data C of specified ciphertext data seti, the authorization message of the 4th authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i,For an element in the public key of designated user j, CI, 2 For an element for specifying each ciphertext data in ciphertext data set, w is system parameter.
S104, authorization message is sent to server.
The authorization message of the selected authority levels of user is sent to server by client, and server is receiving authorization After information, ciphertext data set is obtained from ciphertext database, median collection is calculated according to ciphertext data set and authorization message, According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection calculating, it is raw At ciphertext data set intersection, and ciphertext data set intersection is sent to the client of relative users.
S105, the ciphertext data set intersection that server is sent is received.
S106, the ciphertext data set intersection according to user's input and private key, are decrypted ciphertext data set intersection, obtain Clear data collection intersection.
As shown in figure 9, step S106 is specifically included:
S1061, user i input the intersection of ciphertext data and private key (xi, yi, zi) client is arrived, client obtains user i's Private key, and from the ciphertext database of server 1302 obtain user i ciphertext data set;
S1062, client calculate each in the intersection of ciphertext data according to the user i ciphertext data intersection inputted and private key Ciphertext data Ci(1≤i≤n) corresponding clear data Di, such as following formula:
After whole ciphertext data decipherings, clear data intersection D=(D is obtained1..., Dn), to be shown to user i.
Embodiment 2:
As shown in Figure 10, a kind of ciphertext data set intersection calculation method is present embodiments provided, this method is applied to service Device, comprising the following steps:
S1001, the ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database.
The clear data collection and public key that client is inputted according to user, encrypt clear data collection, obtain ciphertext number It is sent to server according to collection, and by ciphertext data set, server is after the ciphertext data set for receiving client transmission, by ciphertext Data set is stored in ciphertext database.
S1002, the authorization message that client is sent is received.
It, as described in Example 1, can after user issues ciphertext data set intersection computation requests by user end to server To select four authority levels (the first authority levels, the second authority levels, third authority levels and the 4th authority levels), according to The authority levels of user's selection, generate the authorization message of the authority levels, and authorization message is sent to server, by server It receives.
S1003, ciphertext data set is obtained from ciphertext database, according to ciphertext data set and authorization message, be calculated Between be worth collection.
As shown in figure 11, step S1003 specifically includes the following steps:
If S10031, user select the first authority levels, i.e. authorization message of the authorization message for the first authority levels, service Median collection is calculated according to the authorization message of ciphertext data set and the first authority levels in device.
For some user i, value calculates such as following formula among it:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the ciphertext data set of user i, Td1, iFor user i The first authority levels authorization message, TiThe each median concentrated for the median of user i;
After all ciphertext data for the ciphertext data set for having handled user i, the median collection of user i is obtained.
If S10032, user select the second authority levels, i.e. authorization message of the authorization message for the second authority levels, service Median collection is calculated according to the authorization message of ciphertext data set and the second authority levels in device.
For some user i, value calculates such as following formula among it:
In formula, CI, 2CI, 3And CI, 4For three elements of each ciphertext data in the ciphertext data set of user i, Td2, i, jA、 Td2, i, jB is two elements of the authorization message of the second authority levels of user i, TiIn each of median concentration for user i Between be worth;
After all ciphertext data for the ciphertext data set for having handled user i, the median collection of user i is obtained.
If S10033, user select third authority levels, i.e. authorization message of the authorization message for third authority levels, service Median collection is calculated according to the authorization message of ciphertext data set and third authority levels in device.
For some user i, value calculates such as following formula among it:
In formula, CI, 2And CI, 4For two elements of each ciphertext data in the specified ciphertext data set of user i,For The authorization message of the third authority levels of user i, DiFor each clear data that the clear data of user i is concentrated, TiFor user i Median concentrate each median;
After all ciphertext data for the specified ciphertext data set for having handled user i, the median collection of user i is obtained.
If the authorization message that S10034, user's the 4th authority levels of selection, i.e. authorization message are the 4th authority levels, according to Median collection is calculated in the authorization message of ciphertext data set and the 4th authority levels.
For some user i, value calculates such as following formula among it:
In formula, CI, 3And CI, 4For three elements of each ciphertext data in the specified ciphertext data set of user i,For The authorization message of the 4th authority levels of user i,For an element in the public key of designated user j, TiFor the centre of user i It is worth each median concentrated;
After all ciphertext data for the specified ciphertext data set for having handled user i, the median collection of user i is obtained.
S1004, according to meet authority levels two users median collection, by the ciphertext data set of the two users into Row intersection calculates, and generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
As shown in figure 12, step S1004 specifically includes the following steps:
S10041, traversal meet the median collection of two users of authority levels, will be close corresponding to equal median Text is stored respectively in respective calculated result list, generates the intersection of ciphertext data set.
Assuming that two users for meeting authority levels are respectively user i and user j, it is every in the ciphertext data set of user j A ciphertext data are Cj, calculate and may refer to the step S102 of above-described embodiment 1, during each of the median of user j is concentrated Between value be Tj, calculating may refer to above-mentioned steps S903, and this is no longer going to repeat them.
Server maintains two calculated result list L being initially empty1With L2, to each of the ciphertext data set of user i Ciphertext data CiWith each ciphertext data C in the ciphertext data set of user ji, by the centre of the median collection of user i and user j The median that value is concentrated compares one by one, if Ti=Tj, then by CiIt is stored in L1, by CjIt is stored in L2, by L1And L2As ciphertext data set Intersection.
S10042, the client that ciphertext data set intersection is sent to relative users.
After all comparing, by L1It is sent to the client of user i, by L2It is sent to the client of user j, user i's The ciphertext data set intersection of user i is decrypted in client, the client of user j to the ciphertext data set intersection of user j into Row decryption.
It will be understood by those skilled in the art that realizing that all or part of the steps in the method for above-described embodiment 1~2 can be with Relevant hardware is instructed to complete by program, corresponding program can store in computer readable storage medium.
It should be noted that although describing the method operation of above-described embodiment 1~2 in the accompanying drawings with particular order, this These operations must be executed in this particular order by not requiring that or implying, or is had to carry out and operated just shown in whole It is able to achieve desired result.On the contrary, the step of describing can change and execute sequence.Additionally or alternatively, it is convenient to omit certain Multiple steps are merged into a step and executed, and/or a step is decomposed into execution of multiple steps by step.
Embodiment 3:
As shown in figure 13, a kind of ciphertext data set intersection computing system is present embodiments provided, which includes n client End 1301 and a server 1302, the n function having the same of client 1301, but used by different users, i.e., shared n A user, and each user uses a client 1301, n client 1301 can not communicate between each other, and respectively with clothes Business device 1302 is connected and communicates.
The client 1301, for generating the public key and private key of user;According to the clear data collection and public affairs of user's input Key encrypts clear data collection, obtains ciphertext data set, and ciphertext data set is sent to server 1302;According to The authority levels of family selection, generate the authorization message of the authority levels;Authorization message is sent to server 1302;Receive service The ciphertext data set intersection that device 1302 is sent;According to the ciphertext data set intersection of user's input and private key, ciphertext data set is handed over Collection is decrypted, and obtains clear data collection intersection.
User can also obtain the ciphertext number of the user by client 1301 from the ciphertext database of server 1302 According to collection, then user inputs ciphertext data set and private key, the ciphertext data set and private key that client is inputted according to user, to ciphertext Data set is decrypted, and obtains clear data collection, to be shown to user.
The server 1302 receives the ciphertext data set that client 1301 is sent, and ciphertext data set is stored in close In literary database;The authorization message that client 1301 is sent is received, which is the authority levels institute that selects according to user The authorization message of the authority levels generated;Ciphertext data set is obtained from ciphertext database, is believed according to ciphertext data set and authorization Breath, is calculated median collection;According to the median collection for two users for meeting authority levels, by the ciphertext number of the two users Intersection calculating is carried out according to collection, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users 1301。
As shown in figure 14, the client 1301 can be computer, mobile phone, tablet computer etc., first processor 13011, the components such as first memory 13012, input unit 13013, display unit 13014, transmission module 13015, first deposits Reservoir 13012, input unit 13013, display unit 13014 and transmission module 13015 respectively with 13011 phase of first processor Even, first memory 13012 can be used for storing computer program, and first processor 13011 is stored in the first storage by operation When computer program in device 13012, to realize the function of above-mentioned client 1301.
As shown in figure 15, the server 1302 include the first processor 13022 connected by system bus 13021, First memory and network interface 13023;Wherein, first processor 13022 is for providing calculating and control ability, the first storage Device includes non-volatile memory medium 13024 and built-in storage 13025, which is stored with operation System, computer program and database, the built-in storage 13025 are operating system and computer in non-volatile memory medium The operation of program provides environment and realizes the function of above-mentioned server 1302 when computer program is executed by first processor 13022 Energy.
Embodiment 4:
As shown in figure 16, a kind of ciphertext data set intersection computing device is present embodiments provided, which is applied to client End, including the first generation module 1601, encrypting module 1602, the second generation module 1603, sending module 1604, receiving module 1605 and deciphering module 1606, the concrete function of modules it is as follows:
First generation module 1601, for generating the public key and private key of user.
The encrypting module 1602, clear data collection and public key for being inputted according to user carry out clear data collection Encryption, obtain ciphertext data set, and ciphertext data set is sent to server so that server ciphertext data set is stored in it is close In literary database.
Second generation module 1603, the authority levels for being selected according to user, generates the authorization of the authority levels Information.
The sending module 1604, for authorization message to be sent to server, so that server is obtained from ciphertext database Ciphertext data set is taken, according to ciphertext data set and authorization message, median collection is calculated, according to meeting two of authority levels The ciphertext data set of the two users is carried out intersection calculating, generates the intersection of ciphertext data set, and will be close by the median collection of user Literary data set intersection is sent to user.
The receiving module 1605, for receiving the ciphertext data set intersection of server end transmission;
The deciphering module 1606, the intersection of ciphertext data set and public key for being inputted according to user, to ciphertext data set Intersection is decrypted, and obtains clear data collection intersection.
The specific implementation of modules may refer to above-described embodiment 1 in the present embodiment, and this is no longer going to repeat them.
Embodiment 5:
As shown in figure 17, a kind of ciphertext data set intersection computing device is present embodiments provided, which is applied to service Device, including the first receiving module 1701, the first receiving module 1702, the first computing module 1703 and the second computing module 1704, The concrete function of modules is as follows:
First receiving module 1701 for receiving the ciphertext data set of client transmission, and ciphertext data set is deposited Storage is in ciphertext database.
Second receiving module 1702, for receiving the authorization message of client transmission;Wherein, the authorization message is According to the authorization message of the authority levels authority levels generated of user's selection.
First computing module 1703, for obtaining ciphertext data set from ciphertext database, according to ciphertext data set and Median collection is calculated in authorization message.
Second computing module 1704, for according to meet authority levels two users median collection, by this two The ciphertext data set of a user carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to phase Using the client at family.
The specific implementation of modules may refer to above-described embodiment 2 in the present embodiment, and this is no longer going to repeat them.
It should be noted that the device that above-described embodiment 4~5 provides only is illustrated with the division of above-mentioned each functional module Illustrate, in practical applications, can according to need and be completed by different functional modules above-mentioned function distribution, i.e., by internal junction Structure is divided into different functional modules, to complete all or part of the functions described above.
It is appreciated that term " first ", " second " used in the device of above-described embodiment 4~5 etc. can be used for describing Various units, but these units should not be limited by these terms.These terms are only used to by first module and another block region Point.For example, without departing from the scope of the invention, the first computing module can be known as the second computing module, And similarly, the second computing module can be known as to the first computing module, the first computing module and the second computing module are both Computing module, but it is not same computing module.
Embodiment 6:
A kind of storage medium is present embodiments provided, which is computer readable storage medium, is stored with meter Calculation machine program when described program is executed by processor, when processor executes the computer program of memory storage, realizes above-mentioned reality The ciphertext data set intersection calculation method of example 1 is applied, as follows:
Generate the public key and private key of user;
According to clear data collection and public key that user inputs, clear data collection is encrypted, ciphertext data set is obtained, and Ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
According to the authority levels that user selects, the authorization message of the authority levels is generated;
Authorization message is sent to server, so that server obtains ciphertext data set from ciphertext database, according to ciphertext Median collection is calculated in data set and authorization message, according to the median collection for two users for meeting authority levels, by this two The ciphertext data set of a user carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to phase Using the client at family;
Receive the ciphertext data set intersection that server is sent;
According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, is obtained in plain text Data set intersection.
Embodiment 7:
A kind of storage medium is present embodiments provided, which is computer readable storage medium, is stored with meter Calculation machine program when described program is executed by processor, when processor executes the computer program of memory storage, realizes above-mentioned reality The ciphertext data set intersection calculation method of example 2 is applied, as follows:
The ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database;
Receive the authorization message that client is sent;Wherein, the authorization message is the authority levels institute that is selected according to user The authorization message of the authority levels generated;
Ciphertext data set is obtained from ciphertext database, and median collection is calculated according to ciphertext data set and authorization message;
According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection It calculates, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
Storage medium in above-described embodiment 6~7 can be disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), USB flash disk, mobile hard disk Equal media.
In conclusion the ciphertext data set of user is stored in by the present invention by special clear data collection cipher mode In the ciphertext database of server, if server does not obtain the authorization of user, it can not be decrypted and be calculated with data set intersection, If server obtains the authorization of user, the data set intersection that can carry out appropriate level is calculated;This method is ensuring data peace Under the premise of full storage, fine-grained authorization can be carried out, that is, Cloud Server is allowed only to operate to specified ciphertext data set, or The specified user for carrying out the intersection of ciphertext data set and calculating.
The above, only the invention patent preferred embodiment, but the scope of protection of the patent of the present invention is not limited to This, anyone skilled in the art is in the range disclosed in the invention patent, according to the present invention the skill of patent Art scheme and its inventive concept are subject to equivalent substitution or change, belong to the scope of protection of the patent of the present invention.

Claims (10)

1. a kind of ciphertext data set intersection calculation method is applied to client, which is characterized in that the described method includes:
Generate the public key and private key of user;
According to clear data collection and public key that user inputs, clear data collection is encrypted, obtains ciphertext data set, and will be close Literary data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
According to the authority levels that user selects, the authorization message of the authority levels is generated;
Authorization message is sent to server, so that server obtains ciphertext data set from ciphertext database, according to ciphertext data Collection and authorization message, are calculated median collection, according to the median collection for two users for meeting authority levels, the two are used The ciphertext data set at family carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to and is mutually applied The client at family;
Receive the ciphertext data set intersection that server is sent;
According to the ciphertext data set intersection of user's input and private key, ciphertext data set intersection is decrypted, clear data is obtained Collect intersection.
2. ciphertext data set intersection calculation method according to claim 1, which is characterized in that it is described according to user selection Authority levels generate the authorization message of the rank, specifically include:
When user selects the first authority levels, the private key of the user is obtained, calculates the authorization message of the first authority levels, it is as follows Formula:
Wherein, yiFor an element in the private key of user i, w is system parameter;
When user selects the second authority levels, the private key of the user and the public key of designated user are obtained, calculates the second authorization grade Other authorization message, such as following formula:
Wherein, yiAnd ziFor two elements in the private key of user i,WithFor two elements in the public key of designated user j;
When user selects third authority levels, the private key of the user and each ciphertext data of specified ciphertext data set are obtained, The authorization message of third authority levels is calculated, such as following formula:
Wherein, yiFor an element in the private key of user i, Ci,2For a member for specifying each ciphertext data in ciphertext data set Element;
When user selects four authority levels, the private key of the user, the public key of designated user and specified ciphertext data set are obtained Each ciphertext data, calculate the 4th authority levels authorization message, such as following formula:
Wherein, yiFor an element in the private key of user i,For an element in the public key of designated user j, Ci,2It is specified An element of each ciphertext data in ciphertext data set, w is system parameter;
First authority levels, which refer to, allows server to carry out all ciphertext data sets and the ciphertext data set of all users Intersection calculates;Second authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and designated user Carry out intersection calculating;The third authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and all users Intersection calculating is carried out according to collection;4th authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and designated user Intersection calculating is carried out according to collection.
3. a kind of ciphertext data set intersection calculation method is applied to server, which is characterized in that the described method includes:
The ciphertext data set that client is sent is received, and ciphertext data set is stored in ciphertext database;
Receive the authorization message that client is sent;Wherein, the authorization message is generated by the authority levels selected according to user The authority levels authorization message;
Ciphertext data set is obtained from ciphertext database, and median collection is calculated according to ciphertext data set and authorization message;
According to the median collection for two users for meeting authority levels, the ciphertext data set of the two users is subjected to intersection meter It calculates, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users.
4. ciphertext data set intersection calculation method according to claim 3, which is characterized in that described according to ciphertext data set And authorization message, median collection is calculated, specifically includes:
When user selects the first authority levels, according to the authorization message of ciphertext data set and the first authority levels, it is calculated Median collection;Wherein, median concentrates the calculating such as following formula of each median:
Ti=Ci,4⊕H2(e(Ci,2,Td1,i))
In formula, Ci,2And Ci,4For two elements of each ciphertext data in the ciphertext data set of user i, Td1,iIt is the of user i The authorization message of one authority levels, TiThe each median concentrated for the median of user i;
When user selects the second authority levels, according to the authorization message of ciphertext data set and the second authority levels, it is calculated Median collection;Wherein, median concentrates each middle-value calculating such as following formula:
Ti=Ci,4⊕H2(Si)
In formula, Ci,2、Ci,3And Ci,4For three elements of each ciphertext data in the ciphertext data set of user i, Td2,i,jA、Td2,i, jB is two elements of the authorization message of the second authority levels of user i, TiThe each median concentrated for the median of user i;
When user selects third authority levels, according to the authorization message of ciphertext data set and third authority levels, it is calculated Median collection;Wherein, median concentrates each middle-value calculating such as following formula:
In formula, Ci,2And Ci,4For two elements of each ciphertext data in the specified ciphertext data set of user i,For user i Third authority levels authorization message, DiFor each clear data that the clear data of user i is concentrated, TiFor the centre of user i It is worth each median concentrated;
When user selects four authority levels, according to the authorization message of ciphertext data set and the 4th authority levels, it is calculated Median collection;Wherein, median concentrates each middle-value calculating such as following formula:
Ti=Ci,4⊕H2(Si)
In formula, Ci,3And Ci,4For three elements of each ciphertext data in the specified ciphertext data set of user i,For user i The 4th authority levels authorization message,For an element in the public key of designated user j, TiFor the median collection of user i In each median;
First authority levels, which refer to, allows server to carry out all ciphertext data sets and the ciphertext data set of all users Intersection calculates;Second authority levels, which refer to, allows server by the ciphertext data set of all ciphertext data sets and designated user Carry out intersection calculating;The third authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and all users Intersection calculating is carried out according to collection;4th authority levels, which refer to, allows server by the ciphertext number of specified ciphertext data set and designated user Intersection calculating is carried out according to collection.
5. a kind of ciphertext data set intersection computing device, it is applied to client, which is characterized in that described device includes:
First generation module, for generating the public key and private key of user;
Encrypting module, clear data collection and public key for being inputted according to user, encrypts clear data collection, obtains ciphertext Data set, and ciphertext data set is sent to server, so that ciphertext data set is stored in ciphertext database by server;
Second generation module, the authority levels for being selected according to user, generates the authorization message of the authority levels;
Sending module, for authorization message to be sent to server, so that server obtains ciphertext data set from ciphertext database, According to ciphertext data set and authorization message, median collection is calculated, according to the median for two users for meeting authority levels The ciphertext data set of the two users is carried out intersection calculating by collection, generates the intersection of ciphertext data set, and by ciphertext data set intersection It is sent to the client of relative users;
Receiving module, for receiving the ciphertext data set intersection of server end transmission;
Deciphering module, the intersection of ciphertext data set and private key for being inputted according to user, is decrypted ciphertext data set intersection, Obtain clear data collection intersection.
6. a kind of ciphertext data set intersection computing device, it is applied to server, which is characterized in that described device includes:
Ciphertext data set for receiving the ciphertext data set of client transmission, and is stored in ciphertext data by the first receiving module In library;
Second receiving module, for receiving the authorization message of client transmission;Wherein, the authorization message is to be selected according to user The authority levels authority levels generated authorization message;
First computing module, according to ciphertext data set and authorization message, is calculated for obtaining ciphertext data set from ciphertext database Obtain median collection;
Second computing module, for the median collection according to two users for meeting authority levels, by the ciphertext of the two users Data set carries out intersection calculating, generates the intersection of ciphertext data set, and ciphertext data set intersection is sent to the client of relative users End.
7. a kind of ciphertext data set intersection computing system, which is characterized in that described more including multiple client and a server A client is connected with server respectively;
The client requires the described in any item ciphertext data set intersection calculation methods of 1-2 for perform claim;
The server requires the described in any item ciphertext data set intersection calculation methods of 3-4 for perform claim.
8. a kind of client, including processor and for the memory of storage processor executable program, which is characterized in that institute When stating the program of processor execution memory storage, realize that the described in any item ciphertext data set intersections of claim 1-2 calculate Method.
9. a kind of server, including processor and for the memory of storage processor executable program, which is characterized in that institute When stating the program of processor execution memory storage, realize that the described in any item ciphertext data set intersections of claim 3-4 calculate Method.
10. a kind of storage medium, is stored with program, which is characterized in that when described program is executed by processor, realize claim The described in any item ciphertext data set intersection calculation methods of 1-4.
CN201910644183.3A 2019-07-17 2019-07-17 Ciphertext data set intersection calculation method, device, system, client, server and medium Active CN110474764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910644183.3A CN110474764B (en) 2019-07-17 2019-07-17 Ciphertext data set intersection calculation method, device, system, client, server and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910644183.3A CN110474764B (en) 2019-07-17 2019-07-17 Ciphertext data set intersection calculation method, device, system, client, server and medium

Publications (2)

Publication Number Publication Date
CN110474764A true CN110474764A (en) 2019-11-19
CN110474764B CN110474764B (en) 2021-03-26

Family

ID=68509596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910644183.3A Active CN110474764B (en) 2019-07-17 2019-07-17 Ciphertext data set intersection calculation method, device, system, client, server and medium

Country Status (1)

Country Link
CN (1) CN110474764B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887089A (en) * 2021-01-25 2021-06-01 华南农业大学 Ciphertext similarity calculation method, device and system and storage medium
CN113132345A (en) * 2021-03-04 2021-07-16 北京航空航天大学 Agent privacy set intersection method with searchable function
WO2021218618A1 (en) * 2020-04-26 2021-11-04 华为技术有限公司 Data processing method, apparatus and system, device, and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122449A (en) * 2017-04-25 2017-09-01 安徽大学 File classification method and system based on public key encryption in multi-user environment
CN108132977A (en) * 2017-12-12 2018-06-08 华南农业大学 Ciphertext database querying method and system based on vertical division
US20180294952A1 (en) * 2017-04-10 2018-10-11 City University Of Hong Kong Method for operating a distributed key-value store
CN109088721A (en) * 2018-10-02 2018-12-25 复旦大学 One kind, which can entrust, takes off sequence encryption method
CN109246098A (en) * 2018-08-31 2019-01-18 桂林电子科技大学 A method of support the synchronous ciphertext of backup server to compare
CN109902501A (en) * 2019-03-19 2019-06-18 中国海洋大学 A kind of structuring encryption method and system carrying out equality test based on cloud service platform
CN109981614A (en) * 2019-03-12 2019-07-05 华南农业大学 Data ciphering method, decryption method, querying method and device based on user group

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180294952A1 (en) * 2017-04-10 2018-10-11 City University Of Hong Kong Method for operating a distributed key-value store
CN107122449A (en) * 2017-04-25 2017-09-01 安徽大学 File classification method and system based on public key encryption in multi-user environment
CN108132977A (en) * 2017-12-12 2018-06-08 华南农业大学 Ciphertext database querying method and system based on vertical division
CN109246098A (en) * 2018-08-31 2019-01-18 桂林电子科技大学 A method of support the synchronous ciphertext of backup server to compare
CN109088721A (en) * 2018-10-02 2018-12-25 复旦大学 One kind, which can entrust, takes off sequence encryption method
CN109981614A (en) * 2019-03-12 2019-07-05 华南农业大学 Data ciphering method, decryption method, querying method and device based on user group
CN109902501A (en) * 2019-03-19 2019-06-18 中国海洋大学 A kind of structuring encryption method and system carrying out equality test based on cloud service platform

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SHA MA ET AL: "《Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization》", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 *
YAN XU ET AL: "《Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks》", 《IEEEACCESS SPECIAL SECTION ON RECENT ADVANCES ON RADIO 05ACCESS01 AND SECURITY METHODS IN 5G NETWORKS》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021218618A1 (en) * 2020-04-26 2021-11-04 华为技术有限公司 Data processing method, apparatus and system, device, and medium
CN112887089A (en) * 2021-01-25 2021-06-01 华南农业大学 Ciphertext similarity calculation method, device and system and storage medium
CN113132345A (en) * 2021-03-04 2021-07-16 北京航空航天大学 Agent privacy set intersection method with searchable function

Also Published As

Publication number Publication date
CN110474764B (en) 2021-03-26

Similar Documents

Publication Publication Date Title
Sun Privacy protection and data security in cloud computing: a survey, challenges, and solutions
Vijayakumar et al. RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption
Tong et al. Cloud-assisted mobile-access of health data with privacy and auditability
Wang et al. Security-aware and privacy-preserving personal health record sharing using consortium blockchain
CN110061845A (en) Block chain data ciphering method, device, computer equipment and storage medium
Ogiela et al. Secure information management using linguistic threshold approach
CN109214201B (en) Data sharing method, terminal equipment and computer readable storage medium
Xie et al. An efficient learning framework for federated XGBoost using secret sharing and distributed optimization
CN110474764A (en) Ciphertext data set intersection calculation method, device, system, client, server and medium
Qiu et al. Categorical quantum cryptography for access control in cloud computing
Suresh et al. Securing personal health record system in cloud using user usage based encryption
Ali et al. Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
CN115473715B (en) Forward secure ciphertext equivalent test public key encryption method, device, system and medium
Hong et al. Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems
Zhang et al. A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
Kibiwott et al. Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey.
Kanna et al. An improved privacy aware secure multi-cloud model with proliferate ElGamal encryption for big data storage
Yang et al. Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage
Kumar et al. Data security and encryption technique for cloud storage
Zhao et al. Libertas: Privacy-preserving computation for decentralised personal data stores
Kang et al. Quasi-optimal data placement for secure multi-tenant data federation on the cloud
CN115544572A (en) Multi-party privacy data and financial privacy data processing method based on privacy protection
CN115599959A (en) Data sharing method, device, equipment and storage medium
Jayashri et al. Secured file transmission in knowledge management-cloud
Shi et al. AUDITEM: toward an automated and efficient data integrity verification model using blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant