Privacy Protection Based on Special Identifiers of Intersection Base Computing Technology

被引:0
|
作者
Zhang, Ping [1 ,2 ]
Ma, Tengfei [1 ]
Zhang, Qing [1 ]
Zhang, Ji [1 ,2 ]
Wang, Jiechang [3 ]
机构
[1] Henan Univ Sci & Technol, Sch Math & Stat, Luoyang 471023, Peoples R China
[2] Longmen Lab, Intelligent Syst Sci & Technol Innovat Ctr, Luoyang 471023, Peoples R China
[3] Zhengzhou Univ, Sports Big Data Ctr, Dept Phys Educ, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 02期
关键词
semi-homomorphic encryption; PSI; MPC; PSI-CA; DISJOINTNESS;
D O I
10.3390/app14020813
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA) are two cryptographic primitives whereby two or more parties are able to obtain the cardinalities of the intersection and the union of their respective private sets, and the privacy of their sets is preserved. In this paper, we propose a new privacy protection intersection cardinality protocol, which can quickly deal with set inequality and asymmetry problems and can obtain 100% correct results, and, in terms of efficiency, we are much faster than using the polynomial method. Our protocol adopts the Paillier addition homomorphic encryption scheme and applies the identifier guidance technology, using identifier determination, to the semi-homomorphic encryption ciphertext environment, excluding a large number of different options and quickly finding the base of the intersection of two sides.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Privacy protection for RFID with hidden subset identifiers
    Cichon, Jacek
    Klonowski, Marek
    Kutylowski, Miroslaw
    PERVASIVE COMPUTING, 2008, 5013 : 298 - 314
  • [2] Survey of Privacy Data Protection Technology in Cloud Computing
    Wang, Yang
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 143 - 145
  • [3] Medical privacy protection based on granular computing
    Wang, DW
    Liau, CJ
    Hsu, TS
    ARTIFICIAL INTELLIGENCE IN MEDICINE, 2004, 32 (02) : 137 - 149
  • [4] Privacy protection in ubiquitous computing based on privacy label and information flow
    Hwang, SO
    Yoon, KS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 2, 2004, 3044 : 46 - 54
  • [5] DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM
    Chen, Zhishe
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3484 - 3488
  • [6] Trust based privacy protection method in pervasive computing
    Gao, Feng
    He, Jingsha
    Ma, Shunan
    Journal of Networks, 2012, 7 (02) : 322 - 328
  • [7] Differential Privacy-Based Location Privacy Protection for Edge Computing Networks
    Zhang, Guowei
    Du, Jiayuan
    Yuan, Xiaowei
    Zhang, Kewei
    ELECTRONICS, 2024, 13 (17)
  • [8] Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection
    Zhou, Quan
    Zeng, Zhikang
    Wang, Kemeng
    Chen, Menglong
    CRYPTOGRAPHY, 2022, 6 (04)
  • [9] An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing
    Qiao, Yi
    Liu, Zhaobin
    Lv, Haoze
    Li, Minghui
    Huang, Zhiyi
    Li, Zhiyang
    Liu, Weijiang
    IEEE ACCESS, 2019, 7 : 136203 - 136213
  • [10] Differential Privacy-based Indoor Localization Privacy Protection in Edge Computing
    Zhang, Xuejun
    Chen, Qian
    Peng, Xiaohui
    Jiang, Xinlong
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 491 - 496