Privacy Protection Based on Special Identifiers of Intersection Base Computing Technology

被引:0
|
作者
Zhang, Ping [1 ,2 ]
Ma, Tengfei [1 ]
Zhang, Qing [1 ]
Zhang, Ji [1 ,2 ]
Wang, Jiechang [3 ]
机构
[1] Henan Univ Sci & Technol, Sch Math & Stat, Luoyang 471023, Peoples R China
[2] Longmen Lab, Intelligent Syst Sci & Technol Innovat Ctr, Luoyang 471023, Peoples R China
[3] Zhengzhou Univ, Sports Big Data Ctr, Dept Phys Educ, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 02期
关键词
semi-homomorphic encryption; PSI; MPC; PSI-CA; DISJOINTNESS;
D O I
10.3390/app14020813
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA) are two cryptographic primitives whereby two or more parties are able to obtain the cardinalities of the intersection and the union of their respective private sets, and the privacy of their sets is preserved. In this paper, we propose a new privacy protection intersection cardinality protocol, which can quickly deal with set inequality and asymmetry problems and can obtain 100% correct results, and, in terms of efficiency, we are much faster than using the polynomial method. Our protocol adopts the Paillier addition homomorphic encryption scheme and applies the identifier guidance technology, using identifier determination, to the semi-homomorphic encryption ciphertext environment, excluding a large number of different options and quickly finding the base of the intersection of two sides.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Local privacy protection classification based on human-centric computing
    Yin, Chunyong
    Zhou, Biao
    Yin, Zhichao
    Wang, Jin
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [22] Privacy protection in social network data disclosure based on granular computing
    Wang, Da-Wei
    Liau, Churn-Jung
    Hsu, Tsan-sheng
    2006 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-5, 2006, : 997 - +
  • [23] A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing
    Wu, Junhua
    Feng, Wenzhen
    Liang, Guopeng
    Wang, Tiantian
    Li, Guangshun
    Zheng, Yuanwang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [24] Edge computing privacy protection method based on blockchain and federated learning
    Fang C.
    Guo Y.
    Wang Y.
    Hu Y.
    Ma J.
    Zhang H.
    Hu Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (11): : 28 - 40
  • [25] Data privacy protection model based on blockchain in mobile edge computing
    Wu, Junhua
    Bu, Xiangmei
    Li, Guangshun
    Tian, Guangwei
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (09): : 1671 - 1696
  • [26] Research of privacy protection in smart space model based on Pervasive Computing
    Jia, Zongpu
    Li, Gang
    Wang, Hongmei
    Fu, Caihong Huang
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 508 - 511
  • [27] Privacy protection for fog computing and the internet of things data based on blockchain
    Yanhui Liu
    Jianbiao Zhang
    Jing Zhan
    Cluster Computing, 2021, 24 : 1331 - 1345
  • [28] Security and privacy protection protocol based on edge computing in smart campus
    Liang, Jing
    Gong, Yan
    EXPERT SYSTEMS, 2025, 42 (01)
  • [29] Trajectory Privacy Protection Method Based on Location Service in Fog Computing
    Li, Guangshun
    Yin, Yanmin
    Wu, Junhua
    Zhao, Shuaishuai
    Lin, Dandan
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 463 - 467
  • [30] A Homomorphic Encryption and Privacy Protection Method Based on Blockchain and Edge Computing
    Yan, Xiaoyan
    Wu, Qilin
    Sun, Youming
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020