Privacy Protection Based on Special Identifiers of Intersection Base Computing Technology

被引:0
|
作者
Zhang, Ping [1 ,2 ]
Ma, Tengfei [1 ]
Zhang, Qing [1 ]
Zhang, Ji [1 ,2 ]
Wang, Jiechang [3 ]
机构
[1] Henan Univ Sci & Technol, Sch Math & Stat, Luoyang 471023, Peoples R China
[2] Longmen Lab, Intelligent Syst Sci & Technol Innovat Ctr, Luoyang 471023, Peoples R China
[3] Zhengzhou Univ, Sports Big Data Ctr, Dept Phys Educ, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 02期
关键词
semi-homomorphic encryption; PSI; MPC; PSI-CA; DISJOINTNESS;
D O I
10.3390/app14020813
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA) are two cryptographic primitives whereby two or more parties are able to obtain the cardinalities of the intersection and the union of their respective private sets, and the privacy of their sets is preserved. In this paper, we propose a new privacy protection intersection cardinality protocol, which can quickly deal with set inequality and asymmetry problems and can obtain 100% correct results, and, in terms of efficiency, we are much faster than using the polynomial method. Our protocol adopts the Paillier addition homomorphic encryption scheme and applies the identifier guidance technology, using identifier determination, to the semi-homomorphic encryption ciphertext environment, excluding a large number of different options and quickly finding the base of the intersection of two sides.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Privacy protection for fog computing and the internet of things data based on blockchain
    Liu, Yanhui
    Zhang, Jianbiao
    Zhan, Jing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1331 - 1345
  • [32] A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing
    Huang, Liang
    Lee, Hyung-Hyo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [33] Data Security and Privacy Protection in Pervasive Computing Environments J.UCS Special Issue
    Koh, Byoung-Soo
    Denko, Mieso
    Gritzalis, Stefanos
    Hsu, Ching-Hsien
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (05) : 967 - 969
  • [34] Personal Privacy Protection Framework Based on Hidden Technology for Smartphones
    Hong, Shuangxi
    Liu, Chuanchang
    Ren, Bingfei
    Huang, Yuze
    Chen, Junliang
    IEEE ACCESS, 2017, 5 : 6515 - 6526
  • [35] Data Privacy Protection Based on Unsupervised Learning and Blockchain Technology
    Zhao, Jian’E
    Zhu, Jianjun
    International Journal of Network Security, 2024, 26 (02) : 312 - 320
  • [36] The Key Technology Research on Privacy Protection Based on Big Data
    Li, Xueguo
    Shen, Yinglan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT), 2016, 57 : 204 - 209
  • [37] Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology
    Han, Ya
    Gao, Jianbo
    Guan, Zhi
    Chen, Zhong
    Ren, Lifeng
    PROCEEDINGS OF 2023 5TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2023, 2023, : 15 - 22
  • [38] Reusable Pseudonym Privacy Protection in Pervasive Computing
    Guo, Yimin
    Guo, Yajun
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2, 2011, 105 : 201 - 205
  • [39] Privacy protection by typing in ubiquitous computing systems
    Siewe, Francois
    Yang, Hongji
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 120 : 133 - 153
  • [40] In Search of User Privacy Protection in Ubiquitous Computing
    Cleveland, Simon
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 694 - 699