Privacy Protection Based on Special Identifiers of Intersection Base Computing Technology

被引:0
|
作者
Zhang, Ping [1 ,2 ]
Ma, Tengfei [1 ]
Zhang, Qing [1 ]
Zhang, Ji [1 ,2 ]
Wang, Jiechang [3 ]
机构
[1] Henan Univ Sci & Technol, Sch Math & Stat, Luoyang 471023, Peoples R China
[2] Longmen Lab, Intelligent Syst Sci & Technol Innovat Ctr, Luoyang 471023, Peoples R China
[3] Zhengzhou Univ, Sports Big Data Ctr, Dept Phys Educ, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 02期
关键词
semi-homomorphic encryption; PSI; MPC; PSI-CA; DISJOINTNESS;
D O I
10.3390/app14020813
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA) are two cryptographic primitives whereby two or more parties are able to obtain the cardinalities of the intersection and the union of their respective private sets, and the privacy of their sets is preserved. In this paper, we propose a new privacy protection intersection cardinality protocol, which can quickly deal with set inequality and asymmetry problems and can obtain 100% correct results, and, in terms of efficiency, we are much faster than using the polynomial method. Our protocol adopts the Paillier addition homomorphic encryption scheme and applies the identifier guidance technology, using identifier determination, to the semi-homomorphic encryption ciphertext environment, excluding a large number of different options and quickly finding the base of the intersection of two sides.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Outsourcing shortest distance computing with privacy protection
    Jun Gao
    Jeffrey Xu Yu
    Ruoming Jin
    Jiashuai Zhou
    Tengjiao Wang
    Dongqing Yang
    The VLDB Journal, 2013, 22 : 543 - 559
  • [42] Outsourcing shortest distance computing with privacy protection
    Gao, Jun
    Yu, Jeffrey Xu
    Jin, Ruoming
    Zhou, Jiashuai
    Wang, Tengjiao
    Yang, Dongqing
    VLDB JOURNAL, 2013, 22 (04): : 543 - 559
  • [43] Privacy protection mechanism in grid computing environment
    Li, MC
    Yao, HY
    Guo, C
    Zhang, N
    EC2ND 2005, PROCEEDINGS, 2006, : 33 - +
  • [44] ROBUST AND PRIVACY PROTECTION AUTHENTICATION IN CLOUD COMPUTING
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    Liaw, Horng-Twu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4247 - 4261
  • [45] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [46] Special Section on Privacy Computing: Principles and Applications
    Chen, Jinjun
    Yang, Laurence
    INFORMATION SCIENCES, 2020, 527 : 293 - 293
  • [47] A historical probability based noise generation strategy for privacy protection in cloud computing
    Zhang, Gaofeng
    Yang, Yun
    Chen, Jinjun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1374 - 1381
  • [48] Data Loss and Reconstruction of Location Differential Privacy Protection Based on Edge Computing
    Jing, Weipeng
    Miao, Qiucheng
    Song, Houbing
    Chen, Xuebin
    IEEE ACCESS, 2019, 7 : 75890 - 75900
  • [49] A Survey: Computing Models of Artificial Intelligence Privacy Protection Based on Cryptographic Techniques
    Tian H.-B.
    Liang X.-Q.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (08): : 2260 - 2276
  • [50] Wind power prediction method based on cloud computing and data privacy protection
    Zhang, Lei
    Zhu, Shaoming
    Su, Shen
    Chen, Xiaofeng
    Yang, Yan
    Zhou, Bing
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):