Sum and product computing method for protecting data privacy security of arbitrary user group
A data privacy and user group technology, applied in the direction of public keys for secure communication, etc., can solve the problems of limited computing power and storage capacity, high space complexity, and unavailability of personal computing platforms
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0073] The specific implementation manner of the present invention will be further described below in conjunction with the drawings and embodiments. The following examples are only used to illustrate the present invention, but not to limit the scope of the present invention.
[0074] Such as figure 1 As shown in , the sum and product calculation method based on the polynomial interpolation algorithm provided in this embodiment to protect the data privacy security of any user group mainly includes steps:
[0075] S1. System initialization: specify a security parameter κ, and generate a corresponding integer group and system public key according to the security parameter κ;
[0076] S2. Generate user private keys: Participants in the user group independently calculate private keys, so that the product of these private keys is equivalent to one after the modulo operation;
[0077] S3. Key generation: Combine the system public key and the user private key to generate a sum key a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com