Privacy protection type attribute matching method based on symmetrical encryption

A technology for attribute matching and privacy protection, applied in the field of matching

Active Publication Date: 2015-03-25
RUN TECH CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These limitations limit the application of matching methods related to secure multi-party computation to preserve privacy in practical systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection type attribute matching method based on symmetrical encryption
  • Privacy protection type attribute matching method based on symmetrical encryption
  • Privacy protection type attribute matching method based on symmetrical encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0035] Such as figure 1 Shown: In order to be able to resist man-in-the-middle attacks and matching result spoofing attacks without any trusted third party, and to effectively save computing and communication overhead, the present invention performs privacy-preserving attribute matching in social networks based on symmetric keys And secure channel establishment method, use the public attribute shared between users to generate a key, use the key to encrypt the connection establishment request and secure channel key, and use symmetric encryption to significantly reduce computing overhead, so as to meet various social needs The network responds to the needs of user privacy protection and computational efficiency. Therefore, the method for attribute matching includes the following steps:

[0036] Step 1. Each user v in the social network k Both create a file A w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a privacy protection type attribute matching method based on symmetrical encryption. According to the method, a secret key is generated by means of common attributes naturally shared by matched users, an establish request and a secure channel secret key are connected through the secret key in an encryption mode, and only the matched users can generate the same secret key, decrypt a message conveniently and obtain a channel secret key; in this way, privacy protection type attribute matching and secure channel establishment are achieved synchronously through one round of communication, accurate and fuzzy matching / searching can be achieved, any privacy information can not be obtained by a participant with a similarity degree lower than the threshold value, an established secure channel can resist man-in-the-middle attack, and meanwhile, the attribute matching mechanism is verifiable so that matching result cheating attack can be resisted. Compared with most existing methods depending on an asymmetric encryption system and a trusted third party, the method has the advantages that calculation cost and communication cost are reduced greatly, calculated amount is small, practicality is high, flexibility is high, and the lightweight purpose is realized.

Description

technical field [0001] The invention relates to a matching method, in particular to a privacy-protecting attribute matching method based on symmetric encryption, which belongs to the technical field of privacy protection. Background technique [0002] Attributes are often used in information systems to label and search data objects or entities in the system. Attribute-based matching is used in various network systems, such as content distribution systems, information sharing systems, medical systems, and social networking systems. The basic mode is that the initiator gives the attribute description of the target object, and through the matching / search function of the system, the initiator returns the object whose attribute similarity with the described object exceeds a certain threshold. In many systems, the attribute is the privacy of the data owner, such as the illness and medical history of users in the medical system, personal information in social networks, etc. Recen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/1408H04L63/1491
Inventor 张兰李向阳刘克彬
Owner RUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products