Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Outsourcing encrypted data-orientated verifiable intersection operation method and system

An operation method and a technology for encrypting data, which are applied in digital transmission systems, transmission systems, user identity/authority verification, etc., and can solve problems such as the lack of verifiable intersection operation methods for outsourced encrypted data.

Active Publication Date: 2016-07-27
NORTHEASTERN UNIV
View PDF5 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In addition, currently outsourced computing based on verifiable computing has not been able to satisfy the verifiable intersection operation method for outsourced encrypted data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing encrypted data-orientated verifiable intersection operation method and system
  • Outsourcing encrypted data-orientated verifiable intersection operation method and system
  • Outsourcing encrypted data-orientated verifiable intersection operation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0073] The verifiable intersection operation method for outsourced encrypted data in this embodiment, such as figure 1 As shown, it is performed between a trusted third-party entity, namely TTP, at least two client entities, namely Alice and Bob, and an outsourced server-side entity, namely Server.

[0074] Trusted Third Party (TrustedThirdParty, TTP): the generator of public parameters. Among all entities, the third-party entity TTP is trusted and is responsible for the initialization of public parameters of all entities in the entire method. After initializing the public parameters, the public parameters Sent to outsourced server and two client entities.

[0075] Client Alice and Bob: the holder of the data set and the requester of the intersection operation of the data set, Alice and Bob are semi-trusted, they both want to know th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an outsourcing encrypted data-orientated verifiable intersection operation method and system and belongs to the verifiable outsourcing computation field. The method is carried out among a third-party trusted entity, at least two client entities and an outsourcing server side; the client entities are holders of data sets and requesters of data set intersection operation; the third-party entity is mainly responsible for the initialization and distribution of common parameters; the two client entities are mainly responsible for generating keys, encrypting data sets, calculating authentication information, verifying results and proofs returned by the outsourcing server side and decrypting an ciphertext data set returned by the outsourcing server side; the outsourcing server side is mainly responsible for performing data set intersection operation; and a plaintext data set is not required to be obtained through decryption when the outsourcing server side performs intersection operation, and the outsourcing server performs operation on a ciphertext, and therefore, the privacy of user data can be ensured. The method and system have the advantages of low frequency of interaction among the entities, low communication cost and efficient correctness verification of operation results.

Description

Technical field [0001] The invention belongs to the field of verifiable outsourcing computing, in particular to a verifiable intersection operation method and system for outsourcing encrypted data. Background technique [0002] With the rapid development of computer technology and cloud computing, a new data management model has emerged: outsourced data. There are three main entities in the outsourced data model: the data owner, the data service provider (that is, the outsourced server), and the data query requester. The data owner outsources the data to the data service provider. Since the data service provider can adopt technologies such as cluster application, grid technology or distributed file system, it can provide efficient data query service for the data query requester. However, data owners store data on untrusted third-party outsourced servers, increasing the insecurity of data resources. [0003] Following the outsourcing of data, due to the imbalance of computi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3249H04L63/123H04L63/126
Inventor 周福才李福祥徐紫枫陈春雨王爽
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products