A Privacy-Preserving Graph Data Intersection Calculation Method
A technology of privacy protection and calculation method, which is applied in the field of graph data intersection calculation, and can solve problems such as the inability to guarantee user data privacy in cloud computing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] Specific embodiments of the present invention will be described in detail below in conjunction with technical solutions and accompanying drawings.
[0049] A privacy-protected graph data intersection calculation method, the steps are as follows:
[0050] Step 1: System initialization, performed by Alice. Alice generates a key pair for encryption and decryption by using the Paillier key generation algorithm, and makes the public key public. The specific steps are as follows:
[0051] Step 1.1: Alice selects the security parameter k, and executes the Paillier key generation algorithm (pk,sk)←KeyGen(1 k ). After the algorithm is executed, Alice obtains the public key pk and private key sk of the Paillier encryption system.
[0052] Step 1.2: Alice keeps the private key sk secretly and sends the public key pk to Bob.
[0053] Step 2: Alice represents all the points in the graph she holds as a polynomial, encrypts the coefficients of the polynomial, and finally sends the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com