Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Privacy-Preserving Graph Data Intersection Calculation Method

A technology of privacy protection and calculation method, which is applied in the field of graph data intersection calculation, and can solve problems such as the inability to guarantee user data privacy in cloud computing

Active Publication Date: 2020-06-05
NORTHEASTERN UNIV LIAONING
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, there are many problems in security and privacy protection in the related research based on graph data intersection computing, and the data privacy of users in cloud computing cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Privacy-Preserving Graph Data Intersection Calculation Method
  • A Privacy-Preserving Graph Data Intersection Calculation Method
  • A Privacy-Preserving Graph Data Intersection Calculation Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Specific embodiments of the present invention will be described in detail below in conjunction with technical solutions and accompanying drawings.

[0049] A privacy-protected graph data intersection calculation method, the steps are as follows:

[0050] Step 1: System initialization, performed by Alice. Alice generates a key pair for encryption and decryption by using the Paillier key generation algorithm, and makes the public key public. The specific steps are as follows:

[0051] Step 1.1: Alice selects the security parameter k, and executes the Paillier key generation algorithm (pk,sk)←KeyGen(1 k ). After the algorithm is executed, Alice obtains the public key pk and private key sk of the Paillier encryption system.

[0052] Step 1.2: Alice keeps the private key sk secretly and sends the public key pk to Bob.

[0053] Step 2: Alice represents all the points in the graph she holds as a polynomial, encrypts the coefficients of the polynomial, and finally sends the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of graph data intersection calculation, and proposes a privacy-protecting graph data intersection calculation method. The graph data intersection calculation is completed between the two entities, and the privacy of the graph data of both parties is protected during the calculation process; the Paillier encryption system is used in the protocol to realize homomorphic addition and homomorphic multiplication on the ciphertext; the protocol has high computational efficiency and less information leakage. The present invention can safely outsource its dense state graph structure to an untrusted cloud server without losing the ability to query it. You can make full use of the storage services provided by the cloud server, and at the same time safely hand over the query operation to the server for execution, which can ensure that the server cannot obtain effective information as much as possible during the interaction process.

Description

technical field [0001] The invention belongs to the field of graph data intersection calculation, and in particular relates to a privacy-protected graph data intersection calculation method. Background technique [0002] Graph structured data and graph data processing have continuously received more and more research and attention in recent years. In recent years, many application fields have begun to convert traditional data into a graph structure for storage, and use graph operations to help solve many computing problems, including social networks, bioinformatics, communication networks, and transportation networks. For example, webpage data can be naturally represented and stored as graph-structured data, where static webpages are represented as points in the graph and links between webpages are represented as edges in the graph. Afterwards, by using a variety of different graph operations, it can help solve many web data calculation problems, including web search, web d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00G06F21/62G06F21/60
CPCG06F21/602G06F21/6227H04L9/008
Inventor 周福才徐紫枫李宇溪秦诗悦
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products