A privacy protection processing method based on modulus component homomorphism

A technology of privacy protection and processing methods, applied in the field of trusted computing, can solve problems such as data leakage, user-side privacy threats, etc., and achieve the effect of fast computing speed

Active Publication Date: 2019-03-29
中共中央办公厅电子科技学院 +1
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the limitation of this method is that the multi-terminal privacy protection processing method must have multiple cloud servers working at the same time to complete the entire calculation, and if data leakage occurs at the same time on multiple cloud servers, the privacy of the user terminal will also be affected. threaten

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection processing method based on modulus component homomorphism
  • A privacy protection processing method based on modulus component homomorphism
  • A privacy protection processing method based on modulus component homomorphism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] Such as figure 1 As shown, in the present invention, the client uses the original information to perform modular operations on a group of bases, inserts the obtained modular components into redundant information, and then sends them to the server. The server cannot distinguish which are real modular components and which is redundant information. Due to the homomorphism of modular operations (addition, subtraction, multiplication), the operation on the modular components is equivalent to the operation on the original information. After obtaining the calculation results, the server side obtains the feedback results according to the Chinese remainder theorem, and the user terminal receives the feedback results. The effective information is taken out, and the final server-side calculation result is obtained through calculation. A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection processing method based on modulus component homomorphism. The user end performs modulo operation on a group of bases by using original information, insertsthe obtained modulus component into redundant information, and then sends the obtained modulus component to the server end. The server end is unable to distinguish which is the real modulus componentand which is the redundant information. Because the modular operation (addition, subtraction, multiplication) has homomorphism, the operation of the modular component is equivalent to the operation of the original information. After obtaining the calculation result, the server obtains the feedback result according to the Chinese Remainder Theorem, and the client obtains the effective informationafter receiving the feedback result, and obtains the final calculation result of the server through calculation. Although the whole process server cannot get the original data, but the operation of the original data is realized, so even if the server reveals all the information, it will not pose a threat to the original information and its calculation results, and the privacy protection of the original data is realized.

Description

technical field [0001] The invention belongs to the field of trusted computing, and proposes a privacy protection processing method based on modular component homomorphism, which realizes that a server end performs privacy protection processing on original data without obtaining original information. The method is easy to realize by software, and the invention can be widely applied to visual media data blind computing, trusted cloud computing, and homomorphic processing. Background technique [0002] Cloud computing is a new type of network service that relies on the cloud platform. Its outsourcing service model and the security risks of the cloud platform itself have caused users' trust issues. The credibility of cloud computing has become the biggest concern for users' business migration to the cloud. How to build Safe and reliable cloud services have become one of the hot spots in the research field in recent years. With the development of the mobile Internet, more and mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 李晓东于浩洋金鑫孙红波吴传强
Owner 中共中央办公厅电子科技学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products