Confidential statistical data sharing method and system based on set operation

A technology of statistical data and set operation, applied in the field of information security, it can solve problems such as leakage of intersection elements and achieve the effect of traffic optimization

Active Publication Date: 2020-11-24
SHANDONG UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventors found that in business scenarios such as insurance, medical care, and credit reporting with high privacy requirements, it is not allowed...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confidential statistical data sharing method and system based on set operation
  • Confidential statistical data sharing method and system based on set operation
  • Confidential statistical data sharing method and system based on set operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Such as image 3 As shown, the present embodiment provides a confidential statistical data sharing method based on set operations, which includes:

[0071] Step 1: One party communicating with confidential statistical data uses cuckoo hash to map its input set X to a hash table, and the other party communicating with confidential statistical data uses common hash to place each element in its input set Y into hash table all possible positions in the Greek table;

[0072] Step 2: Use the shared membership test method to judge whether the elements in the input set of one party of communication belong to the input set of the other party of communication, and obtain the shared calculation result;

[0073] Step 3: Based on the shared calculation results, calculate the statistical information about the set X and Y operations, and use the dazed random function to transmit the corresponding set statistical information between the communication parties sharing the confidential s...

Embodiment 2

[0106] This embodiment provides a confidential statistical data sharing system based on set operations, which includes:

[0107] The communication party sharing confidential statistical data uses cuckoo hash to map its input set X into a hash table;

[0108] The other party to the communication of confidential statistical data sharing, which uses ordinary hashing to place each element of its input set Y into all possible positions in the hash table;

[0109] The communicating parties for confidential statistics sharing are configured as:

[0110] Use the shared membership test method to judge whether the elements in the input set belong to the input set of the other party in communication, obtain the shared calculation result, and then calculate the statistical information about the operation of the set X and Y;

[0111] Transferring ensemble statistics using dazed random functions.

[0112] Among them, the protocol communication complexity of set X and set Y is equal.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security, and provides a confidential statistical data sharing method and system based on set operation. The confidential statistical data sharing method based on set operation comprises the following steps that of a communication party sharing confidential statistical data mapping an input set X of the communication party into a hash table by utilizing valley hash, placing each element in the input set Y into all possible positions in a hash table by the other party of the secret statistical data sharing communication by using common hash; judging whether elements in the input set of one communication party belong to the input set of the other communication party or not by utilizing a shared member test method to obtain a shared calculation result; and based on a shared calculation result, calculating statistical information about set X and Y operations, and transmitting the corresponding set statistical information between two communication parties sharing the secret statistical data by utilizing a luxury random function.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method and system for sharing confidential statistical data based on set operations. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] At present, it has become an objective demand to serve government decision-making and improve service quality by sharing isolated data scattered among multiple agencies and mining the potential value contained in it. However, in many scenarios, data holders often have privacy requirements, and the data to be shared usually contains certain commercial value, so data holders do not want to reveal the plaintext information of the data they hold. Moreover, laws and regulations on data security at home and abroad, such as the European GDPR and the entry into force of domestic encryption laws, have put...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/606
Inventor 蒋瀚徐秋亮宋祥福蔺国强汪达安许继月
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products