Private data intersection method and system for transmitting trace data by one party

A privacy data and data party technology, applied in the field of data transmission, can solve problems such as limitation, inability to provide encrypted data to any third party, inability to attach meaningful application data, etc.

Pending Publication Date: 2022-01-18
百融至信(北京)科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application solves the problem that the prior art requires multiple communications and exchanges of encrypted data in the process of seeking for privacy by providing a private data interrogation method and system for one party to transmit a small amount of data, which cannot meet the requirements of certain application scenarios, and The data of the intersection operation is limited to one field, and cannot be accompanied by other meaningful application data technical problems. The client participating in the intersection operation only needs to provide a small amount of fixed-length data after the operation to the other server to obtain To get the final intersection, the server can add other application data to each record of the data set, so that the data set of one client does not flow out of the organization in any way, and the intersection of the two data sets and the additional data corresponding to the intersection can be obtained. The non-intersection part of the other server's data set will not be leaked to the requesting party, and the client cannot provide the server's encrypted data to any third-party technical effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private data intersection method and system for transmitting trace data by one party
  • Private data intersection method and system for transmitting trace data by one party
  • Private data intersection method and system for transmitting trace data by one party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Such as figure 1As shown, the embodiment of the present application provides a private data interrogation method for one party to transmit a small amount of data, wherein the method includes:

[0030] Step S100: obtaining the first encrypted data group and the second encrypted data group;

[0031] Such as figure 2 As shown, further speaking, wherein the obtaining of the first encrypted data group and the second encrypted data group, the step S100 of the embodiment of the present application also includes:

[0032] Step S110: Obtain a first random number according to the first requester;

[0033] Step S120: Obtain a second random number according to the first data source;

[0034] Step S130: obtaining a first encryption parameter through negotiation between the first requesting party and the first data party;

[0035] Step S140: Obtain the Key value field data set according to the first requester information;

[0036] Step S150: Generate the first encrypted data gr...

Embodiment 2

[0071] Based on the same inventive concept as the privacy data interrogation method for one party transmitting trace data in the foregoing embodiments, the present invention also provides a private data interrogation system for one party transmitting trace data, such as Figure 4 As shown, the system includes:

[0072] A first obtaining unit 11, the first obtaining unit 11 is configured to obtain a first encrypted data group and a second encrypted data group;

[0073] The second obtaining unit 12, the second obtaining unit 12 is used for the first requesting party to perform signature calculation according to the first encrypted data set, and obtain the first data signature;

[0074] A first generating unit 13, configured for the first data party to generate an encrypted Key value data set and a first encrypted key item by item according to the second encrypted data group and the first data signature;

[0075] The third obtaining unit 14, the third obtaining unit 14 is used f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy data intersection method and system for transmitting trace data by one party, and the method comprises the steps: generating an encryption Key value data set and a first encryption key one by one according to a second encryption data set and a first data stamp; encrypting additional data of the Key value data set to generate first encrypted additional data; solving a Key value intersection according to the first encrypted data set, the first data stamp and the encrypted Key value data set, and obtaining a first decryption key at the same time; and decrypting the intersection additional data in the first encrypted additional data according to the first decryption key to obtain a first additional plaintext corresponding to the Key value intersection. The technical problems that in the prior art, multiple times of communication and encrypted data exchange are needed in the intersection process, the requirements of some application scenes cannot be met, and data of intersection operation is limited to one field, and other meaningful application data cannot be attached are solved.

Description

technical field [0001] The invention relates to the field of data transmission, in particular to a method and a system for obtaining privacy data for one party to transmit a small amount of data. Background technique [0002] Private Set Intersect (PSI, Private Set Intersect) is a specific application problem in the field of secure multi-party computation. Through a series of underlying cryptography technologies and data exchange protocols, both parties (requester / Client, data party / Server) are allowed to use their own data to calculate the intersection of the data of both parties, and will not disclose any of their own data other than the intersection; The intersection information can be obtained by a certain participant (Client) or by all participants (Client, Server). [0003] However, in the process of realizing the technical solution of the invention in the embodiment of the present application, the inventor of the present application found that the above-mentioned tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 郭宏刚陈贺巍
Owner 百融至信(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products