Scalable-ot-based privacy set intersection method and device

A privacy and collection technology, applied in the field of information processing, can solve the problems of increasing the amount of calculation for secure intersection and reducing the calculation efficiency, and achieve the effect of reducing the amount of calculation, simplifying the calculation process, and improving the calculation efficiency.

Pending Publication Date: 2022-01-21
百保上海科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when solving the hash collision problem in the security intersection schemes such as the OT method in the prior art, it is necessary to repeat the entire calculation process many times to obtain the intersection result, which greatly increases the calculation amount of the security intersection and reduces the computational efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scalable-ot-based privacy set intersection method and device
  • Scalable-ot-based privacy set intersection method and device
  • Scalable-ot-based privacy set intersection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] The embodiment of the present invention provides a scalable-ot-based privacy set intersection method, which can avoid repeating the entire calculation process multiple times during the intersection calculation, greatly reduces the calculation amount of intersection calculation, and improves calculation efficiency , making the whole calculation process more concise.

[0046] The privacy set intersection method based on scalable-ot provided by the embodiment of the present invention mainly involves two or more parties. Taking two parties as an example, refer to figure 2 and 3 As shown, the privacy set intersection method based on scalable-ot mainly includes a client (client) and a server (server). Specifically, the scalable-ot-based privacy set intersection method provided by the embodiment of the present invention includes the following steps:

[0047] S1: The first data party uses the first hash algorithm to calculate the current first data to be processed, and obtai...

Embodiment 2

[0068] Corresponding to the above-mentioned first embodiment, the present invention also provides a scalable-ot-based privacy set intersection device, wherein, in this embodiment, for the same or similar content as the above-mentioned first embodiment, you can refer to the above introduction, and follow-up No longer. refer to Figure 4 The device includes:

[0069] The first calculation module is used for the first data party to use the first hash algorithm to calculate the current first data to be processed, and obtain the first calculation result;

[0070] A conflict judging module, configured to judge whether there is a hash conflict between the first calculation result and all the currently generated first hash tables;

[0071] A data storage module, configured to generate a new first hash table to store the current first data to be processed when there is a hash conflict between the first calculation result and all currently generated first hash tables;

[0072] The se...

Embodiment 3

[0082] Corresponding to the first and second embodiments above, the present invention also provides a computer device, including: a processor and a memory, the memory stores a computer program that can run on the processor, and when the computer program is executed by the processor, the above-mentioned A scalable-ot-based privacy set intersection method provided by any embodiment.

[0083] in, Figure 5 A computer device is exemplarily shown, and may specifically include a processor 1510 , a video display adapter 1511 , a disk drive 1512 , an input / output interface 1513 , a network interface 1514 , and a memory 1520 . The processor 1510 , video display adapter 1511 , disk drive 1512 , input / output interface 1513 , network interface 1514 , and the memory 1520 can be communicatively connected through a communication bus 1530 .

[0084] Wherein, the processor 1510 may be implemented by a general-purpose CPU (Central Processing Unit, central processing unit), a microprocessor, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a scalable-ot-based privacy set intersection method and device, and the method comprises the steps that: a first data party calculates current first to-be-processed data through employing a first Hash algorithm, obtains a first calculation result, and judges whether the first calculation result has a Hash conflict with all currently generated first Hash tables or not; if the first calculation result has the Hash conflict with all currently generated first Hash tables, a new first hash table is generated to store the current first to-be-processed data; and the steps are repeated until all the first to-be-processed data are calculated, a second data party calculates second to-be-processed data through a second hash algorithm, a second hash table is generated according to an obtained second calculation result, intersection data of all the first to-be-processed data and the second to-be-processed data is calculated according to all the first hash tables and the second hash tables, and a privacy intersection is generated according to the intersection data. The situation that the intersection result is obtained by repeating the whole calculation process for many times can be avoided, the calculation amount of intersection is greatly reduced, the calculation efficiency is improved, and the whole calculation process is more concise.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to a scalable-ot-based privacy set intersection method and device. Background technique [0002] With the rapid development of the Internet in our country, all walks of life have accumulated a large amount of user data. Among these data, there are many data related to the user's personal privacy, such as the user's consumption habits, the user's medical records, and the user's loan repayment information. At the same time, in recent years, the government has also introduced corresponding laws and regulations to protect the personal privacy of citizens. [0003] In order to protect personal privacy and security, and legally combine various data accumulated in various industries for modeling and query, federated learning, differential privacy, multi-party secure computing and other technical fields that protect data security and personal privacy are more recent. It has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/901
CPCG06F21/6245G06F16/9014
Inventor 李雪峰梁亮
Owner 百保上海科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products