首页 | 本学科首页   官方微博 | 高级检索  
     

基于同态加密和Bloom过滤器的云外包多方隐私集合比较协议
引用本文:张恩,金刚刚.基于同态加密和Bloom过滤器的云外包多方隐私集合比较协议[J].计算机应用,2018,38(8):2256-2260.
作者姓名:张恩  金刚刚
作者单位:河南师范大学 计算机与信息工程学院, 河南 新乡 453007
基金项目:国家自然科学基金资助项目(U1604156,61772176,61602158);河南省科技攻关计划项目(172102210045)。
摘    要:针对目前多方隐私集合比较(PSI)协议计算效率低下以及应用于云环境中会造成用户隐私信息泄露的问题,提出一种基于布隆过滤器(BF)和同态加密的云外包多方隐私集合比较协议。首先,协议中使用基于NTRU Cryptosystems的代理重加密算法将不同公钥加密的密文转换成相同公钥加密的密文,并将大量复杂的计算外包给云服务器;其次,借助BF计算复杂度低、空间利用率高和查询效率高的优点,提高协议运行过程中对信息加密、解密和查询的效率,在协议运行过程中用户仅需进行少量计算,无需交互且不必实时在线。理论分析及实验结果表明,新协议的计算复杂度和通信复杂度是线性的,可以在不泄露用户隐私信息的前提下计算出比较结果,满足现实应用的需求。

关 键 词:隐私集合比较  同态加密  代理重加密  云外包  布隆过滤器  
收稿时间:2018-01-10
修稿时间:2018-03-21

Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and Bloom filter
ZHANG En,JIN Ganggang.Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and Bloom filter[J].journal of Computer Applications,2018,38(8):2256-2260.
Authors:ZHANG En  JIN Ganggang
Affiliation:College of Computer and Information Engineering, Henan Normal University, Xinxiang Henan 453007, China
Abstract:Considering the low computing efficiency of current multiparty Private Set Intersection (PSI) protocol and the leakage of user private information when it is applied in the cloud environment, a cloud outsourcing multiparty PSI protocol based on Bloom Filter (BF) and homomorphic encryption was proposed. Firstly, the NTRU Cryptosystems-based proxy re-encryption algorithm was used in the protocol to convert ciphertexts encrypted with different public keys into ciphertexts encrypted with the same public keys, and a large amount of complicated computing was outsourced to a cloud server. Secondly, Bloom filter, characterized by its low computing complexity, high space utilization rate and great query efficiency, was used to improve the efficiency of information encrypting, decrypting and querying when the protocol was operated. The user only needs a small amount of computing during the operation of the protocol instead of taking interactions and staying online in real time. Theoretical analysis and experimental results show that the proposed protocol has linear computation and communication complexity, it can work out intersection results without leaking user private information, which meets the requirement of practical application.
Keywords:Private Set Intersection (PSI)                                                                                                                        homomorphic encryption                                                                                                                        proxy re-encryption                                                                                                                        cloud outsourcing                                                                                                                        Bloom Filter (BF)
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号