A two-party privacy preserving set intersection protocol against malicious users in cloud computing

2017 ◽  
Vol 54 ◽  
pp. 41-45 ◽  
Author(s):  
Xuefei Cao ◽  
Hui Li ◽  
Lanjun Dang ◽  
Yin Lin
2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Hongliang Zhu ◽  
Meiqi Chen ◽  
Maohua Sun ◽  
Xin Liao ◽  
Lei Hu

With the development of cloud computing, the advantages of low cost and high computation ability meet the demands of complicated computation of multimedia processing. Outsourcing computation of cloud could enable users with limited computing resources to store and process distributed multimedia application data without installing multimedia application software in local computer terminals, but the main problem is how to protect the security of user data in untrusted public cloud services. In recent years, the privacy-preserving outsourcing computation is one of the most common methods to solve the security problems of cloud computing. However, the existing computation cannot meet the needs for the large number of nodes and the dynamic topologies. In this paper, we introduce a novel privacy-preserving outsourcing computation method which combines GM homomorphic encryption scheme and Bloom filter together to solve this problem and propose a new privacy-preserving outsourcing set intersection computation protocol. Results show that the new protocol resolves the privacy-preserving outsourcing set intersection computation problem without increasing the complexity and the false positive probability. Besides, the number of participants, the size of input secret sets, and the online time of participants are not limited.


2012 ◽  
Vol 35 (11) ◽  
pp. 2215 ◽  
Author(s):  
Fang-Quan CHENG ◽  
Zhi-Yong PENG ◽  
Wei SONG ◽  
Shu-Lin WANG ◽  
Yi-Hui CUI

2019 ◽  
Vol 140-141 ◽  
pp. 38-60 ◽  
Author(s):  
Josep Domingo-Ferrer ◽  
Oriol Farràs ◽  
Jordi Ribes-González ◽  
David Sánchez

2017 ◽  
Vol 74 ◽  
pp. 76-85 ◽  
Author(s):  
Ping Li ◽  
Jin Li ◽  
Zhengan Huang ◽  
Tong Li ◽  
Chong-Zhi Gao ◽  
...  

2019 ◽  
Vol 127 ◽  
pp. 59-69 ◽  
Author(s):  
Hui Tian ◽  
Fulin Nan ◽  
Chin-Chen Chang ◽  
Yongfeng Huang ◽  
Jing Lu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document