[go: up one dir, main page]

TWI456966B - Method for providing social network service using privacy homomorphism cryptography - Google Patents

Method for providing social network service using privacy homomorphism cryptography Download PDF

Info

Publication number
TWI456966B
TWI456966B TW100102087A TW100102087A TWI456966B TW I456966 B TWI456966 B TW I456966B TW 100102087 A TW100102087 A TW 100102087A TW 100102087 A TW100102087 A TW 100102087A TW I456966 B TWI456966 B TW I456966B
Authority
TW
Taiwan
Prior art keywords
user
activity
ciphertext
specific
server
Prior art date
Application number
TW100102087A
Other languages
Chinese (zh)
Other versions
TW201233113A (en
Inventor
Hao Ting Liao
Original Assignee
Acer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acer Inc filed Critical Acer Inc
Priority to TW100102087A priority Critical patent/TWI456966B/en
Priority to CN201110045029.8A priority patent/CN102611678B/en
Publication of TW201233113A publication Critical patent/TW201233113A/en
Application granted granted Critical
Publication of TWI456966B publication Critical patent/TWI456966B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Claims (12)

一種利用隱私同態加密(privacy homomorphism cryptography)來提供社交網路服務(social network service,SNS)之方法,其包含:一第一用戶利用一第一行動裝置發出一活動邀約至一伺服器,其中該活動邀約包含相關於一活動之各項資訊;在收到該活動邀約後,該伺服器利用一公共密鑰對相關於該活動之各項資訊進行一特定加密,接著對加密後之該各項資料進行一第一特定運算以得到一相對應之第一密文,再將該第一密文透過一基地台發送;在收到該第一密文後,一第二用戶利用一第二行動裝置發出一加密認證回覆至該伺服器以表明接受該活動邀約;在收到該加密認證回覆後,該伺服器利用該公共密鑰對該第二用戶之私人資料進行該特定加密,接著對該第二用戶之加密私人資料進行一第二特定運算以得到一相對應之第二密文,再將該第二密文透過該基地台發送至該第一行動裝置,其中該特定加密、該第一特定運算和該第二特定運算係符合該隱私同態加密之特性;以及在收到該第二密文後,該第一用戶依據該隱私同態加密 之特性解出一相對應之運算結果,再利用一第一私人密鑰對該運算結果進行隱私同態解密以得到該第二用戶之私人資料。 A method for providing a social network service (SNS) by using a privacy homomorphism cryptography, comprising: a first user using a first mobile device to send an activity offer to a server, wherein The event invitation includes information related to an event; after receiving the invitation, the server uses a public key to perform a specific encryption on the information related to the activity, and then encrypts each of the information. The item data is subjected to a first specific operation to obtain a corresponding first ciphertext, and the first ciphertext is sent through a base station; after receiving the first ciphertext, a second user utilizes a second The mobile device sends an encrypted authentication reply to the server to indicate acceptance of the activity offer; after receiving the encrypted authentication reply, the server uses the public key to perform the specific encryption on the second user's private data, and then The second user's encrypted private data is subjected to a second specific operation to obtain a corresponding second ciphertext, and the second ciphertext is sent to the first ciphertext through the base station. Mobile device, wherein the specific encryption, the first and the second specific operation in line with the characteristics of the particular operation based homomorphic encryption of the privacy; and after receiving the second ciphertext, the first user according to the privacy homomorphic encryption The feature solves a corresponding operation result, and then uses a first private key to perform a privacy homomorphic decryption on the operation result to obtain the private data of the second user. 如請求項1所述之方法,其另包含:該第一用戶向該伺服器要求該第一私人密鑰以取得使用該社交網路服務之權限。 The method of claim 1, further comprising: the first user requesting the first private key from the server to obtain the right to use the social network service. 如請求項1所述之方法,其中發出該加密認證回覆係允許該第一用戶讀取該第二用戶之私人資料。 The method of claim 1, wherein issuing the encrypted authentication reply allows the first user to read the private data of the second user. 如請求項1所述之方法,其中該活動邀約另包含要求該活動之參與者必須提供特定私人資料或允許將該第一用戶之特定私人資料提供給該活動之參與者。 The method of claim 1, wherein the activity offer further comprises a participant requesting the activity to provide a particular private profile or to provide the first user's particular private profile to the participant of the activity. 一種利用隱私同態加密來提供社交網路服務之方法,其包含:一第一用戶利用一第一行動裝置發出一活動邀約至一伺服器,其中該活動邀約包含相關於一活動之各項資訊;在收到該活動邀約後,該伺服器利用一公共密鑰對相關於該活動之各項資訊進行一特定加密,接著對加密後之該各項資料進行一第一特定運算以得到一相對 應之第一密文,再將該第一密文透過一基地台發送;在收到該第一密文後,一第二用戶利用一私人密鑰對該第一密文進行隱私同態解密以得到一運算結果,再利用該第二行動裝置傳送該運算結果至該伺服器以查詢相關於該活動之各項資訊,並在決定參與該活動後發出一加密認證回覆至該伺服器以表明接受該活動邀約;以及在收到該加密認證回覆後,該伺服器利用該公共密鑰對該第二用戶之私人資料進行該特定加密,接著對該第二用戶之加密私人資料進行一第二特定運算以得到一相對應之第二密文,再將該第二密文透過該基地台發送至該第一行動裝置,其中該特定加密、該第一特定運算和該第二特定運算係符合該隱私同態加密之特性。 A method for providing a social network service by using privacy homomorphic encryption, comprising: a first user using a first mobile device to send an activity invitation to a server, wherein the activity invitation includes information related to an activity After receiving the invitation of the activity, the server uses a public key to perform a specific encryption on the information related to the activity, and then performs a first specific operation on the encrypted data to obtain a relative In response to the first ciphertext, the first ciphertext is sent through a base station; after receiving the first ciphertext, a second user uses a private key to perform privacy homomorphic decryption on the first ciphertext To obtain an operation result, the second mobile device is used to transmit the operation result to the server to query various information related to the activity, and after deciding to participate in the activity, an encrypted authentication reply is sent to the server to indicate Accepting the activity offer; and after receiving the encrypted authentication reply, the server uses the public key to perform the specific encryption on the second user's private data, and then performs a second on the second user's encrypted private data. Performing a specific operation to obtain a corresponding second ciphertext, and transmitting the second ciphertext to the first mobile device through the base station, wherein the specific encryption, the first specific operation, and the second specific operation are consistent This privacy is a feature of homomorphic encryption. 如請求項5所述之方法,其另包含:該第二用戶向該伺服器要求該私人密鑰以取得使用該社交網路服務之權限。 The method of claim 5, further comprising: the second user requesting the private key from the server to obtain the right to use the social network service. 如請求項5所述之方法,其中發出該加密認證回覆係允許該第一用戶讀取該第二用戶之私人資料。 The method of claim 5, wherein the issuing the encrypted authentication reply allows the first user to read the private data of the second user. 如請求項5所述之方法,其中該活動邀約另包含要求該 活動之參與者必須提供特定私人資料或允許將該第一用戶之特定私人資料提供給該活動之參與者。 The method of claim 5, wherein the activity invitation further comprises requesting the Participants in the event must provide specific personal information or allow the first user's specific private information to be provided to the participants of the activity. 一種利用隱私同態加密來提供社交網路服務之方法,其包含:一第一用戶利用一第一行動裝置發出一活動邀約至一伺服器,其中該活動邀約包含相關於一活動之各項資訊;在收到該活動邀約後,該伺服器利用一公共密鑰對相關於該活動之各項資訊進行一特定加密,接著對加密後之該各項資料進行一第一特定運算以得到一相對應之第一密文,再將該第一密文透過一基地台發送;在收到該第一密文後,一第二用戶利用一第二行動裝置發出一加密認證回覆至該伺服器以表明接受該活動邀約;以及在收到該加密認證回覆後,該伺服器利用該公共密鑰對該第二用戶之私人資料進行該特定加密,接著對該第二用戶之加密私人資料進行一第二特定運算以得到一相對應之第二密文以及對該第一用戶之加密私人資料進行一第三特定運算以得到一相對應之第三密文,再將該第二密文透過該基地台發送至該第一行動裝置以及將該第三密文透過該基地台發送至該第二行動裝置,其中該特定加密、該第一特定運算、 該第二特定運算和該第三特定運算係符合該隱私同態加密之特性。 A method for providing a social network service by using privacy homomorphic encryption, comprising: a first user using a first mobile device to send an activity invitation to a server, wherein the activity invitation includes information related to an activity After receiving the invitation of the activity, the server uses a public key to perform a specific encryption on the information related to the activity, and then performs a first specific operation on the encrypted data to obtain a phase. Corresponding to the first ciphertext, the first ciphertext is sent through a base station; after receiving the first ciphertext, a second user sends an encrypted authentication reply to the server by using a second mobile device. Demonstrating acceptance of the activity offer; and after receiving the encrypted authentication reply, the server uses the public key to perform the specific encryption on the second user's private data, and then perform a second encryption on the second user's private data. a specific operation to obtain a corresponding second ciphertext and performing a third specific operation on the encrypted private data of the first user to obtain a corresponding third ciphertext, and then The second ciphertext transmitted through the base station to the first mobile device and the third ciphertext is transmitted to the base station through the second mobile device, wherein the specific encryption, the first specific operation, The second specific operation and the third specific operation are consistent with the characteristics of the privacy homomorphic encryption. 如請求項9所述之方法,其另包含:在收到該第三密文後,該第二用戶依據該隱私同態加密之特性解出一相對應之運算結果,再利用一第二私人密鑰對該第三密文進行隱私同態解密以得到該第一用戶之私人資料。 The method of claim 9, further comprising: after receiving the third ciphertext, the second user solves a corresponding operation result according to the characteristic of the privacy homomorphic encryption, and then uses a second private The key performs a privacy homomorphic decryption on the third ciphertext to obtain the private data of the first user. 如請求項9所述之方法,其中發出該加密認證回覆係允許該第一用戶讀取該第二用戶之私人資料。 The method of claim 9, wherein the issuing the encrypted authentication reply allows the first user to read the private data of the second user. 如請求項9所述之方法,其中該活動邀約另包含要求該活動之參與者必須提供特定私人資料或允許將該第一用戶之特定私人資料提供給該活動之參與者。The method of claim 9, wherein the activity offer further comprises a participant requesting the activity to provide a particular private profile or to provide the first user's particular private profile to the participant of the activity.
TW100102087A 2011-01-20 2011-01-20 Method for providing social network service using privacy homomorphism cryptography TWI456966B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW100102087A TWI456966B (en) 2011-01-20 2011-01-20 Method for providing social network service using privacy homomorphism cryptography
CN201110045029.8A CN102611678B (en) 2011-01-20 2011-02-24 Method for providing social network service by using privacy homomorphic encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100102087A TWI456966B (en) 2011-01-20 2011-01-20 Method for providing social network service using privacy homomorphism cryptography

Publications (2)

Publication Number Publication Date
TW201233113A TW201233113A (en) 2012-08-01
TWI456966B true TWI456966B (en) 2014-10-11

Family

ID=46528834

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100102087A TWI456966B (en) 2011-01-20 2011-01-20 Method for providing social network service using privacy homomorphism cryptography

Country Status (2)

Country Link
CN (1) CN102611678B (en)
TW (1) TWI456966B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970143B (en) * 2012-12-13 2015-04-22 中国科学技术大学苏州研究院 Method for securely computing index of sum of held data of both parties by adopting addition homomorphic encryption
CN104796475B (en) * 2015-04-24 2018-10-26 苏州大学 A kind of socialization recommendation method based on homomorphic cryptography
CN110213219A (en) * 2018-12-06 2019-09-06 上海腾桥信息技术有限公司 A kind of data safety shared system and method
CN110348231B (en) * 2019-06-18 2020-08-14 阿里巴巴集团控股有限公司 Data homomorphic encryption and decryption method and device for realizing privacy protection
US10778410B2 (en) 2019-06-18 2020-09-15 Alibaba Group Holding Limited Homomorphic data encryption method and apparatus for implementing privacy protection

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200939714A (en) * 2008-03-14 2009-09-16 Ind Tech Res Inst Method and apparatuses for network society associating

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212889A1 (en) * 2002-05-13 2003-11-13 Khieu Andrew K. Method and system for exchanging data over networks using public key encryption
KR100520116B1 (en) * 2003-05-16 2005-10-10 삼성전자주식회사 A method for discributing the key to mutual nodes to code a key on mobile ad-hoc network and network device using thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200939714A (en) * 2008-03-14 2009-09-16 Ind Tech Res Inst Method and apparatuses for network society associating

Also Published As

Publication number Publication date
CN102611678A (en) 2012-07-25
TW201233113A (en) 2012-08-01
CN102611678B (en) 2015-04-15

Similar Documents

Publication Publication Date Title
CN102170357B (en) Combined secret key dynamic security management system
Li et al. Privacy-preserving distributed profile matching in proximity-based mobile social networks
CN105871869B (en) Hash function and false identity anonymous bidirectional authentication method are based in mobile social networking
CN106301788B (en) A kind of group key management method for supporting user identity authentication
JP2015508541A5 (en)
MY203124A (en) Wireless network connection method and apparatus, and storage medium
JP2004166270A5 (en)
CN102299797A (en) Authentication method, key distribution method and authentication and key distribution method
JP2015144495A5 (en)
CN103795737B (en) Based on the privacy matching process exchanging encryption in social networkies
Mohaien et al. Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
CN105812349B (en) A method of asymmetric key distribution and message encryption based on identity information
TW201409990A (en) Communication method utilizing fingerprint information for authentication
TWI456966B (en) Method for providing social network service using privacy homomorphism cryptography
US10623177B2 (en) Online identification and authentication
JP2015537483A (en) Drawing management system and drawing management method by fingerprint authentication
CN110932854A (en) Block chain key distribution system and method for Internet of things
ATE485565T1 (en) SECURE LOGIN PROTOCOL
CN103124215A (en) Self-certifying method with time marks
CN101282216A (en) Three-party key exchange method based on password authentication with privacy protection
CN111159766A (en) An online car-hailing service method, system and storage medium with privacy protection
CN105471657A (en) Method, device and system for managing inter-domain communication log of virtual machine
CN105825383B (en) The generating random number and verification method that both sides participate in
JP2009303188A5 (en)
CN110191469A (en) A certificate-based wireless body area network group authentication and key agreement method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees