{"title":"File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption","authors":"Bin Yu, Chen Zhang, Weihong Li","doi":"10.1145/3318299.3318392","DOIUrl":null,"url":null,"abstract":"With the rapid development of cloud computing and big data, users often outsource configuration files to the cloud for computing and matching to reduce the burden on the terminals. In order to prevent the leakage of privacy, this paper proposes a new privacy protection scheme based on a dual identity authentication and proxy homomorphic re-encryption private matching, and relies on two non-collusion cloud servers to complete the calculation and matching of attribute configuration files. The plaintext of the configuration file is invisible to both servers from start to finish. Even if the user colludes with one of the servers, they cannot decipher the properties file. The purpose of this is to prevent disguise by attackers and effectively protect personal privacy.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Machine Learning and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3318299.3318392","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
With the rapid development of cloud computing and big data, users often outsource configuration files to the cloud for computing and matching to reduce the burden on the terminals. In order to prevent the leakage of privacy, this paper proposes a new privacy protection scheme based on a dual identity authentication and proxy homomorphic re-encryption private matching, and relies on two non-collusion cloud servers to complete the calculation and matching of attribute configuration files. The plaintext of the configuration file is invisible to both servers from start to finish. Even if the user colludes with one of the servers, they cannot decipher the properties file. The purpose of this is to prevent disguise by attackers and effectively protect personal privacy.