{"title":"基于安全认证和代理同态重加密的文件匹配","authors":"Bin Yu, Chen Zhang, Weihong Li","doi":"10.1145/3318299.3318392","DOIUrl":null,"url":null,"abstract":"With the rapid development of cloud computing and big data, users often outsource configuration files to the cloud for computing and matching to reduce the burden on the terminals. In order to prevent the leakage of privacy, this paper proposes a new privacy protection scheme based on a dual identity authentication and proxy homomorphic re-encryption private matching, and relies on two non-collusion cloud servers to complete the calculation and matching of attribute configuration files. The plaintext of the configuration file is invisible to both servers from start to finish. Even if the user colludes with one of the servers, they cannot decipher the properties file. The purpose of this is to prevent disguise by attackers and effectively protect personal privacy.","PeriodicalId":164987,"journal":{"name":"International Conference on Machine Learning and Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption\",\"authors\":\"Bin Yu, Chen Zhang, Weihong Li\",\"doi\":\"10.1145/3318299.3318392\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of cloud computing and big data, users often outsource configuration files to the cloud for computing and matching to reduce the burden on the terminals. In order to prevent the leakage of privacy, this paper proposes a new privacy protection scheme based on a dual identity authentication and proxy homomorphic re-encryption private matching, and relies on two non-collusion cloud servers to complete the calculation and matching of attribute configuration files. The plaintext of the configuration file is invisible to both servers from start to finish. Even if the user colludes with one of the servers, they cannot decipher the properties file. The purpose of this is to prevent disguise by attackers and effectively protect personal privacy.\",\"PeriodicalId\":164987,\"journal\":{\"name\":\"International Conference on Machine Learning and Computing\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Machine Learning and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3318299.3318392\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Machine Learning and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3318299.3318392","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption
With the rapid development of cloud computing and big data, users often outsource configuration files to the cloud for computing and matching to reduce the burden on the terminals. In order to prevent the leakage of privacy, this paper proposes a new privacy protection scheme based on a dual identity authentication and proxy homomorphic re-encryption private matching, and relies on two non-collusion cloud servers to complete the calculation and matching of attribute configuration files. The plaintext of the configuration file is invisible to both servers from start to finish. Even if the user colludes with one of the servers, they cannot decipher the properties file. The purpose of this is to prevent disguise by attackers and effectively protect personal privacy.