Publication Type
Patent
Version
publishedVersion
Publication Date
6-2015
Abstract
Determining if a first encrypted data of a first data value is equal to a second encrypted data of a second data value. Comprising: a first cyclic group; a second cyclic group including a first element. Applying an operation to the first cyclic group to map its elements to an element in the second cyclic group. Randomly selecting a second element from the first cyclic group; producing the first encrypted data by mapping the second element and the first data value into one or more elements of the first cyclic group. Randomly selecting a third element from the first cyclic group; producing the second encrypted data by mapping the third element and the second data value into one or more elements of the first cyclic group. Applying the operation to the first encrypted data and the second encrypted data to obtain a fourth element in the second cyclic group, wherein the fourth element is equal to the first element when the first data value is equal to the second data value.
Discipline
Databases and Information Systems | Information Security
First Page
1
Last Page
32
Publisher
WIPO
Citation
PANG, Hwee Hwa and DING, Xuhua.
Method for matching probabilistic encrypted data. (2015). 1-32.
Available at: https://ink.library.smu.edu.sg/sis_research/3710
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.