Vector and matrix operation-based calculation-supported encryption method

An encryption method and a matrix operation technology, applied in the computer field, can solve the problems of using experience discount, the complex calculation amount of the fully homomorphic scheme, etc.

Inactive Publication Date: 2012-01-11
XI AN JIAOTONG UNIV
View PDF0 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing fully homomorphic schemes are too complicated and the amount of calculation is too large, and they are not suitable for application in the cloud computing environment.
[0006] According to the above analysis, we found that: (i) there is no encryption scheme that can support the retrieval of character strings and the arithmetic operations of numerical data (including integers and floating point numbers) at the same time; (ii) the fuzzy retrieval of encrypted strings is a (iii) The arithmetic operation of encrypted numerical data has always been a challenge in the field of cryptography; (iv) Some existing schemes often require the data owner to be in the data Do a lot of preparatory work before outsourcing, which will greatly reduce the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vector and matrix operation-based calculation-supported encryption method
  • Vector and matrix operation-based calculation-supported encryption method
  • Vector and matrix operation-based calculation-supported encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation examples.

[0093] The framework of the encryption method CESVMC (computable encryption scheme based on vector and matrix calculations) based on vector and matrix calculations of the present invention is as follows: figure 1shown. The scheme first constructs a vector composed of calculation element groups and random element groups, and obtains encrypted vectors through operations with encrypted matrices, thereby converting the original data into a vector, which makes it indistinguishable and indistinguishable by introducing random numbers. It cannot be deciphered in polynomial time; secondly, in the process of string fuzzy matching, the difference between the distance between the outsourced string and the retrieval parameter is used to achieve sorting and fuzzy query, and the attacker cannot get the outsourced string and the The dist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vector and matrix operation-based calculation-supported encryption method, which comprises the following steps: 1. converting initial data into a vector and encrypting the vector by using an encryption matrix so as to obtain an encrypted outsourcing vector; 2. converting a calculation parameter into a vector and encrypting the vector by using the encryption matrix so as to obtain an encrypted calculation parameter vector; 3. carrying out operations, such as scalar product, addition, subtraction and multiplication, on the encrypted outsourcing vector and the encrypted calculation parameter vector so as to obtain an encrypted calculation result; and 4. obtaining the plaintext of the calculation result through carrying out an operation on the encryption matrix and the encrypted calculation result by a user. According to the method provided by the invention, an encryption scheme with IND-COA security is always used for the encryption of data or the operation of encrypted data, thus the function of protecting personal privacy is exerted; and meanwhile, the method has excellent operating performance in the fuzzy retrieval of encrypted character strings, excellent calculation performance for service providers and a moderate storage and communication load.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a data encryption method supporting calculation. Background technique [0002] Cloud computing provides users with on-demand, scalable, and quality-of-service computing and storage resources in the form of services, and users can use these resources anytime and anywhere only through Internet devices. Faced with such powerful advantages of cloud computing, individuals and businesses are hesitant to migrate from personal computers or corporate data centers to cloud environments. The main reason is that people worry about losing control over data and computing. The current incidents of cloud service providers leaking and losing user data have confirmed people's concerns: in 2009, due to software defects in Google's Docs, user data was accessed by unauthorized users, and data leakage occurred; in 2008 In 2007, the cloud storage service provider MediaMax lost 45% of user data due t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/60
Inventor 桂小林黄汝维余思庄威刘阳林建材
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products