Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Circulant matrix transformation based and ciphertext computation supportive encryption method

A technology of cyclic matrix and encryption method, which is applied in the direction of digital transmission system, electrical components, transmission system, etc., and can solve the problems of high complexity, complex calculation amount and large calculation amount of fully homomorphic scheme

Inactive Publication Date: 2014-03-26
XI AN JIAOTONG UNIV
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are some homomorphic encryption algorithms, such as unpadded RSA, Paillier, etc., but they only support one of the homomorphic operations of addition and multiplication
In 2009, Gentry first designed a fully homomorphic encryption scheme based on ideal lattices. Later, Dijk, Smart and others improved Gentry's scheme to make it more realistic, but these fully homomorphic schemes are too complicated and The amount of calculation is too large to be applied to cloud computing
[0005] According to the above analysis, we found that: (i) currently there is no encryption scheme that can fully support arithmetic operations (four mixed operations) on numerical data (including integers and floating point numbers); (ii) some existing schemes are highly complex , large amount of calculation, not suitable for cloud computing environment; (iii) the arithmetic operation of encrypted numerical data has always been a challenge for the field of cryptography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Circulant matrix transformation based and ciphertext computation supportive encryption method
  • Circulant matrix transformation based and ciphertext computation supportive encryption method
  • Circulant matrix transformation based and ciphertext computation supportive encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention is an encryption method based on cyclic matrix transformation that supports ciphertext calculation (English full name: Computable Encryption Scheme based on Cycle Matrix; abbreviation: CESCM), which mainly includes encryption of original data, encryption of calculation parameters, and arithmetic operation of encryption matrix 1. Four steps of decrypting the encrypted operation results. The implementation steps of CESCM are described in detail below:

[0029] Step 1. Encryption of the original data: convert the original data into a vector, then convert the vector into a circular matrix, and encrypt it through the key matrix to obtain an encrypted outsourcing matrix;

[0030] Step one specifically includes the following steps:

[0031] Let the original data P 1 is a rational number.

[0032] (1) will P 1 random decomposition into vector r 1 =(a 1 ,a 2 ,...,a n ) T , where n represents the dimension of the vector, a i (i=1,2,3...n) is random ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a circulant matrix transformation based and ciphertext computation supportive encryption method. The method includes the steps: firstly, encrypting original data by means of converting the original data into vectors, then converting the vectors into a circulant matrix and encrypting through a key matrix to obtain an encrypted outsourcing matrix; secondly, encrypting computational parameters by means of converting the computational parameters into vectors, then converting the vectors into a circulant matrix and encrypting through a key matrix to obtain an encrypted computational parameter matrix; thirdly, performing arithmetic operation of an encrypting matrix to obtain an encrypted operation result; fourthly, decrypting the encrypted operation result through the key matrix to obtain a circulant matrix, and then selecting one line / column of the circulant matrix to be added to obtain a plaintext of the operation result. The method is particularly suitable for outsourcing storage and computation of confidential data in a cloud computing environment, and can be used for protecting the confidential data of persons or enterprises; the method is supportive to four-rule hybrid operation of infinite addition, subtraction, multiplication and division of encrypted numerical data.

Description

【Technical field】 [0001] The invention relates to the technical field of data encryption, in particular to an encryption method based on cyclic matrix transformation and supporting ciphertext calculation. 【Background technique】 [0002] As an emerging technology, cloud computing provides users with on-demand, scalable computing requests and storage services in the form of services by bringing together a large number of computing resources, mainly including virtualization technology and distributed storage technology. Users only need to use the network anytime and anywhere to use these services. However, users are unwilling to store personal data in cloud computing services. The main reason is that users worry about losing control over data and computing. Outsourcing data to cloud computing services may lead to sensitive data being leaked, misused, and lost. ; If the application program is run in the cloud computing service, the program may be stolen or tampered with, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/08
Inventor 桂小林林建财余思杨攀杨建伟李子彦
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products