Identity-based and hidden matrix-constructed fully homomorphic encryption method

A fully homomorphic encryption and secret matrix technology, applied in the field of information security, can solve the problem of indistinguishable encryption, and achieve the effect of saving time and space cost

Inactive Publication Date: 2016-09-07
CHONGQING UNIV
View PDF2 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] 3) The encryption of the 0 element is indistinguishable from the encryption of other elements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based and hidden matrix-constructed fully homomorphic encryption method
  • Identity-based and hidden matrix-constructed fully homomorphic encryption method
  • Identity-based and hidden matrix-constructed fully homomorphic encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Use lowercase letters to represent vectors, all vectors default to column vectors, such as a, and the transpose (row vector) of vector a is represented as a t , the i-th element of vector a is denoted as a i . Matrices are represented by capital letters, such as M n × m , the i-th column of the matrix is ​​denoted as M i , the transpose of matrix A is expressed as A T . Represents the ring of integers in n-dimensional modulo q.

[0050] The algorithm flow designed by the present invention is specifically as follows, firstly construct an identity-based encryption scheme LIBE on a grid:

[0051] parameter generation algorithm randomly generated matrix secret invertible matrix Trapdoor flag matrix Convert the ID representing the user's identity to a fixed-length finite ring using a hash function

[0052] Trapdoor Generation Algorithm output master key (trapdoor T) and parameters m=2nl, there is P·mk=SG here;

[0053] Key generation algorithm LIBE....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based and hidden matrix-constructed fully homomorphic encryption method. The method includes the following steps of: parameter generation; trap door generation; key generation; encryption; decryption; and homomorphic operation. The security of a traditional public key encryption method is threatened under a quantum computer environment. The method of the invention can resist the attack of a quantum computer based on solving shortest vector problems in lattices. According to the method of the invention, user identity is directly adopted as a public key, and homomorphic operation can be performed on cipher text information.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity-based fully homomorphic encryption method. Background technique [0002] The 21st century is an era of rapid development of information technology, and the birth and application of quantum computers is only a matter of time. Under the threat of quantum computers, traditional public key encryption schemes such as RSA, ElGamal, and ECC will no longer be safe. Cryptographers around the world have begun to study post-quantum cryptography to resist attacks from future quantum computers. The present invention is based on the problem of lattice difficulty, has the ability to resist quantum computer attacks, and mainly involves two major cryptosystems: [0003] Identity-based encryption (IBE): In order to simplify the management of public key certificates, Shamir creatively proposed the concept of identity-based encryption. In this public key encryption mechan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32
CPCH04L9/008H04L9/0847H04L9/3236
Inventor 张单琦蔡斌胡胜健傅海军桑军向宏
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products