Paillier encryption method based on cloud computing platform

A cloud computing platform and encryption method technology, applied in the field of information security, can solve problems such as speeding up the operation efficiency of Paillier encryption

Active Publication Date: 2018-03-09
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to solve the above-mentioned problems of the traditional Paillier encryption algorithm, provide a safe and efficient Paillier encryption method realized through cloud outsourcing, and aim at the situation that multiple plaintexts need to be encrypted by Paillier at the same time, while ensuring that private information is not leaked In the case of using the modular expone...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Paillier encryption method based on cloud computing platform
  • Paillier encryption method based on cloud computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The above solution will be further described below in conjunction with specific embodiments. It should be understood that these examples are used to illustrate the present invention and not to limit the scope of the present invention. The implementation conditions used in the examples can be further adjusted according to the conditions of specific manufacturers, and the implementation conditions not indicated are usually the conditions in routine experiments.

[0048] The secure cloud outsourced Paillier encryption algorithm idea of ​​this embodiment is as follows: Steps 1 to 4, in order to use the secure outsourced modular exponentiation scheme, so that users can obtain the result of the modular exponentiation operation while ensuring that private data is not leaked, thereby speeding up the Paillier encryption speed.

[0049] Step 1: The encryptor randomly selects a random number set R of the same number according to the number of plaintexts, and then uses the plainte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Paillier encryption method based on a cloud computing platform and belongs to the field of information security. The method is characterized in that Paillier encryption security is outsourced to a cloud server by adopting a security outsourcing algorithm based on modular exponentiation operation, so that a Paillier encryption person can protect encrypted information frombeing leaked, and Paillier encryption is efficiently carried out by utilizing computing power of the cloud server. The Paillier encryption method provided by the invention is applicable to security outsourcing and Paillier encryption in a cloud computing environment and is especially applicable to the situation that a user hopes to complete an encryption process by utilizing the cloud server andthe encrypted data cannot be leaked to the cloud server.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a Paillier encryption method based on a cloud computing platform, in particular to a Paillier encryption method based on a cloud computing platform that outsources the encryption process security cloud to a cloud server. Background technique [0002] Paillier encryption algorithm [P.Paillier, "Public-key cryptosystems based on composite degree residuosity classes", 1999] is an encryption system based on high-order residual class problems proposed by Paillier in 1999. It has the characteristics of partial homomorphism and is a widely used public key. Encryption Algorithm. The specific steps are as follows: [0003] 1) Generation of public-private key pair: randomly select large prime numbers p and q, set n=pq, λ(n)=lcm(p-1,q-1), and define the function L(n)=(n-1) / n. Then randomly take g∈(Z / n 2 Z) * Make it satisfy gcd(L(g λ modn 2 ))=1. where lcm and gcd re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/0442
Inventor 朱友文王健一王箭庄锦城
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products