Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods and encryption nodes for encrypting messages

An encryption scheme and node technology, applied in homomorphic encrypted communication, public key and key distribution of secure communication, can solve the problems of complexity, time-consuming, and inability to use encryption operations, and achieve high throughput and increase throughput. Effect

Inactive Publication Date: 2020-11-10
TELEFON AB LM ERICSSON (PUBL)
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] However, there is a problem that cryptographic operations using the above-mentioned Paillier cryptosystem involve rather complex and time-consuming computations, which may not be applicable in situations where high data throughput is required for certain analytical operations
In this case, the Paillier cryptosystem may not be able to encrypt incoming data streams with a high enough throughput to become a bottleneck for applications requiring high data throughput

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and encryption nodes for encrypting messages
  • Methods and encryption nodes for encrypting messages
  • Methods and encryption nodes for encrypting messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In short, a solution is provided to enable more rapid encryption of messages to be processed, for example, in potentially insecure or untrusted environments where privacy and integrity may be compromised (such as when when using a cloud that shares processing resources). In this solution, as will be described in more detail in this paper, as the encryption of the incoming message from the client, a precomputed noise factor is used to compute the ciphertext, thus achieving higher message throughput. This solution can be used in cryptosystems that basically use a noise factor that is the result of a fixed integer raised to a random power modulo another fixed integer (eg according to scheme 3 of the Paillier cryptosystem). Computation of such noise factors is usually very complex and time-consuming, which often limits the throughput of message encryption. Therefore, in this solution, the calculation of these noise factors is pre-performed, and new noise factors for messa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and encryption node (300) for providing encryption of a message m according to a selected encryption scheme. A set of k noise factors is precomputed (3:1) by the encryption node (300) in advance according to the random number and the predefined integer parameters of the selected encryption scheme. These k noise factors are saved (300a) for use in encrypting message m when requested (3:2) later by the client (302). A subset of (3:3) l noise factors is then selected from the precomputed set of k noise factors and used as input to the encryption scheme when encrypting (3:5) message m by computing the ciphertext c, The ciphertext c is transmitted (3:6) as an encrypted message to eg a client (302). Consequently, less time is spent calculating the necessary noise factors after receipt of an encryption request, and thus a higher throughput of messages to be encrypted can be achieved. In particular, this solution can be used to increase the throughput of message streams.

Description

technical field [0001] The present disclosure generally relates to methods and encryption nodes for providing encryption of messages. Background technique [0002] In the field of data processing and analysis, customers such as different companies, businesses, organizations, and institutions require hardware and software resources to perform various data processing operations, for example, when analyzing information of various records related to users to extract knowledge and statistics therefrom This is the case with data. The processing involved in such data analysis can be quite complex and computationally intensive, requiring considerable capacity to perform the data processing. [0003] Traditionally, customers themselves may own and maintain all the resources they need for data processing, but this can be quite expensive and time-consuming. For example, it usually takes considerable knowledge and skill to first figure out what types of resources are needed, and then ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/304H04L63/0471H04L9/008H04L9/0618H04L9/08H04L9/30
Inventor 克里斯汀·约斯特哈·拉姆亚历山大·马克西莫夫
Owner TELEFON AB LM ERICSSON (PUBL)