Homomorphic encryption algorithm based on modulo-like operation

A technology of homomorphic encryption and modular operation, which is applied in the direction of homomorphic encryption communication, digital transmission system, electrical components, etc., can solve the problem of difficulty in ensuring data correctness, continuity of ciphertext, high complexity of fully homomorphic encryption algorithm and difficult practical application, Known problems such as poor resistance to plaintext attacks, to avoid leakage of plaintext information and algorithm structure, avoid consumption of computing resources, and improve execution efficiency

Active Publication Date: 2018-06-01
HOHAI UNIV
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The ideal lattice-based fully homomorphic encryption algorithm proposed by Craig Gentry is difficult to put into practical application due to its high complexity
Aldar C-F et al. proposed two algorithms based on homomorphic en

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic encryption algorithm based on modulo-like operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be specifically introduced below in conjunction with the accompanying drawings and specific embodiments.

[0018] A homomorphic encryption algorithm based on modular operations, comprising the following steps:

[0019] Step 1, system initialization: generating keys and selecting parameters;

[0020] The specific steps of generating the key are as follows: the trusted third party TTP selects two prime numbers p and q such that |p|≈|q|, discloses their product N=pq, N is the algorithm public key, and p is the algorithm private key.

[0021] The specific steps for selecting parameters are as follows: a 0 and b 0 The encryption parameter selected for the elementary encryption transformation, Range is the fluctuation range of the expected maximum value of the input plaintext, Range≥|X| max ; sign(x) is the positive and negative sign function; [Range-|x|] is the self-interference function.

[0022] Step 2, encryption operation: perform homomorph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a homomorphic encryption algorithm based on modulo-like oepration. The homomorphic encryption algorithm comprises following steps: step 1, system initialization: key generationand parameter selection; step 2, encryption operation: primary encryption transform and homomorphic encryption operation; and step 3, decryption operation: homomorphic decryption operation and primary encryption inverse transform. According to the homomorphic encryption algorithm, known plaintext attacks can be resisted, and the leakage of plaintext information and an algorithm structure can be effectively avoided; and a conventional random function is replaced by an interference function so that the consumption of computing resources caused by generation of random numbers is avoided, and theexecution efficiency of the algorithm on a cloud computing platform is effectively improved.

Description

technical field [0001] The invention relates to an encryption scheme with safe encryption and arithmetic homomorphism, in particular to a homomorphic encryption algorithm based on analogue operation. Background technique [0002] Most of the user data in the current cloud computing platform is stored in plain text. Once the content of the data block is stolen by a malicious attacker, the stored user data will be directly exposed, so there is a big data security problem. To solve the problem of data privacy protection, the most common method is to encrypt data. Homomorphic encryption technology can perform distributed parallel computing, query and index on encrypted data while implementing encryption. Therefore, in the cloud storage environment with broadly application foreground. The ideal lattice-based fully homomorphic encryption algorithm proposed by Craig Gentry is difficult to put into practical application due to its high complexity. Aldar C-F et al. proposed two alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
CPCH04L9/008
Inventor 吕鑫陈娟周思琪朱玉麒
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products