Encryption device, encrypted text conversion device, encryption program, encrypted text conversion program, encryption method, and encrypted text conversion method

一种加密装置、密文转换的技术,应用在安全通信装置、同态加密通信、编码/译码装置等方向,能够解决无法检测到等问题

Active Publication Date: 2018-08-31
MITSUBISHI ELECTRIC CORP
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In these methods, there are the following problems: as the first point, the same public key must be used to generate the ciphertext when performing the homomorphic operation; as the second point, since the encrypted state of the ciphertext before the homomorphic operation Therefore, even if the plaintext is changed by the homomorphic operation, it cannot be detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption device, encrypted text conversion device, encryption program, encrypted text conversion program, encryption method, and encrypted text conversion method
  • Encryption device, encrypted text conversion device, encryption program, encrypted text conversion program, encryption method, and encrypted text conversion method
  • Encryption device, encrypted text conversion device, encryption program, encrypted text conversion program, encryption method, and encrypted text conversion method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0044] Next, the key generation device 300 and the like will be described as follows.

[0045] (1) In Embodiment 1, there is a key generation device 300 that generates a pair of a public key pk and a decryption key sk (secret key). This key generation device 300 is referred to as the first key generation device 300 .

[0046] (2) The public key pk and the decryption key sk generated by the first key generation device 300 are referred to as the first public key pk and the first decryption key sk. In addition, it may also be described as a public key pk and a decryption key sk.

[0047] (3) In Embodiment 1, there is a post-homomorphic key generation device 400 that generates a pair of public key epk and decryption key esk (secret key). This homomorphic key generation device 400 is referred to as a second key generation device.

[0048] (4) The public key epk and the decryption key esk generated by the second key generation device are described as the second public key epk and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This encryption device (500) is provided with an encryption unit (504), a detection element generation unit (505), and a transmission unit (506). The encryption unit (504) encrypts plain text using one of two keys which form a pair, to generate an encrypted text in which the plain text is encrypted, and which is capable of being homomorphically calculated. The detection element generation unit (505) uses the one key and the encrypted text to generate a detection element E used to detect alterations of the encrypted text. The transmission unit (506) transmits the encrypted text and the detection element.

Description

technical field [0001] The present invention relates to homomorphic encryption. The present invention relates to an encryption device using homomorphic encryption, a ciphertext conversion device, an encryption program, a ciphertext conversion program, an encryption method, and a ciphertext conversion method. Background technique [0002] Usually, after data is encrypted, the internal data cannot be browsed or edited without decryption. Therefore, when editing data in multiple ciphertexts, it is necessary to decrypt once and take out The plaintext is used as data, then compiled and encrypted again. In contrast, in homomorphic encryption, internal data can be compiled in the state of ciphertext. The processing at this time is called a homomorphic operation, and the types of homomorphic operations that can be performed and the number of times of homomorphic operations vary depending on specific methods. [0003] As homomorphic encryption, ElGamal encryption and Pailier encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16G09C1/00
CPCG09C1/00H04L9/002H04L9/008H04L9/3073H04L9/0825
Inventor 川合丰平野贵人小关义博
Owner MITSUBISHI ELECTRIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products