Full homomorphic encryption method based on random unitary matrix in outsourcing calculation

A fully homomorphic encryption, unitary matrix technology, applied in the direction of homomorphic encryption communication, secure communication device, digital transmission system, etc. The effect of reducing the amount of calculation and improving security

Active Publication Date: 2018-11-06
HUBEI UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is a certain probability like the example, not only does not have the correct result, but also fails to pass the integrity verification problem
resulting in the embarrassment of uncertain calculation results
In other words, the calculation results lose their deterministic value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full homomorphic encryption method based on random unitary matrix in outsourcing calculation
  • Full homomorphic encryption method based on random unitary matrix in outsourcing calculation
  • Full homomorphic encryption method based on random unitary matrix in outsourcing calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to facilitate the understanding and implementation of the present invention by those of ordinary skill in the art, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are only used to illustrate and explain the present invention, but not to limit it. this invention.

[0028] The application scenario of this embodiment is outsourced computing, assuming that a user has a set of data {P i}={P 1(r×t) ,P 2(t×t) ,P 3(t×t) , (P 4(t×t)}, a computing task f 1 ({P i})=P 1 P 2 ÷(P 3 +P 4 ), where P i The superscript indicates the number of rows and columns of the matrix, such as P 1(r×t) , which means P 1 is an (r×t) matrix. The user gives the safety target G, and the safety parameter λ under the target. Suppose the user chooses an Internet cloud server, such as figure 1 , the fully homomorphic encryption method based on ran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a full homomorphic encryption method based on random unitary matrix in outsourcing calculation. The method has the full homomorphic encryption feature, also can be applied to non-integer field calculation, and has the integrity verification feature of a full-number field. Compared with the classical cryptography scheme, which can only be applied to integer fields. The method can be applied to any number field that can be operated by any matrix, including real numbers, complex numbers, etc. Compared with existing encryption methods of the same type, the scheme not only has full homomorphism, but also does not introduce ill-conditioned condition number to post-encryption calculation as a unitary matrix is adopted. The method is suitable for any matrix encryption; as the homomorphism is good, the method is especially suitable for independent computing and encryption applications, such as outsourcing computing.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to an encryption method, in particular to a symmetric key homomorphic encryption method based on a random unitary matrix in outsourcing computing, which is applied to the field of computing outsourcing. Background technique [0002] With the increasing popularity of mobile devices and the increasing popularity of Internet services, computing outsourcing has created a strong demand for homomorphic encryption methods. For example, in outsourcing computing services, on the surface, based on the sharing economy, outsourcing computing has achieved a good win-win result between the customer and the service provider. But in fact, customers will lose all sensitive information in the data in the process of outsourcing computing, especially when the network is not trusted, or the service provider is not trusted, or the server computing environment is not trusted. A theoretically go...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/008
Inventor 陈永辉张明武谢海涛舒红章袁金龙
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products