Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Fully Homomorphic Encryption Method Based on Random Unitary Matrix in Outsourced Computing

A fully homomorphic encryption and unitary matrix technology, applied in homomorphic encryption communication, secure communication devices, digital transmission systems, etc., can solve the problems of uncertain calculation results, no correct results, and loss of deterministic value of calculation results, etc., to achieve Effects of improving security and reducing calculation load

Active Publication Date: 2020-12-18
HUBEI UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is a certain probability like the example, not only does not have the correct result, but also fails to pass the integrity verification problem
resulting in the embarrassment of uncertain calculation results
In other words, the calculation results lose their deterministic value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fully Homomorphic Encryption Method Based on Random Unitary Matrix in Outsourced Computing
  • A Fully Homomorphic Encryption Method Based on Random Unitary Matrix in Outsourced Computing
  • A Fully Homomorphic Encryption Method Based on Random Unitary Matrix in Outsourced Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0028] The application scenario of this embodiment is outsourcing computing, assuming that a certain user has a set of data {P i}={P 1(r×t) ,P 2(t×t) ,P 3(t×t) ,(P 4(t×t)}, a computational task f 1 ({P i}) = P 1 P 2 ÷(P 3 +P 4 ), where P i The subscript indicates the number of rows and columns of the matrix, such as P 1(r×t) , indicating that P 1 is an (r×t) matrix. The user gives a security goal G and a security parameter λ under the goal. Suppose the user chooses the Internet cloud server, such as figure 1 , a fully homomorphic encryption met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a full homomorphic encryption method based on random unitary matrix in outsourcing calculation. The method has the full homomorphic encryption feature, also can be applied to non-integer field calculation, and has the integrity verification feature of a full-number field. Compared with the classical cryptography scheme, which can only be applied to integer fields. The method can be applied to any number field that can be operated by any matrix, including real numbers, complex numbers, etc. Compared with existing encryption methods of the same type, the scheme not only has full homomorphism, but also does not introduce ill-conditioned condition number to post-encryption calculation as a unitary matrix is adopted. The method is suitable for any matrix encryption; as the homomorphism is good, the method is especially suitable for independent computing and encryption applications, such as outsourcing computing.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to an encryption method, in particular to a random unitary matrix-based symmetric key homomorphic encryption method in outsourcing calculations, which is applied to the field of outsourcing calculations. Background technique [0002] Mobile devices are becoming more and more popular, and Internet services are also becoming more and more popular. Computing outsourcing business has a strong demand for homomorphic encryption methods. For example, in outsourcing computing services, on the surface, based on the sharing economy, outsourcing computing has achieved a good win-win result between customers and service providers. But in fact, customers will lose all sensitive information in the data during outsourcing computing, especially when the network is untrustworthy, the service provider is untrustworthy, or the server computing environment is untrustworthy. Theoretically goo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/008
Inventor 陈永辉张明武谢海涛舒红章袁金龙
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products