Precision control and accumulated error eliminating method applied to fully homomorphic encryption
A homomorphic encryption and precision control technology, applied in the field of information security, can solve problems such as loss of precision, simultaneous operation support function volume expansion, adverse effects of network storage and transmission, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] Such as figure 1 , figure 2 , image 3 and Figure 4 As shown, the present invention can be implemented in various ways corresponding to different demand environments and application scenarios, including: USBKey implementation, API implementation, SDK implementation, chip implementation, expansion card implementation, special equipment implementation, etc. Any implementation method includes: client and server. The steps of a typical homomorphic encryption operation process are as follows:
[0076] 1) The client invokes the locally stored key to encrypt sensitive plaintext data and obtain the ciphertext;
[0077] 2) The client sends the ciphertext and calculation requirements to the server, and the key is kept on the client;
[0078] 3) The server calls the corresponding operation support function family, and uses the homomorphic operation function to perform the required operation on the ciphertext uploaded by the client, and then returns the ciphertext of the oper...
Embodiment 2
[0136] Such as figure 1 , figure 2 , image 3 and Figure 5 As shown, the polynomial fully homomorphic encryption method based on coefficient mapping transformation, including its precision control and cumulative error elimination method, specifically includes the following steps:
[0137] Step S1: Split the plaintext;
[0138] The accuracy problem of homomorphic operation of single-pass ciphertext is mainly due to the approximate operation characteristics of the original scheme of the polynomial fully homomorphic encryption method based on coefficient mapping transformation, in which the higher the sampling density of the operation support function is, the higher the operation accuracy is, but At the same time, the volume of computing support functions will expand rapidly, which will have adverse effects on network storage and transmission. However, if the density is too low, the operation accuracy cannot even meet the single operation requirements of the ciphertext with...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com