Unlock instant, AI-driven research and patent intelligence for your innovation.

An all-homomorphic encryption method and system based on data transformation

A fully homomorphic encryption and data transformation technology, applied in the field of data processing, can solve the problem of a single type of ciphertext data calculation, and achieve the effect of ensuring correctness and good security

Active Publication Date: 2019-01-11
浙江大数据交易中心有限公司
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a fully homomorphic encryption method and system based on data transformation, to solve the problem that the existing fully homomorphic encryption algorithm can only support simple algebraic calculations such as addition, subtraction and multiplication, and the encrypted ciphertext data calculation A single type of problem, to achieve a fully homomorphic encryption method that supports algebraic calculations such as addition, subtraction, multiplication, and division, as well as basic function calculations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An all-homomorphic encryption method and system based on data transformation
  • An all-homomorphic encryption method and system based on data transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Such as figure 1 As shown, Embodiment 1 of the present invention discloses a fully homomorphic encryption method based on data transformation, including the following steps:

[0054] S101, generate rule function F(x), F(x)=x*H, wherein H=Q*A*Q -1 , Q is an invertible square matrix of order n, Q -1 is the inverse matrix of matrix Q, and A is a diagonal matrix of order n r i The value of is 0 or 1, and there exists at least one i such that r i =0, i represents an integer between 1 and n, that is, 1≤i≤n.

[0055] This rule function transforms plaintext data, that is, real numbers, into a matrix through the function of the reversible square matrix Q, the inverse matrix of Q, and the diagonal matrix A, because the matrix has the advantages of fast calculation speed and high security. And in this rule function, Q only needs to take a reversible square matrix, and can take countless values, and the diagonal matrix A has 2 n -2 possible values, so when n is large, there ...

Embodiment 2

[0067] Such as figure 2 As shown, Embodiment 2 of the present invention discloses a fully homomorphic encryption system based on data transformation, including:

[0068] Rule function construction module 201, for constructing rule function F(x), F(x)=x*H, wherein H=Q*A*Q -1 , Q is an invertible square matrix of order n, Q -1 is the inverse matrix of matrix Q, and A is a diagonal matrix of order n r i The value of is 0 or 1, and there exists at least one i such that r i =0, i represents an integer between 1 and n;

[0069] The data encryption module 202 is used to encrypt the plaintext data x and y respectively by using the rule function to obtain the corresponding ciphertext matrix C 1 and C 2 , where C 1 =x*H,C 2 =y*H. In this embodiment, the reversible square matrix Q and the diagonal matrix A selected when encrypting x and y are the same. Since the matrices Q, A and Q -1 Both are of order n, so the ciphertext data C obtained after encryption 1 and C 2 It is a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an all-homomorphic encryption method and system based on data transformation, The method comprises the following steps: constructing a rule function, respectively encrypting plaintext data x and y through the rule function to obtain encrypted ciphertext matrices C1 and C2, and homomorphically calculating the ciphertext matrices C1 and C2 to obtain the calculated ciphertext matrices, wherein the homomorphic calculation is homomorphic addition calculation, homomorphic subtraction calculation, homomorphic multiplication calculation, homomorphic division calculation or homomorphic basic function calculation of any ciphertext matrix in C1 and C2, and decrypting the calculated ciphertext matrix to obtain decrypted plaintext data. The method solves the problem that the existing all-homomorphic encryption algorithms can only support simple calculation such as addition, subtraction and multiplication, and realizes algebraic calculation such as addition, subtraction, multiplication and division of ciphertext data, as well as calculation of basic functions, and enriches calculation types of homomorphic encryption data in practical application scenarios.

Description

technical field [0001] The present invention relates to the technical field of data processing, and more specifically, to a fully homomorphic encryption method and system based on data transformation. Background technique [0002] With the rapid development of Internet informatization, the amount of data we generate is becoming larger and larger. At present, these big data are stored in the server in the entrusted computing service mode. User data stored in the cloud may contain some sensitive information, so data must be encrypted before being stored in the cloud. If the data is encrypted using a common encryption method, the structure of the plaintext data will change, destroying the relationship between the data, and the encrypted ciphertext cannot be calculated. These data cannot be applied in big data scenarios, such as Performing machine learning calculations, etc., loses the use value of the data. [0003] After the plaintext data is encrypted by the homomorphic enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 王程浩万群张如聪
Owner 浙江大数据交易中心有限公司