An all-homomorphic encryption method and system based on data transformation
A fully homomorphic encryption and data transformation technology, applied in the field of data processing, can solve the problem of a single type of ciphertext data calculation, and achieve the effect of ensuring correctness and good security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] Such as figure 1 As shown, Embodiment 1 of the present invention discloses a fully homomorphic encryption method based on data transformation, including the following steps:
[0054] S101, generate rule function F(x), F(x)=x*H, wherein H=Q*A*Q -1 , Q is an invertible square matrix of order n, Q -1 is the inverse matrix of matrix Q, and A is a diagonal matrix of order n r i The value of is 0 or 1, and there exists at least one i such that r i =0, i represents an integer between 1 and n, that is, 1≤i≤n.
[0055] This rule function transforms plaintext data, that is, real numbers, into a matrix through the function of the reversible square matrix Q, the inverse matrix of Q, and the diagonal matrix A, because the matrix has the advantages of fast calculation speed and high security. And in this rule function, Q only needs to take a reversible square matrix, and can take countless values, and the diagonal matrix A has 2 n -2 possible values, so when n is large, there ...
Embodiment 2
[0067] Such as figure 2 As shown, Embodiment 2 of the present invention discloses a fully homomorphic encryption system based on data transformation, including:
[0068] Rule function construction module 201, for constructing rule function F(x), F(x)=x*H, wherein H=Q*A*Q -1 , Q is an invertible square matrix of order n, Q -1 is the inverse matrix of matrix Q, and A is a diagonal matrix of order n r i The value of is 0 or 1, and there exists at least one i such that r i =0, i represents an integer between 1 and n;
[0069] The data encryption module 202 is used to encrypt the plaintext data x and y respectively by using the rule function to obtain the corresponding ciphertext matrix C 1 and C 2 , where C 1 =x*H,C 2 =y*H. In this embodiment, the reversible square matrix Q and the diagonal matrix A selected when encrypting x and y are the same. Since the matrices Q, A and Q -1 Both are of order n, so the ciphertext data C obtained after encryption 1 and C 2 It is a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

