Unlock instant, AI-driven research and patent intelligence for your innovation.

Lightweight-class homomorphic encryption method for implementing privacy protection in cloud computation

A privacy protection and homomorphic encryption technology, applied in the field of data security and privacy protection in cloud computing environment, can solve problems such as computational complexity, and achieve the effect of protecting data security and improving retrieval efficiency

Active Publication Date: 2019-02-12
WUHAN UNIV
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, homomorphic encryption is a cryptography technology based on computational complexity theory of mathematical problems. The complexity of fully homomorphic encryption technology makes people turn from hope to disappointment again.
Due to its computational complexity, current computers cannot implement it well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight-class homomorphic encryption method for implementing privacy protection in cloud computation
  • Lightweight-class homomorphic encryption method for implementing privacy protection in cloud computation
  • Lightweight-class homomorphic encryption method for implementing privacy protection in cloud computation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The algorithm function of the present invention mainly includes: the generation of key, the encryption of data, the deciphering of data and the computing processing of cipher text, overall structure is as follows image 3 shown. Among them, m is the plaintext; e is the ciphertext; E is the encryption function.

[0040] Input-output design: The input of the algorithm is the plaintext double positive integers x and y, both x and y belong to the positive integer set Z n , where Z n ={x|x belongs to Z, 0<=x<=n}. The output of the algorithm is ciphertext. As far as the design of the algorithm is concerned, the algorithm needs to generate a public key and a private key, and then use the key to encrypt the plaintext, decrypt the ciphertext, and calculate the ciphertext, so the output includes In addition to the ciphertext, there are calculation results.

[0041] The general principle of this algorithm is the same as that of the public-key encryption system. The public key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to safe cloud storage and computation, and in particular relates to a lightweight-class homomorphic encryption method for implementing privacy protection in cloud computation. The method comprises the steps of generation of a key; encryption and an encryption process by using a self-maintained private key, wherein the encryption and decryption processes can be simply summarized by two general formulas: encryption process, FORMULA; and decryption process, FORMULA. According to the method provided by the invention, the orientation is to perform lightweight-class encryptionon data, the homogeneity is ensured, additive operation is implemented under the condition that the data is not decrypted, and invariability of the result can be ensured.

Description

Technical field: [0001] The invention relates to safe cloud storage and computing, in particular to data security and privacy protection in the cloud computing environment. Background technique [0002] The working principles of the traditional symmetric encryption system and asymmetric encryption system are as follows: figure 1 , figure 2 shown. [0003] The advent of the era of cloud computing has brought a lot of convenience to people, but it has also brought panic to people—the problem of leaking secrets is becoming more and more prominent, and the above-mentioned traditional encryption technology cannot meet the requirements of cloud computing. [0004] In 2009, scientists from IBM proposed the world's first fully homomorphic encryption algorithm. This algorithm is of great significance: its existence proves that previous researchers' assumptions about fully homomorphic encryption algorithms are not absurd and unconstrained , and proved the theoretical feasibility o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/008
Inventor 丁文佳张沪寅王玉林
Owner WUHAN UNIV