A Lightweight Homomorphic Encryption Method for Privacy Protection in Cloud Computing
A privacy protection and homomorphic encryption technology, applied in the field of data security and privacy protection in cloud computing environment, can solve problems such as computational complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The algorithm function of the present invention mainly includes: the generation of key, the encryption of data, the deciphering of data and the computing processing of cipher text, overall structure is as follows image 3 shown. Among them, m is the plaintext; e is the ciphertext; E is the encryption function.
[0040] Input-output design: The input of the algorithm is the plaintext double positive integers x and y, both x and y belong to the positive integer set Z n , where Z n ={x|x belongs to Z, 0<=x<=n}. The output of the algorithm is ciphertext. As far as the design of the algorithm is concerned, the algorithm needs to generate a public key and a private key, and then use the key to encrypt the plaintext, decrypt the ciphertext, and calculate the ciphertext, so the output includes In addition to the ciphertext, there are calculation results.
[0041] The general principle of this algorithm is the same as that of the public-key encryption system. The public key ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


