Unlock instant, AI-driven research and patent intelligence for your innovation.

A Lightweight Homomorphic Encryption Method for Privacy Protection in Cloud Computing

A privacy protection and homomorphic encryption technology, applied in the field of data security and privacy protection in cloud computing environment, can solve problems such as computational complexity

Active Publication Date: 2022-02-01
WUHAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, homomorphic encryption is a cryptography technology based on computational complexity theory of mathematical problems. The complexity of fully homomorphic encryption technology makes people turn from hope to disappointment again.
Due to its computational complexity, current computers cannot implement it well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lightweight Homomorphic Encryption Method for Privacy Protection in Cloud Computing
  • A Lightweight Homomorphic Encryption Method for Privacy Protection in Cloud Computing
  • A Lightweight Homomorphic Encryption Method for Privacy Protection in Cloud Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The algorithm function of the present invention mainly includes: the generation of key, the encryption of data, the deciphering of data and the computing processing of cipher text, overall structure is as follows image 3 shown. Among them, m is the plaintext; e is the ciphertext; E is the encryption function.

[0040] Input-output design: The input of the algorithm is the plaintext double positive integers x and y, both x and y belong to the positive integer set Z n , where Z n ={x|x belongs to Z, 0<=x<=n}. The output of the algorithm is ciphertext. As far as the design of the algorithm is concerned, the algorithm needs to generate a public key and a private key, and then use the key to encrypt the plaintext, decrypt the ciphertext, and calculate the ciphertext, so the output includes In addition to the ciphertext, there are calculation results.

[0041] The general principle of this algorithm is the same as that of the public-key encryption system. The public key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to secure cloud storage and computing, and in particular to a lightweight homomorphic encryption method for privacy protection in cloud computing, including: generating a key; performing encryption; using a self-held private key to decrypt the process; wherein, the encryption and The decryption process can be briefly summarized by two general formulas: the encryption process, c=g^m*r^n mod n^2; the decryption process, m=L(c^lambda mod n^2)*u mod n; u = (L(g^lambda mod n^2))^(-1) mod n. The positioning of the present invention is to carry out light-weight encryption on data to ensure its homomorphism, so that the addition operation can be realized without decrypting the data, and the result can be guaranteed to remain unchanged.

Description

Technical field: [0001] The invention relates to safe cloud storage and computing, in particular to data security and privacy protection in the cloud computing environment. Background technique [0002] The working principles of the traditional symmetric encryption system and asymmetric encryption system are as follows: figure 1 , figure 2 shown. [0003] The advent of the era of cloud computing has brought a lot of convenience to people, but it has also brought panic to people—the problem of leaking secrets is becoming more and more prominent, and the above-mentioned traditional encryption technology cannot meet the requirements of cloud computing. [0004] In 2009, scientists from IBM proposed the world's first fully homomorphic encryption algorithm. This algorithm is of great significance: its existence proves that previous researchers' assumptions about fully homomorphic encryption algorithms are not absurd and unconstrained , and proved the theoretical feasibility o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/008
Inventor 丁文佳张沪寅王玉林
Owner WUHAN UNIV