Check patentability & draft patents in minutes with Patsnap Eureka AI!

Homomorphic ciphertext computing acceleration logic system and realization method

A technology of calculation logic and implementation method, which is applied in the field of cloud computing security, can solve problems such as lack of privacy protection methods, achieve the effect of improving computing efficiency and solving security problems

Inactive Publication Date: 2019-02-22
JINAN INSPUR HIGH TECH TECH DEV CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These technologies adopt traditional encryption protection, which can only meet the function of encrypted storage, and lack more convenient privacy protection methods that directly calculate the ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic ciphertext computing acceleration logic system and realization method
  • Homomorphic ciphertext computing acceleration logic system and realization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention provides a homomorphic ciphertext calculation acceleration logic system, including an FPGA, which includes a homomorphic calculation logic module,

[0046] Homomorphic computing logic modules include memory, control logic modules, cache logic modules, ciphertext computing logic modules, and homomorphic decryption logic modules.

[0047] The homomorphic computing logic module performs data interaction with the host through the FPGA interface:

[0048] The host sends the ciphertext, ciphertext public key and related operations on the ciphertext to the memory of the homomorphic computing logic module,

[0049] The control logic module controls the ciphertext calculation process and the data interaction between the modules according to the instructions of the host, and first inputs the ciphertext, ciphertext public key and related operations on the ciphertext from the memory to the cache logic module,

[0050] The ciphertext calculation logic module o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a homomorphic ciphertext computing acceleration logic system and a realization method, relating to the field of cloud computing security. A homomorphic computing logic module is added in an FPGA, a ciphertext computing logic module in the homomorphic computing logic module performs related operations on a ciphertext according to a ciphertext public key, and a homomorphic decryption logic module reduces noise of the ciphertext; the above process is repeated till related operation for the ciphertext sent by the host is completed. In data exchange, it can be set that cachemeets high-speed data transmission. Homomorphic encryption data processing is accelerated through a homomorphic encryption technology, so that homomorphic ciphertext runs more efficiently, further, user privacy in cloud environment is protected.

Description

technical field [0001] The invention discloses a homomorphic ciphertext computing acceleration logic system and an implementation method, which relate to the field of cloud computing security. Background technique [0002] In recent years, security incidents in the cloud computing environment have occurred from time to time, and the data privacy issue in the cloud environment has attracted great attention. Security research analysis shows that: cloud data is easily leaked, and the weaknesses of cloud computing are mainly concentrated in data protection and identity. manage. At present, people's response to data privacy security issues in the cloud environment is only to encrypt the data in advance before storing it in the cloud server, and then decrypt it by the user when using it. Common data privacy protection technologies include: proxy re-encryption technology and attribute encryption technology for distinguishing the identity of data users, access control technology fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/008
Inventor 姜凯于治楼孙善宝于静
Owner JINAN INSPUR HIGH TECH TECH DEV CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More