A verifiable fully homomorphic encryption method based on matrix operation

A fully homomorphic encryption and matrix operation technology, which is applied to secure communication devices and key distribution, can solve the problems that the security strength cannot reach the level of application, lack of practicability, ciphertext length and computational complexity surge, etc.

Active Publication Date: 2019-05-21
GUANGXI UNIV
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2009, Gentry constructed the first fully homomorphic encryption scheme in the true sense. However, since the length of ciphertext and computational complexity will increase sharply with the increase of security strength, the scheme is far from the actual expected security strength. Extent of application
Although the above schemes basically realize verifiable fully homomorphic encryption, they either lack practicality (such as the verifiable scheme with input and output privacy designed by Gennaro et al.), or have low efficiency (such as the design by Zhou et al. verifiable fully homomorphic encryption scheme)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verifiable fully homomorphic encryption method based on matrix operation
  • A verifiable fully homomorphic encryption method based on matrix operation
  • A verifiable fully homomorphic encryption method based on matrix operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] figure 1 It is a schematic diagram of the framework of the method described in the invention, and two entities are involved in the figure, a user (User) and a cloud service provider (CSP). Among them, User is the commissioner of the computing task, and CSP is the actual executor of the computing task. The specific interaction process between them is as follows:

[0042] (1) User uses the encryption algorithm to encrypt the plaintext data m involved in the calculation t Encrypt to get ciphertext C t , and calculate the relevant verification evidence proof in the process, then User saves the proof and C t and the function F(·) that needs to be calculated are sent to the server of the CSP, and the CSP is entrusted to perform the calculation;

[0043] (2) After CSP receives and clarifies User’s outsourced computing tasks, according to the computing function F( ), in the ciphertext C t Carry out corresponding calculations on and return the obtained calculation results R...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable fully homomorphic encryption method based on matrix operation. The method comprises the following steps: preprocessing and converting plaintext data into vectors to obtain a vector set; Then selecting a non-zero random real number and each vector to construct a triangular matrix, and encrypting each triangular matrix to obtain an encrypted matrix set; Generating verification evidences by utilizing the triangular matrix set according to the calculation function type; Performing matrix operation on each encryption matrix according to a certain rule to obtainan encrypted operation result; And finally, decrypting the encrypted operation result to obtain a plaintext of the result, and verifying the correctness of the result by comparing whether the verification evidence is equal to the value of the calculation result. The method has privacy security and result verifiability; Simulation experiment results show that the method has high efficiency in the stages of secret key generation, decryption and verifiability, and the effectiveness and feasibility of the scheme are shown.

Description

technical field [0001] The invention relates to a fully homomorphic encryption algorithm, in particular to a verifiable fully homomorphic encryption method based on matrix operation. Background technique [0002] The emergence of cloud computing can bring great convenience to users, but it also introduces new security issues and challenges due to its characteristics of data outsourcing, service leasing, and virtualization. First of all, outsourcing makes users lose direct control over data and computing tasks, which may contain some sensitive information of users. In addition, the internal operation details of the cloud server are opaque to the user. Therefore, the cloud service provider (Cloud Service Provider, CSP) may have dishonest behaviors out of some selfish motives, such as: out of certain interests The purpose of leaking and abusing users' private information; in order to save computing resources, "lazy" when performing user's computing tasks without completing the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08
Inventor 黄汝维李志坤
Owner GUANGXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products