Sequencing method based on fully homomorphic encryption

A fully homomorphic encryption and sorting method technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of low efficiency, reduce the amount of calculation, improve efficiency, reduce space complexity and time complexity Effect

Active Publication Date: 2019-10-08
ZHEJIANG SCI-TECH UNIV
View PDF12 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a sorting method based on fully homomorphic encryption, the purpose of which is to solve the problem of low efficiency caused by the existing binary comparison method under fully homomorphic encryption, and propose a more efficient non-binary data sorting method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sequencing method based on fully homomorphic encryption
  • Sequencing method based on fully homomorphic encryption
  • Sequencing method based on fully homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the features and advantages of the present invention more obvious, the present invention will be described in detail and completely below in conjunction with the accompanying drawings of the present invention.figure 1 It is a schematic flow chart of the present invention, which mainly includes a data encryption / decryption method and a homomorphic computing method. The client executes the encryption method, encrypts and uploads the data to be sorted to the cloud server; the cloud server executes the homomorphic computing method, sorts the ciphertext without decryption, and returns the sorted result in the form of ciphertext to the user; finally, the client performs decryption to obtain the requested sorting result. figure 2 To compare the calculation process of the matrix and the Hamming weight (only the constant term is shown in the figure, the specific process is explained in step 2, step 3 and step 4).

[0047] Step 1: Collect industrial data A that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sequencing method based on a fully homomorphic encryption technology, and belongs to the technical field of fully homomorphic encryption. The method comprises a data encryption / decryption method and a homomorphic calculation method, and comprises the steps that a user side executes encryption, encrypts an array to be ranked, and uploads encrypted data to a cloud server; the cloud server side executes homomorphic calculation, carries out ciphertext operation under the condition that decryption is not carried out, and returns a calculation result to the user in the formof a ciphertext; and finally, the user side executes decryption to obtain the sorted array. A sorting method in a ciphertext state is realized, most processes are carried out at a cloud server side,the workload of a user side is greatly reduced, the space complexity and the time complexity are remarkably reduced, and the efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of fully homomorphic encryption, and in particular relates to a sorting method based on fully homomorphic encryption. Background technique [0002] Sorting is an important basic operation in computer operations. It is widely used in computer programming and computer algorithms, and it is of great significance to daily data operations. [0003] As a way of outsourcing computing, cloud computing allows users to entrust local computing tasks to cloud service providers to reduce the amount of computing on the client side. With the popularization of cloud computing, the security of cloud computing has attracted more and more attention. Currently commonly used cloud computing security measures, such as firewalls, intrusion detection systems, etc., are mainly considered to prevent outsiders from attacking cloud servers, which cannot prevent internal threats from cloud service providers. The internal management pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6245
Inventor 黄海葛华盛古强
Owner ZHEJIANG SCI-TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products