A sorting method based on fully homomorphic encryption

A fully homomorphic encryption and sorting method technology, which is applied in computer security devices, instruments, calculations, etc., can solve problems such as low efficiency, achieve the effects of reducing the amount of calculation, reducing space complexity and time complexity, and improving efficiency

Active Publication Date: 2021-10-01
ZHEJIANG SCI-TECH UNIV
View PDF12 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a sorting method based on fully homomorphic encryption, the purpose of which is to solve the problem of low efficiency caused by the existing binary comparison method under fully homomorphic encryption, and propose a more efficient non-binary data sorting method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A sorting method based on fully homomorphic encryption
  • A sorting method based on fully homomorphic encryption
  • A sorting method based on fully homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the features and advantages of the present invention more obvious, the present invention will be described in detail and completely below in conjunction with the accompanying drawings of the present invention.figure 1 It is a schematic flow chart of the present invention, which mainly includes a data encryption / decryption method and a homomorphic computing method. The client executes the encryption method, encrypts and uploads the data to be sorted to the cloud server; the cloud server executes the homomorphic computing method, sorts the ciphertext without decryption, and returns the sorted result in the form of ciphertext to the user; finally, the client performs decryption to obtain the requested sorting result. figure 2 To compare the calculation process of the matrix and the Hamming weight (only the constant term is shown in the figure, the specific process is explained in step 2, step 3 and step 4).

[0047] Step 1: Collect industrial data A that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sorting method based on fully homomorphic encryption technology, belonging to the technical field of fully homomorphic encryption. The invention includes a data encryption / decryption method and a homomorphic computing method. The client performs encryption, encrypts the array to be sorted, and uploads the encrypted data to the cloud server; operation, and return the calculation result to the user in the form of ciphertext; finally, the client performs decryption to obtain the sorted array. The method realizes the sorting method in the ciphertext state, and most of the processes in the present invention are carried out at the cloud server end, which greatly reduces the workload of the user end, significantly reduces space complexity and time complexity, and improves efficiency.

Description

technical field [0001] The invention belongs to the technical field of fully homomorphic encryption, and in particular relates to a sorting method based on fully homomorphic encryption. Background technique [0002] Sorting is an important basic operation in computer operations. It is widely used in computer programming and computer algorithms, and it is of great significance to daily data operations. [0003] As a way of outsourcing computing, cloud computing allows users to entrust local computing tasks to cloud service providers to reduce the amount of computing on the client side. With the popularization of cloud computing, the security of cloud computing has attracted more and more attention. Currently commonly used cloud computing security measures, such as firewalls, intrusion detection systems, etc., are mainly considered to prevent outsiders from attacking cloud servers, which cannot prevent internal threats from cloud service providers. The internal management pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6245
Inventor 黄海葛华盛古强
Owner ZHEJIANG SCI-TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products