Unlock instant, AI-driven research and patent intelligence for your innovation.

A security outsourcing method for homomorphic encryption matrix determinant based on cloud computing

A technology of homomorphic encryption and secure outsourcing, applied in the field of matrix operations, can solve problems such as low efficiency in solving determinants, and achieve the effects of reducing space complexity, reducing the number of ciphertext operations, and reducing the amount of calculation.

Active Publication Date: 2022-05-31
康旭科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the efficiency of solving the determinant of homomorphic encryption technology is relatively low, homomorphic encryption technology has a strict security proof. Its security is based on classical mathematically difficult problems such as the R-LWE problem, which can resist quantum computer attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security outsourcing method for homomorphic encryption matrix determinant based on cloud computing
  • A security outsourcing method for homomorphic encryption matrix determinant based on cloud computing
  • A security outsourcing method for homomorphic encryption matrix determinant based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

cipher data; and form the collected data into matrix A, encode and encrypt it, and obtain the corresponding ciphertext matrix ct(A),

Then upload the ciphertext matrix ct(A) to the cloud server.

[0051]

[0052] The matrix A is an n-order square matrix, n is a positive integer, and ct represents the ciphertext.

Encoding and encrypting the entire matrix into a ciphertext not only saves storage space, but also requires only a limited number of ciphertext operations.

It can greatly reduce the circuit depth and improve the calculation efficiency;

(Step 2) Since the homomorphic encryption scheme only supports addition, multiplication and rotation operations on the ciphertext field, it is not directly

The division operation is supported, so this application calculates the row and column of the encrypted matrix ct(A) according to the non-division matrix determinant calculation formula

Mode. First, the cloud server calculates ct(μ(X)); then calculates ct(F

A

(X))=ct(μ(X)) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud computing-based homomorphic encryption matrix determinant security outsourcing method, which encodes and encrypts the entire matrix into a ciphertext by applying matrix coding technology, and realizes efficient matrix determinant in combination with a non-division determinant calculation method secure outsourced computing. The invention includes a data encryption / decryption method and a homomorphic calculation method. The client executes the encryption method, encodes and encrypts the matrix and uploads it to the cloud server; the cloud server executes the homomorphic computing method, calculates the ciphertext without decrypting it, and returns the calculation result to the client in the form of ciphertext; Finally, the client executes the decryption module to obtain the desired matrix determinant value. Most of the calculations in the present invention are performed on the cloud server side, which greatly reduces the calculation workload of the client side.

Description

A cloud computing-based homomorphic encryption matrix determinant security outsourcing method technical field The present invention relates to the matrix operation under the homomorphic encryption technology, especially the determinant calculation of the matrix. Background technique Matrix operation is an important basic operation in mathematics, and many practical problems can be described by matrices. It has a wide range of applications in mathematics, physics and engineering. The determinant calculation in the matrix operation is the most basic of the matrix calculation One of the operations of this book is widely used in solving linear equations, inverting matrices, and finding eigenvalues ​​of matrices. [0003] In recent years, cloud computing has received extensive attention. It has powerful computing capabilities and can help clients perform complex calculation. At present, cloud computing mainly adopts authentication and access control strategies to ensure d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L67/10G06F17/16
CPCH04L9/008H04L67/10G06F17/16Y02P90/30
Inventor 黄海王淑芳
Owner 康旭科技有限公司