Additive homomorphic encryption and decryption method with double decryption mechanisms
An encryption, decryption and mechanism technology, applied in the computer field, can solve problems such as long ciphertext length, and achieve the effect of reducing length and reducing overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention is described in detail below in conjunction with accompanying drawing,
[0025] refer to figure 1 , the implementation steps of this example are as follows:
[0026] Step 1, key initialization.
[0027] (1.1) First select a public prime factor u and k secret prime factor v 1 ,v 2 ,...,v i ,...,v k , and then select the first largest prime factor v p and the second largest prime factor v q , calculate the first largest prime number P and the second largest prime number Q, the formula is as follows,
[0028] P=u×v 1 × v 2 ×...×v i ×...×v k × v p +1,
[0029] Q=u×v 1 × v 2 ×...×v i ×...×v k × v q +1,
[0030] Among them, the bit length of u does not exceed 80, v p ,v q The bit lengths of all are greater than 1024, v p ,v q >>v i , there is a probability that P and Q are not prime numbers. In this case, reselect two large prime factor v p and v q , until P and Q are prime numbers;
[0031] (1.2) Calculate the modulus N=P×Q to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


