SHE-based secure outsourcing method

A technology of security outsourcing and multiplication, which is applied in the field of network security and can solve problems such as storage and large amount of data

Inactive Publication Date: 2021-03-09
NORTHEASTERN UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the continuous real-time generation of these data, the amount of data is too large to be stored in the local device at all, and it is usually necessary to outsource cloud servers for storage and management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SHE-based secure outsourcing method
  • SHE-based secure outsourcing method
  • SHE-based secure outsourcing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0050] In this embodiment, the public cloud server (Public Cloud Server, PCS) stores public data, and the user can realize the privacy protection of the outsourced function and the calculation result while outsourcing the function function to the public cloud server. When the user passes the proxy server (Proxy Server, PS ) interacts with the public cloud server, the public cloud server obtains the calculation result through calculation and returns it to the proxy server. Only after the proxy server passes the initial decryption, will the partially decrypted ciphertext and the initial ciphertext be sent to the user for final decryption , otherwise the user directly rejects...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security outsourcing method based on SHE, and belongs to the technical field of network security, and the method comprises the steps: enabling a trusted third party to carryout the on-demand packaging of generated addition homomorphic and multiplication homomorphic public and private keys through employing public information, and transmitting the public and private keysto a user, a proxy server and a public cloud server; preprocessing the coefficient and the index of the outsourcing polynomial by a client user, encrypting the processed data, and uploading the encrypted data to a proxy server; then establishing connection between the proxy server and the public cloud server to execute secret index calculation; enabling the public cloud server to calculate the processed outsourcing polynomial by using the encryption index and coefficient generated by calculation, and performing ciphertext conversion; finally, enabling the proxy server to receive the ciphertextconversion result calculated by the public cloud server for preliminary decryption, and sending the result to the user for final decryption after the decryption is passed. According to the method, the user can be helped to obtain the desired outsourcing calculation result more safely and efficiently.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a SHE-based security outsourcing method. Background technique [0002] With the rapid development of the Internet of Things and Internet technology, it has brought convenience to people's daily life. For example, real-time data generated by the stock market can predict the rise of stocks, and medical equipment can monitor physical characteristics in real time. However, due to the continuous real-time generation of these data, the amount of data is too large to be stored in the local device, and it is usually necessary to outsource cloud servers for storage and management. At the same time, due to the limited local computing capacity, users also need to outsource to cloud servers for computing when processing these data. Since these data are out of the user's own management and control, malicious cloud servers may tamper with or view the stored data, but malicious server...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/30
CPCH04L9/008H04L9/302
Inventor 周福才杨帆李鲍葛悦
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products