Supercharge Your Innovation With Domain-Expert AI Agents!

Lightweight multi-user multi-data fully homomorphic data encryption packaging method

A multi-user, multi-data technology, applied in the fields of homomorphic encrypted communication, secure communication device, user identity/authority verification, etc., can solve huge computing overhead and communication overhead, and cannot meet the needs of more general scenarios of multi-user and multi-data. , algorithm calculation and high communication complexity, to achieve the effect of high availability

Active Publication Date: 2021-04-30
EAST CHINA NORMAL UNIVERSITY
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005]Although the public-key fully homomorphic encryption in the prior art can realize secure outsourcing calculations in the ciphertext domain functionally, the calculation and communication complexity of the algorithm is too High, the user's local public key encryption algorithm uses the complexity of times: O(n), where n is the number of input data
Therefore, its huge computing overhead and communication overhead cannot meet the objective performance requirements of local users with limited resources.
More importantly, most of the current lightweight security outsourcing computing protocols in the world only provide effective solutions for the single-user multi-data scenario, and cannot meet the more general scenario requirements of multi-user multi-data, that is, every Each user encrypts their input data with their own keys, and the cloud server performs privacy-preserving outsourced computing on the ciphertext data encrypted with different keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight multi-user multi-data fully homomorphic data encryption packaging method
  • Lightweight multi-user multi-data fully homomorphic data encryption packaging method
  • Lightweight multi-user multi-data fully homomorphic data encryption packaging method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0093] See attached figure 1 , the present invention generates public parameters and keys by the system (trusted third party), multiple data owners use their own keys to encrypt and encapsulate multiple messages and send them to the cloud server, the cloud server and the cryptographic service provider encrypt The final data is calculated by multivariate polynomials on the ciphertext field, and the receiver decrypts the calculation results. The present invention is based on two arbitrary one-way trapdoor replacements, can be flexibly used in different network scenarios, meets the requirements of correctness, efficiency, and privacy, and can adapt to the security of input privacy and calculation result privacy. Selective Ciphertext Security (CCA2 Security).

[0094] See attached figure 2 , the concrete realization process of the present invention is as follows:

[0095] Step 1: System (trusted third party) initialization

[0096] a) Enter 1 λ , where λ is a security param...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lightweight multi-user multi-data fully homomorphic data encryption packaging method, which is characterized in that a multi-user multi-key homomorphic configuration and an outsourcing calculation method of any one-way trap door replacement and any hash function are adopted; privacy protection of multiple users is achieved, each user has multiple input data and an independent encryption key, and outsourcing calculation and decryption specifically comprise the steps of system initialization, key generation, encryption, outsourcing calculation and decryption. Compared with the prior art, the method is simpler and easier to implement, efficient privacy protection outsourcing calculation can be achieved in the scene that multiple users exist and each user has multiple input data and an independent encryption key, data safety of the users is guaranteed through a cloud server and a password service provider, the method can achieve the adaptive selection of ciphertext security, and meets the high efficiency and privacy demands of multi-user multi-data security outsourcing calculation.

Description

technical field [0001] The invention relates to the technical field of secure outsourcing computing and homomorphic encryption, in particular to a lightweight multi-user multi-data fully homomorphic data encryption encapsulation method under a dual-server model. Background technique [0002] With the vigorous development of computer applications, more and more valuable data are generated from various terminals. Due to the limitations of the storage and computing power of the device itself, the value of the data cannot be brought into play through effective processing. Massive data owners outsource data to resource-rich cloud servers for processing and storage. However, in practical applications, cloud servers often work in an untrusted environment. For purposes such as commercial interests, semi-trusted cloud servers usually process data honestly and return correct results to the receiver of outsourced calculation results. . But at the same time, there is a spying on the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/32H04L29/06
CPCH04L9/008H04L9/3236H04L63/0442H04L63/0435
Inventor 周俊沈华杰
Owner EAST CHINA NORMAL UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More