High-performance data multi-level encryption and decryption method and system based on complete homomorphic encryption

A homomorphic encryption, encryption and decryption technology, applied in the field of information security, can solve problems such as inability to dynamically adjust, inability to access ciphertext, and large ciphertext

Active Publication Date: 2021-07-06
上海六坊信息科技有限公司 +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since multi-level encryption technology is slower than many common encryption technologies, and the ciphertext volume is larger, when the full amount of data is protected by multi-level encryption, the overhead of computing and storage is higher.
[0003] In addition, other existing encryption technologies, such as ordinary symmetric encryption technology and asymmetric encryption tec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-performance data multi-level encryption and decryption method and system based on complete homomorphic encryption
  • High-performance data multi-level encryption and decryption method and system based on complete homomorphic encryption
  • High-performance data multi-level encryption and decryption method and system based on complete homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0063] Example

[0064] For the sake of convenience, this embodiment uses the simplest summation and disassembly scheme for description, taking three-level encryption as an example, where PK is the public key and SK is the private key. The specific operation steps are as follows:

[0065] A. The first-level platform provides centralized identity registration, key generation, and key distribution services, and initializes a pair of public and private keys SK pub and PK pub as the public ciphertext space (S pub ) key;

[0066] B. After the secondary account A completes the registration, the central platform generates the corresponding public and private key pair SK A and PK A , and send PK pub and the conversion dictionary (T pub=>A ) to A, and owns the conversion dictionary (T A=>pub );

[0067] C. After the third-level account A1 (organization) under the second-level account is registered, the central platform generates the corresponding public-private key pair SK A1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-performance data multi-stage encryption and decryption method based on complete homomorphic encryption, which encrypt data by a symmetric key by means of a complete homomorphic encryption technology, encrypt the symmetric key by using a multi-stage encryption technology, establish a user relationship tree structure, and can achieve multi-level and controllable data encryption supporting a tree-shaped user system. Compared with an original multi-level encryption method directly for data encryption, the method has higher speed of encryption and decryption operation on data to be protected, smaller size of a ciphertext, and better facilitates the transmission and storage of the ciphertext. The invention also discloses a system for realizing the multi-stage encryption and decryption method.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a high-performance data multi-level encryption and decryption method and system based on complete homomorphic encryption. Background technique [0002] Multi-level encryption can enable users with tree-like affiliation to use their own private keys to share encrypted data. Specifically, users located near the root of the user relationship tree can use their own private keys to correctly decrypt the encrypted data of all directly subordinate users. , but cannot decrypt the encrypted data of its immediate superior users, nor can it decrypt the encrypted data of users located in different branches of the relationship tree with this user. However, because multi-level encryption technology is slower than many common encryption technologies, and the ciphertext volume is larger, the operation and storage overhead of using multi-level encryption to protect the entire amount of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06
CPCH04L9/008H04L63/0435
Inventor 郑珂威王敏经春秋
Owner 上海六坊信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products