A high-performance data multi-level encryption and decryption method and system based on fully homomorphic encryption

A homomorphic encryption and encrypted data technology, applied in the field of information security, can solve problems such as slow execution speed, high overhead, and inability to dynamically adjust, and achieve high processing speed and storage efficiency, small footprint, and fast encryption and decryption processing speed Effect

Active Publication Date: 2022-01-07
上海六坊信息科技有限公司 +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since multi-level encryption technology is slower than many common encryption technologies, and the ciphertext volume is larger, when the full amount of data is protected by multi-level encryption, the overhead of computing and storage is higher.
[0003] In addition, other existing encryption technologies, such as ordinary symmetric encryption technology and asymmetric encryption technology, cannot directly meet the requirements of multi-level encryption based on permission tree
Although attribute encryption technology can implement data encryption and ciphertext access control based on specific user attributes, the permission tree structure must be determined in advance and cannot be adjusted dynamically. Users with new attributes cannot access the generated ciphertext.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A high-performance data multi-level encryption and decryption method and system based on fully homomorphic encryption
  • A high-performance data multi-level encryption and decryption method and system based on fully homomorphic encryption
  • A high-performance data multi-level encryption and decryption method and system based on fully homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0064] For the sake of convenience, this embodiment uses the simplest summation and disassembly scheme for description, taking three-level encryption as an example, where PK is the public key and SK is the private key. The specific operation steps are as follows:

[0065] A. The first level platform provides centralized identity registration, key generation, key distribution services, and initializes a pair of public and private keys SK pub and PK pub As a public ciphertext space (S pub ) key;

[0066] B. After the secondary account A completes the registration, the central platform generates the corresponding public-private key pair SK A and PK A , and send the PK pub and the conversion dictionary (T pub=>A ) to A, who holds the conversion dictionary (T A=>pub );

[0067] C. After the registration of the third-level account A1 (organization) under the second-level account is completed, the central platform generates the corresponding public-private key pair SK A1 and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-performance data multi-level encryption and decryption method based on complete homomorphic encryption. The method uses a complete homomorphic encryption technology to encrypt data with a symmetric key, and uses a multi-level encryption technology to encrypt the symmetric key. Encryption, while establishing a user relationship tree structure, can realize multi-level and controllable data encryption supporting a tree-like user system. Compared with the original multi-level encryption method directly for data encryption, the method of the present invention encrypts the data to be protected. The speed of decryption operation is faster, and the volume of ciphertext is smaller, which is more conducive to the transmission and storage of ciphertext. The invention also discloses a system for realizing the above-mentioned multi-stage encryption and decryption method.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a high-performance data multi-level encryption and decryption method and system based on complete homomorphic encryption. Background technique [0002] Multi-level encryption can enable users with tree-like affiliation to use their own private keys to share encrypted data. Specifically, users located near the root of the user relationship tree can use their own private keys to correctly decrypt the encrypted data of all directly subordinate users. , but cannot decrypt the encrypted data of its immediate superior user, nor can it decrypt the encrypted data of users who are in different branches of the relationship tree with this user. However, because multi-level encryption technology is slower than many common encryption technologies, and the ciphertext volume is larger, the operation and storage overhead of using multi-level encryption to protect the entire amount of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/008H04L63/0435
Inventor 郑珂威王敏经春秋
Owner 上海六坊信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products