Unlock instant, AI-driven research and patent intelligence for your innovation.

Threshold decryption method and system based on homomorphic encryption and readable storage medium

A threshold decryption and homomorphic encryption technology, applied in the field of information security, can solve the problem that data is no longer safe

Active Publication Date: 2021-07-20
重庆都会信息科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the decrypted data is no longer safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold decryption method and system based on homomorphic encryption and readable storage medium
  • Threshold decryption method and system based on homomorphic encryption and readable storage medium
  • Threshold decryption method and system based on homomorphic encryption and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0048] Terms and symbols:

[0049] A, B: Two users using public key cryptography.

[0050] N: cyclic group G 1 , G 2 and G T The order of is greater than 2 191 prime numbers.

[0051] G 1 : Additive cyclic group of order prime N.

[0052] P 1 : Group G 1 generator of .

[0053] G 2 : Additive cyclic group of order prime N.

[0054] P 2 : Group G 2 generator of .

[0055] G T : The multiplicative cyclic group of prime N order.

[0056] h v (): cryptographic hash function.

[0057] h 1 (): A cryptographic function derived from a cryptographic hash function.

[0058] e: from G 1 ×G 2 to G T bilinear pairing.

[0059] h: The private key generation function identifier identified by one byte, which is selected and made public by KGC.

[0060] ke: encryption master private key.

[0061] P pub-e : Encrypted master public key.

[0062] KDF(): key derivation function.

[0063] MAC(): Message authentication code function.

[0064] ID B : User B's identity, w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information safety, and particularly discloses a homomorphic encryption-based threshold decryption method and system and a readable storage medium. The method comprises the following steps: B1, verifying whether a ciphertext C1 belongs to G1 is true or not, If not, reporting an error and exiting; b2, an part w '= e (C1, deB) in the group GT is calculated, e is a bilinear pair from G1 * G2 to GT, and deB is an encryption private key; b3, calculating gM '= C2 * w'-1, and recovering M'from gM '; b4, calculating u = MAC (K '1, C2), If u is not equal to C3, reporting an error and quitting; and B5, outputting the plaintext M '. By adopting the technical scheme provided by the invention, the encrypted information with encryption homomorphism can be decrypted.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a threshold decryption method, system and readable storage medium based on homomorphic encryption. Background technique [0002] In the threshold cryptosystem (Threshold cryptosystem), private key (Private key) information is distributed to n participants. Only when more than t (n≥t≥1) participants approve the signature or decryption operation at the same time, the key can be recovered to complete the signature or decryption, thereby improving the security of the scheme. Threshold ciphers are generally divided into two types that require a trusted center and those that do not. When the trusted center exists, secret distribution can be easily realized, reducing the amount of communication and calculation among group members; but a trusted center trusted by all members of the group does not always exist, and at this time the team members need to jointly Realize the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/08H04L9/30
CPCH04L9/008H04L9/085H04L9/0869H04L9/3066H04L9/3033Y02D30/50
Inventor 李健吴重寅
Owner 重庆都会信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More