CN104980271A - Multiplication operation method and system in cloud computing and based on Batch RSA - Google Patents
Multiplication operation method and system in cloud computing and based on Batch RSA Download PDFInfo
- Publication number
- CN104980271A CN104980271A CN201410142505.1A CN201410142505A CN104980271A CN 104980271 A CN104980271 A CN 104980271A CN 201410142505 A CN201410142505 A CN 201410142505A CN 104980271 A CN104980271 A CN 104980271A
- Authority
- CN
- China
- Prior art keywords
- data
- computing function
- rsa
- multiplication computing
- described data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention relates to the field of communication, and provides a multiplication operation method and a multiplication operation system in cloud computing and based on Batch RSA. The method comprises: a data user creates a public key corresponding to multiplication operation function Fi, the number of which is k, and the public keys are respectively sent to data providers included in the corresponding multiplication operation function Fi; the data user encrypts data needed by the data user in the multiplication operation function Fi with the help of the public keys, and enciphered data belonging to the data user and needed by the corresponding multiplication operation function Fi is sent to the cloud; the data providers encrypt the data needed by the multiplication operation function Fi and belonging to the data provider with the help of the public keys; the enciphered data is subject to multiplication operation through the cloud and sent to the data user. The data user deciphers the enciphered operation results from k multiplication operation functions Fi at the same time and gains deciphered operation results. Thus, deciphering speed of enciphered operation results returned from the cloud by the data user is improved, and calculation efficiency is developed.
Description
Technical field
The invention belongs to the communications field, particularly relate to the multiplying method and system based on Batch RSA in a kind of cloud computing.
Background technology
Along with being showing improvement or progress day by day and the progressively popularization of network application of information technology, cloud computing technology obtains unprecedented development and research, but it is while raising service efficiency, also to realize user information safety and secret protection bring greatly difficulty with challenge.Safety is just becoming the major issue that field of cloud calculation urgently breaks through, and its importance and urgency can not be ignored.And along with constantly popularizing of cloud computing, the importance of cloud computing safety problem presents progressively ascendant trend, become the key factor of its development of restriction.Homomorphic cryptography technology is that the data security of cloud computing and secret protection provide a kind of key technology, makes to carry out complex calculations to the enciphered data be stored in Cloud Server and operation becomes possibility.Homomorphic cryptography technology can meet and operates encrypt data, does not allow again operator decipher and obtains data message, ensure computational efficiency simultaneously, can solve the problem to a great extent.Existing homomorphic encryption scheme is the RSA system based on factoring difficulty, meets homomorphism speciality to any time multiplication, but when client exist multiple multiplication computing function need to be put into high in the clouds calculate time, existing RSA system exists deciphers slow shortcoming.
Summary of the invention
The object of the embodiment of the present invention is to provide the multiplying method and system based on Batch RSA in a kind of cloud computing, is intended to need to be put into RSA when high in the clouds calculates at multiple multiplication computing function in solution prior art and deciphers slow problem.
Embodiments provide a kind of multiplying method based on Batch RSA in cloud computing, described method comprises the steps:
Data consumer User is to k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i), by described RSA PKI (e
i, N
i) be sent to corresponding multiplication computing function F respectively
iin included data set provider
, wherein, k, i, j, n are natural number, e
i≠ e
iand 1≤i, j≤k;
Described data consumer User utilizes PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data consumer
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data consumer
, by multiplication computing function F
iand the enciphered data of corresponding described data consumer required for it
be sent to high in the clouds;
Described data set provider
utilize PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data set provider
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data set provider
, by multiplication computing function F
ithe enciphered data of required described data set provider
be sent to high in the clouds;
According to described multiplication computing function F
i, multiplying is carried out to enciphered data in described high in the clouds, obtains k multiplication computing function F
icryptographic calculation result RSA (F
i(result)), by k described cryptographic calculation result RSA (F
i(result)) be sent to described data consumer, described enciphered data comprises the enciphered data of described data consumer
with the enciphered data of described data set provider
K multiplication computing function F is received described data consumer
icryptographic calculation result RSA (F
i(result)), described data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation result RSA (F
i(result)), each multiplication computing function F is obtained
idecrypt operation result.
The embodiment of the present invention further provides the multiplying system based on Batch RSA in a kind of cloud computing, and described system comprises:
RSA public key generation unit, for k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i), by described RSA PKI (e
i, N
i) be sent to corresponding multiplication computing function F respectively
iin included data set provider
, wherein, k, i, j, n are natural number, e
i≠ e
iand 1≤i, j≤k;
The DEU data encryption unit of data consumer, utilizes PKI (e for described data consumer User
i, N
i) to multiplication computing function F
iin the data of required described data consumer
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data consumer
, by multiplication computing function F
iand the enciphered data of corresponding described data consumer required for it
be sent to high in the clouds;
The DEU data encryption unit of data set provider, for described data set provider
utilize PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data set provider
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data set provider
, by multiplication computing function F
ithe enciphered data of required described data set provider
be sent to high in the clouds;
Multiplying unit, for according to described multiplication computing function F
i, multiplying is carried out to enciphered data in described high in the clouds, obtains k multiplication computing function F
icryptographic calculation result RSA (F
i(result)), by k described cryptographic calculation result RSA (F
i(result)) be sent to described data consumer, described enciphered data comprises the enciphered data of described data consumer
with the enciphered data of described data set provider
Decrypt operation unit, receives k multiplication computing function F described data consumer
icryptographic calculation result RSA (F
i(result)), described data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation result RSA (F
i(result)), each multiplication computing function F is obtained
idecrypt operation result.
Based on the multiplying method and system of Batch RSA in a kind of cloud computing that the embodiment of the present invention provides, data consumer in the client produces corresponding PKI according to each multiplication computing function, and utilize the data of PKI corresponding to each multiplication computing function to the data consumer required for each multiplication computing function to be encrypted to be sent to high in the clouds, data set provider also utilizes the data of PKI corresponding to each multiplication computing function to the data consumer required for each multiplication computing function to be encrypted and is sent to high in the clouds simultaneously, high in the clouds is encrypted computing according to the data of each multiplication computing function to encryption and sends to data consumer in client, data consumer is after the cryptographic calculation result receiving all multiplication computing functions, synchronous deciphering obtains all data.High in the clouds can be met carry out multiplying operation to encrypt data and can not get the information of data, improve data consumer simultaneously and multiple cryptographic calculation results returned from high in the clouds is deciphered simultaneously, improve computational efficiency.
Accompanying drawing explanation
Fig. 1 is the flow chart based on the multiplying method of Batch RSA in the cloud computing that provides of the embodiment of the present invention;
Fig. 2 is that in the embodiment of the present invention, data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation method in the schematic diagram of upwards filtration stage;
Fig. 3 is that in the embodiment of the present invention, data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation method in the schematic diagram of downward filtration stage;
Fig. 4 is the schematic diagram based on the multiplying system of Batch RSA in the cloud computing that provides of the embodiment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 shows the flow chart based on the multiplying method of Batch RSA in cloud computing.As shown in Figure 1, described method comprises the steps:
In step S101, data consumer User is to k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i), by described RSA PKI (e
i, N
i) be sent to corresponding multiplication computing function F respectively
iin included data set provider
, wherein, k, i, j, n are natural number, ei ≠ e
jand 1≤i, j≤k;
In the present embodiment, data consumer User is to k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i) method, comprise the steps: described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=P
iq
i,
random selecting integer e
i, wherein, e
i≠ e
j, 1≤i, j≤k and i ≠ j, and to meet
obtain RSA PKI (e
i, N
i).
In the present embodiment, data consumer User is to k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i) method, also comprise generation one and RSA PKI (e
i, N
i) the RSA private key (d of key each other
i, N
i), specifically comprise the steps: described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=p
iq
i,
random selecting integer e
i, wherein, e
i≠ e
j, 1≤i, j≤k and i ≠ j, and to meet
according to
try to achieve d
i, obtain RSA private key (d
i, N
i).
In step S102, described data consumer User utilizes PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data consumer
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data consumer
by multiplication computing function F
iand the enciphered data of corresponding described data consumer required for it
be sent to high in the clouds;
Such as, if multiplication computing function F
1the data of data consumer need be used
, then (e is used
1, N
1) encryption multiplication computing function F
1the data of required data consumer
; If multiplication computing function F
kthe data of user need be used
, then (e is used
k, N
k) encryption multiplication computing function F
kneeded for the data of data consumer used
.
In step S103, described data set provider
utilize PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data set provider
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data set provider
, by multiplication computing function F
ithe enciphered data of required described data set provider
be sent to high in the clouds;
Such as: if multiplication computing function F
idata set provider need be used
with
data, then data set provider
with
utilize PKI (e
i, N
i) encryption have separately and multiplication computing function F
ithe data needed.
In step S104, according to described multiplication computing function F
i, multiplying is carried out to enciphered data in described high in the clouds, obtains k multiplication computing function F
icryptographic calculation result RSA (F
i(result)), by k described cryptographic calculation result RSA (F
i(result)) be sent to described data consumer, described enciphered data comprises the enciphered data of described data consumer
with the enciphered data of described data set provider
Such as: if multiplication computing function F
1requirement calculated data supplier
data
, data set provider
data
and the data of data consumer (data)
product, then high in the clouds calculated data supplier
,
the product of rear data is encrypted with user's data:
, and by cryptographic calculation result RSA (F
i(result)) data consumer is returned to.Wherein,
represent and belong to data set provider
and multiplication computing function F
1required data;
representing utilizes rsa encryption to belong to data set provider
and multiplication computing function F
1enciphered data after required data;
represent multiplication computing function F
1required and belong to the data of data consumer.
In step S105, receive k multiplication computing function F described data consumer
icryptographic calculation result RSA (F
i(result)), described data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation result RSA (F
i(result)), each multiplication computing function F is obtained
idecrypt operation result.
In the present embodiment, as Fig. 2 and Fig. 3, described data consumer deciphers k multiplication computing function F simultaneously
ifor described data consumer deciphers based on Batch RSA technology simultaneously, Batch RSA technology is batch process RSA technology, specifically comprises the steps:
Upwards filtration stage: construct Batch tree from bottom to top, the branch of each leaf node is a PKI, and public exponent is E ← e
i, the public exponent value of interior nodes is the product E ← E of its left and right child's public exponent value
le
r, each encrypted cipher text c
icorresponding PKI e
ileaf node on, and each interior nodes
The exponentiation stage: calculate root node
Downward filtration stage: get X and make it meet: X=0 (mod E
l) and X=1 (mod E
r), push away to obtain X according to Chinese remainder theorem CRT, make X
l=X/E
land X
r=(X-1)/E
r, each interior nodes m
xbe equivalent to
utilize
and m
l← m/m
rrecurrence, tries to achieve each plaintext
Wherein
M
irepresent the plaintext after i-th deciphering.
Data consumer in the client produces corresponding PKI according to each multiplication computing function, and utilize the data of PKI corresponding to each multiplication computing function to the data consumer required for each multiplication computing function to be encrypted to be sent to high in the clouds, data set provider also utilizes the data of PKI corresponding to each multiplication computing function to the data set provider required for each multiplication computing function to be encrypted and is sent to high in the clouds simultaneously, high in the clouds is encrypted computing according to the data of each multiplication computing function to encryption and sends to data consumer in client, data consumer is after the cryptographic calculation result receiving all multiplication computing functions, synchronous deciphering obtains all data.High in the clouds can be met carry out multiplying operation to encrypt data and can not get the information of data, improve data consumer simultaneously and multiple cryptographic calculation results returned from high in the clouds is deciphered simultaneously, improve computational efficiency.
Fig. 4 shows the schematic diagram based on the multiplying system of Batch RSA in the cloud computing that the embodiment of the present invention provides, and described system comprises: the DEU data encryption unit 42 of RSA public key generation unit 41, data consumer, the DEU data encryption unit 43 of data set provider, multiplying unit 44 and deciphering arithmetic element 45.Specifically describe as follows:
RSA public key generation unit 41 is for k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i), by described RSA PKI (e
i, N
i) be sent to corresponding multiplication computing function F respectively
iin included data set provider
, wherein, k, i, j, n are natural number, e
i≠ e
iand 1≤i, j≤k.
Described RSA public key generation unit passes through described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=p
iq
i,
random selecting integer e
i, wherein, e
i≠ e
j, 1≤i, j≤k and i ≠ j, and to meet
obtain RSA PKI (e
i, N
i).
Described RSA public key generation unit comprises generation one and RSA PKI (e
i, N
i) the RSA private key (d of key each other
i, N
i), by described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=p
iq
i,
random selecting integer e
i, wherein, e
i≠ e
j, 1≤i, j≤k and i ≠ j, and to meet
according to
try to achieve d
i, obtain RSA private key (d
i, N
i).
The DEU data encryption unit 42 of data consumer utilizes PKI (e for described data consumer User
i, N
i) to multiplication computing function F
iin the data of required described data consumer
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data consumer
, by multiplication computing function F
iand the enciphered data of corresponding described data consumer required for it
be sent to high in the clouds.
Such as, if multiplication computing function F
1the data of data consumer need be used
, then (e is used
1, N
1) data of data consumer needed for encryption multiplication computing function F1
; If multiplication computing function F
kthe data of user need be used
then use (e
k, N
k) encryption multiplication computing function F
kneeded for the data of data consumer used
The DEU data encryption unit 43 of data set provider is for described data set provider
utilize PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data set provider
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data set provider
by multiplication computing function F
ithe enciphered data of required described data consumer
be sent to high in the clouds.
Such as: if multiplication computing function F
idata set provider need be used
with
data, then data set provider
with
utilize PKI (e
i, N
i) encryption have separately and multiplication computing function F
1the data needed.
Multiplying unit 44 is for according to described multiplication computing function F
i, multiplying is carried out to enciphered data in described high in the clouds, obtains k multiplication computing function F
icryptographic calculation result RSA (F
i(result)), individual for k listening is stated cryptographic calculation result RSA (F
i(result)) be sent to described data consumer, described enciphered data comprises the enciphered data of described data consumer
with the enciphered data of described data set provider
Such as: if multiplication computing function F
1requirement calculated data supplier
data
data set provider
data
with the data of data consumer
product, then high in the clouds calculated data supplier
the product of rear data is encrypted with user's data:
and by cryptographic calculation result RSA (F
i(result)) data consumer is returned to.Wherein,
represent and belong to data set provider
and multiplication computing function F
1required data;
representing utilizes rsa encryption to belong to data set provider
and multiplication computing function F
1enciphered data after required data;
represent multiplication computing function F
1required and belong to the data of data consumer.
Decrypt operation unit 45 receives k multiplication computing function F described data consumer
icryptographic calculation result RSA (F
i(result)), described data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation result RSA (F
i(result)), each multiplication computing function F is obtained
idecrypt operation result.
Data consumer in the client produces corresponding PKI according to each multiplication computing function, and utilize the data of PKI corresponding to each multiplication computing function to the data consumer required for each multiplication computing function to be encrypted to be sent to high in the clouds, data set provider also utilizes the data of PKI corresponding to each multiplication computing function to the data set provider required for each multiplication computing function to be encrypted and is sent to high in the clouds simultaneously, high in the clouds is encrypted computing according to the data of each multiplication computing function to encryption and sends to data consumer in client, data consumer is after the cryptographic calculation result receiving all multiplication computing functions, synchronous deciphering obtains all data.High in the clouds can be met carry out multiplying operation to encrypt data and can not get the information of data, improve data consumer simultaneously and multiple cryptographic calculation results returned from high in the clouds is deciphered simultaneously, improve computational efficiency.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.
Claims (7)
1. in cloud computing based on a multiplying method of Batch RSA, it is characterized in that, described method comprises the steps:
Data consumer User is to k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i), by described RSA PKI (e
i, N
i) be sent to corresponding multiplication computing function F respectively
iin included data set provider
, wherein, k, i, j, n are natural number, e
i≠ e
iand 1≤i, j≤k;
Described data consumer User utilizes PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data consumer
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data consumer
, by multiplication computing function F
iand the enciphered data of corresponding described data consumer required for it
be sent to high in the clouds;
Described data set provider
utilize PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data set provider
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data set provider
, by multiplication computing function F
ithe enciphered data of required described data set provider
be sent to high in the clouds;
According to described multiplication computing function F
i, multiplying is carried out to enciphered data in described high in the clouds, obtains k multiplication computing function F
icryptographic calculation result RSA (F
i(result)), by k described cryptographic calculation result RSA (F
i(result)) be sent to described data consumer, described enciphered data comprises the enciphered data of described data consumer
with the enciphered data of described data set provider
;
K multiplication computing function F is received described data consumer
icryptographic calculation result RSA (F
i(result)), described data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation result RSA (F
i(result)), each multiplication computing function F is obtained
idecrypt operation result.
2. the method for claim 1, is characterized in that, described data consumer User is to k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i) method, comprise the steps:
To described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=P
iq
i,
Random selecting integer e
i, wherein, e
i≠ e
j, 1≤i, j≤k and i ≠ j, and to meet
obtain RSA PKI (e
i, N
i).
3. the method for claim 1, is characterized in that, described data consumer User is to k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i) method, also comprise generation one and RSA PKI (e
i, N
i) the RSA private key (d of key each other
i, N
i), specifically comprise the steps:
To described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=P
iq
i,
Random selecting integer e
i, wherein, e
i≠ e
j, 1≤i, j≤k and i ≠ j, and to meet
According to
try to achieve d
i, obtain RSA private key (d
i, N
i).
4. the method for claim 1, is characterized in that, described data consumer deciphers k multiplication computing function F simultaneously
ifor described data consumer deciphers based on Batch RSA technology simultaneously, specifically comprise the steps:
Construct Batch tree from bottom to top, the branch of each leaf node is a PKI, and public exponent is E ← e
i, the public exponent value of interior nodes is the product E ← E of its left and right child's public exponent value
le
r, each encrypted cipher text ci is on the leaf node corresponding PKI ei, and each interior nodes
obtain root node
Getting X makes it meet: X=0 (mod E
l) and X=1 (mod E
r), push away to obtain X according to Chinese remainder theorem CRT, make X
l=X/E
land X
r=(X-1)/E
r, each interior nodes m
xbe equivalent to
utilize
and m
l← m/m
rrecurrence, tries to achieve each plaintext
Wherein
5. in cloud computing based on a multiplying system of Batch RSA, it is characterized in that, described system comprises:
RSA public key generation unit, for k multiplication computing function F
irSA PKI (the e that generation one is corresponding respectively
i, N
i), by described RSA PKI (e
i, N
i) be sent to corresponding multiplication computing function F respectively
iin included data set provider
, wherein, k, i, j, n are natural number, e
i≠ e
iand 1≤i, j≤k;
The DEU data encryption unit of data consumer, utilizes PKI (e for described data consumer User
i, N
i) to multiplication computing function F
iin the data of required described data consumer
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data consumer
, by multiplication computing function F
iand the enciphered data of corresponding described data consumer required for it
be sent to high in the clouds;
The DEU data encryption unit of data set provider, for described data set provider
utilize PKI (e
i, N
i) to multiplication computing function F
iin the data of required described data set provider
be encrypted, form corresponding multiplication computing function F
ithe enciphered data of required described data set provider
, by multiplication computing function F
ithe enciphered data of required described data consumer
be sent to high in the clouds;
Multiplying unit, for according to described multiplication computing function F
i, multiplying is carried out to enciphered data in described high in the clouds, obtains k multiplication computing function F
icryptographic calculation result RSA (F
i(result)), by k described cryptographic calculation result RSA (F
i(result)) be sent to described data consumer, described enciphered data comprises the enciphered data of described data consumer
with the enciphered data of described data set provider
;
Decrypt operation unit, receives k multiplication computing function F described data consumer
icryptographic calculation result RSA (F
i(result)), described data consumer deciphers k multiplication computing function F simultaneously
icryptographic calculation result RSA (F
i(result)), each multiplication computing function F is obtained
idecrypt operation result.
6. system as claimed in claim 5, is characterized in that, described RSA public key generation unit passes through described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=p
iq
i,
random selecting integer e
i, wherein, e
i≠ e
j, 1≤i, j≤k and i ≠ j, and to meet
obtain RSA PKI (e
i, N
i).
7. system as claimed in claim 5, is characterized in that, described RSA public key generation unit comprises generation one and RSA PKI (e
i, N
i) the RSA private key (d of key each other
i, N
i), by described multiplication computing function F
i(1≤i≤k) chooses two Big prime p
i, q
i, calculate N
i=P
iq
i,
random selecting integer ei, wherein, ei ≠ ej, 1≤i, j≤k and i ≠ j, and meet
according to
try to achieve d
i, obtain RSA private key (d
i, N
i).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410142505.1A CN104980271B (en) | 2014-04-10 | 2014-04-10 | Multiplying method and system based on Batch RSA in a kind of cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410142505.1A CN104980271B (en) | 2014-04-10 | 2014-04-10 | Multiplying method and system based on Batch RSA in a kind of cloud computing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104980271A true CN104980271A (en) | 2015-10-14 |
CN104980271B CN104980271B (en) | 2018-04-17 |
Family
ID=54276405
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410142505.1A Active CN104980271B (en) | 2014-04-10 | 2014-04-10 | Multiplying method and system based on Batch RSA in a kind of cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104980271B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209371A (en) * | 2016-07-25 | 2016-12-07 | 青岛大学 | It is applied to RSA Algorithm and generates the outsourcing method of key |
CN107124276A (en) * | 2017-04-07 | 2017-09-01 | 西安电子科技大学 | A kind of safe data outsourcing machine learning data analysis method |
CN107294698A (en) * | 2017-07-25 | 2017-10-24 | 西安电子科技大学 | The full homomorphic cryptography method that single ciphertext homomorphism is calculated |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095459A (en) * | 2013-01-17 | 2013-05-08 | 广东数字证书认证中心有限公司 | Operation method, device and server of modular exponentiation in public key cryptosystem |
CN103209073A (en) * | 2013-01-17 | 2013-07-17 | 北京昆腾微电子有限公司 | Anti-attack method and device in electronic component using Rivest-Shamir-Adleman (RSA) public-key encryption algorithm |
CN103401871A (en) * | 2013-08-05 | 2013-11-20 | 苏州大学 | Method and system for sequencing ciphertexts orienting to homomorphic encryption |
CN103428299A (en) * | 2013-09-04 | 2013-12-04 | 安徽大学 | Cloud storage access control method |
-
2014
- 2014-04-10 CN CN201410142505.1A patent/CN104980271B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095459A (en) * | 2013-01-17 | 2013-05-08 | 广东数字证书认证中心有限公司 | Operation method, device and server of modular exponentiation in public key cryptosystem |
CN103209073A (en) * | 2013-01-17 | 2013-07-17 | 北京昆腾微电子有限公司 | Anti-attack method and device in electronic component using Rivest-Shamir-Adleman (RSA) public-key encryption algorithm |
CN103401871A (en) * | 2013-08-05 | 2013-11-20 | 苏州大学 | Method and system for sequencing ciphertexts orienting to homomorphic encryption |
CN103428299A (en) * | 2013-09-04 | 2013-12-04 | 安徽大学 | Cloud storage access control method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209371A (en) * | 2016-07-25 | 2016-12-07 | 青岛大学 | It is applied to RSA Algorithm and generates the outsourcing method of key |
CN106209371B (en) * | 2016-07-25 | 2019-05-03 | 青岛大学 | The outsourcing method of key is generated applied to RSA Algorithm |
CN107124276A (en) * | 2017-04-07 | 2017-09-01 | 西安电子科技大学 | A kind of safe data outsourcing machine learning data analysis method |
CN107294698A (en) * | 2017-07-25 | 2017-10-24 | 西安电子科技大学 | The full homomorphic cryptography method that single ciphertext homomorphism is calculated |
CN107294698B (en) * | 2017-07-25 | 2019-11-26 | 西安电子科技大学 | The full homomorphic cryptography method that single ciphertext homomorphism calculates |
Also Published As
Publication number | Publication date |
---|---|
CN104980271B (en) | 2018-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102546181B (en) | Cloud storage encrypting and deciphering method based on secret key pool | |
CN112822014B (en) | Data processing method and device, electronic equipment and storage medium | |
CN103259643B (en) | A kind of full homomorphic cryptography method of matrix | |
CN102523093B (en) | Encapsulation method and encapsulation system for certificate-based key with label | |
CN103475472B (en) | The full homomorphic cryptography method of NTRU types on ring LWE | |
CN110120939B (en) | Encryption method and system capable of repudiation authentication based on heterogeneous system | |
CN107196926A (en) | A kind of cloud outsourcing privacy set comparative approach and device | |
CN103957109A (en) | Cloud data privacy protection security re-encryption method | |
CN103414569A (en) | Method for establishing anti-attack public key cryptogram | |
CN104038341A (en) | Identity-based cross-system proxy re-encryption method | |
CN104393996B (en) | A kind of label decryption method and system based on no certificate | |
CN103973439B (en) | A kind of multi-variable public key ciphering method | |
CN104767612A (en) | Signcryption method from certificateless environment to public key infrastructure environment | |
CN105025024A (en) | Certificateless condition based proxy re-encryption system and method | |
CN104767611B (en) | It is a kind of from PKIX environment to the label decryption method without certificate environment | |
CN102710661B (en) | Cloud storage and aggregation architecture and data storage and aggregation method by using same | |
CN104967513A (en) | Identity-based multi-recipient ring signcryption method with multiple safety attributes | |
CN104519071A (en) | Group encryption and decryption method and system with selection and exclusion functions | |
CN105763528B (en) | The encryption device of diversity person's anonymity under a kind of mixed mechanism | |
CN104135473A (en) | A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption | |
CN103916248A (en) | Fully homomorphic encryption public key space compression method | |
CN104158880A (en) | User-end cloud data sharing solution | |
CN113225371A (en) | Electric power Internet of things terminal control instruction encryption and decryption system and method | |
CN104753947A (en) | Attribute-based verifiable outsourcing decryption system and method with fixed ciphertext length | |
CN106357397A (en) | Sender-authenticated asymmetric group key negotiation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |