CN115102686A - Semi-homomorphic encryption method and device, electronic equipment and storage medium - Google Patents

Semi-homomorphic encryption method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115102686A
CN115102686A CN202210745427.9A CN202210745427A CN115102686A CN 115102686 A CN115102686 A CN 115102686A CN 202210745427 A CN202210745427 A CN 202210745427A CN 115102686 A CN115102686 A CN 115102686A
Authority
CN
China
Prior art keywords
semi
homomorphic
predicted value
analysis result
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210745427.9A
Other languages
Chinese (zh)
Inventor
周辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202210745427.9A priority Critical patent/CN115102686A/en
Publication of CN115102686A publication Critical patent/CN115102686A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher

Abstract

The embodiment of the application provides a semi-homomorphic encryption method, a semi-homomorphic encryption device, electronic equipment and a storage medium, wherein the method comprises the following steps: receiving a public key of the semi-homomorphic decryption device; acquiring a secret key; obtaining a predicted value according to the secret key; encrypting the predicted value according to the public key to obtain a predicted value list; analyzing the prediction value list to obtain an analysis result; and sending the analysis result to a semi-homomorphic decryption device so that the semi-homomorphic decryption device decrypts the analysis result. By implementing the embodiment of the application, the operation efficiency in the encryption process can be improved, the occupied space of the secret key is reduced, the encryption effect is improved, and the encryption time is shortened.

Description

Semi-homomorphic encryption method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of cryptographic key technology, and in particular, to a semi-homomorphic encryption method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the rapid development of big data and artificial intelligence, personal privacy data disclosure and abuse occur occasionally, and privacy security problems are more and more emphasized.
The existing encryption technologies are various in types, and many encryption technologies need to perform complex calculation after obtaining a ciphertext, a large amount of time and calculation space are wasted in the process, or the performance of the encryption technology is poor, so that a key is too large, the operation efficiency is low, the occupation space of the ciphertext is too large, and the like, so that the encryption method cannot perform encryption well, and a large amount of operation time is wasted in the process.
Disclosure of Invention
An object of the embodiments of the present application is to provide a semi-homomorphic encryption method, apparatus, electronic device, and computer-readable storage medium, which can improve the operation efficiency in the encryption process, reduce the occupied space of the secret key, improve the encryption effect, and shorten the encryption time.
In a first aspect, an embodiment of the present application provides a semi-homomorphic encryption method, which is used for a semi-homomorphic encryption apparatus, and the method includes:
receiving a public key of the semi-homomorphic decryption device;
acquiring a secret key;
obtaining a predicted value according to the secret key;
encrypting the predicted value according to the public key to obtain a predicted value list;
analyzing the prediction value list to obtain an analysis result;
and sending the analysis result to a semi-homomorphic decryption device so that the semi-homomorphic decryption device decrypts the analysis result.
In the implementation process, the predicted value is encrypted according to the public key, and the obtained predicted value list is analyzed to obtain an analysis result, so that the operation efficiency in the encryption process can be improved, the occupied space of the secret key is reduced, the encryption effect is improved, and the encryption time is shortened.
Further, the step of obtaining a predicted value according to the key includes:
carrying out pseudo-random replacement on the secret key to obtain a replacement sequence;
and obtaining the predicted value according to the permutation sequence.
In the implementation process, the secret key is subjected to pseudo-random replacement to obtain a replacement sequence, so that the accuracy and stability of encryption can be improved, and the encryption effect is better.
Further, the step of encrypting the predicted value according to the public key to obtain a predicted value list includes:
and arranging and recombining the predicted values according to the public key to obtain the predicted value list.
In the implementation process, the predicted values are arranged and recombined according to the public key, so that the encryption performance can be improved, and the encryption effect is better.
In a second aspect, an embodiment of the present application provides a semi-homomorphic decryption method, which is used for a semi-homomorphic decryption apparatus, and the method includes:
sending the public key to a semi-homomorphic encryption device;
receiving an analysis result sent from the semi-homomorphic encryption device;
obtaining a private key;
and decrypting the analysis result according to the private key to obtain a decryption result.
In the implementation process, the analysis result is decrypted according to the private key to obtain a decryption result, so that the accuracy of the decryption result is ensured, the running time is improved, the occupied space of the key is reduced, and the decryption time is shortened.
In a third aspect, an embodiment of the present application further provides a semi-homomorphic encryption apparatus, where the apparatus includes:
the first receiving module is used for receiving and transmitting a public key of the semi-homomorphic decryption device;
the first obtaining module is used for obtaining the secret key;
the prediction module is used for obtaining a prediction value according to the secret key;
the encryption module is used for encrypting the predicted value according to the public key to obtain a predicted value list;
the analysis module is used for analyzing the predicted value list to obtain an analysis result;
and the first sending module is used for sending the analysis result to a semi-homomorphic decryption device so that the semi-homomorphic decryption device decrypts the analysis result.
In the implementation process, the predicted value is encrypted according to the public key, and the obtained predicted value list is analyzed to obtain an analysis result, so that the operation efficiency in the encryption process can be improved, the occupied space of the secret key is reduced, the encryption effect is improved, and the encryption time is shortened.
Further, the prediction module is further configured to:
carrying out pseudo-random replacement on the secret key to obtain a replacement sequence;
and obtaining the predicted value according to the permutation sequence.
In the implementation process, the secret key is subjected to pseudo-random replacement to obtain a replacement sequence, so that the accuracy and stability of encryption can be improved, and the encryption effect is better.
Further, the encryption module is further configured to:
and arranging and recombining the predicted values according to the public key to obtain the predicted value list.
In the implementation process, the predicted values are arranged and recombined according to the public key, so that the encryption performance can be improved, and the encryption effect is better.
In a fourth aspect, an embodiment of the present application further provides a semi-homomorphic decryption apparatus, where the apparatus includes:
the second sending module is used for sending the public key to the semi-homomorphic encryption device;
the second receiving module is used for receiving the analysis result sent from the semi-homomorphic encryption device;
the second acquisition module is used for acquiring a private key;
and the decryption module is used for decrypting the analysis result according to the private key to obtain a decryption result.
In the implementation process, the analysis result is decrypted according to the private key to obtain a decryption result, so that the accuracy of the decryption result is ensured, the running time is increased, the occupied space of the key is reduced, and the decryption time is shortened.
In a fifth aspect, an electronic device provided in an embodiment of the present application includes: memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to any of the first aspect when executing the computer program.
In a sixth aspect, an embodiment of the present application provides a computer-readable storage medium, having stored thereon instructions, which, when executed on a computer, cause the computer to perform the method according to any one of the first aspect.
In a seventh aspect, an embodiment of the present application provides a computer program product, which when run on a computer, causes the computer to execute the method according to any one of the first aspect.
Additional features and advantages of the disclosure will be set forth in the description which follows, or in part may be learned by the practice of the above-described techniques of the disclosure, or may be learned by practice of the disclosure.
The present invention can be implemented in accordance with the content of the specification, and the following detailed description of the preferred embodiments of the present application is made with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic flowchart of a semi-homomorphic encryption method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a semi-homomorphic decryption method according to an embodiment of the present application;
fig. 3 is a schematic structural component diagram of a semi-homomorphic encryption device according to an embodiment of the present application;
fig. 4 is a schematic structural component diagram of a semi-homomorphic decryption device according to an embodiment of the present application;
fig. 5 is a schematic structural component diagram of a semi-homomorphic encryption system according to an embodiment of the present application;
fig. 6 is a schematic structural component diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
The following detailed description of embodiments of the present application will be described in conjunction with the accompanying drawings and examples. The following examples are intended to illustrate the present application but are not intended to limit the scope of the present application.
Example one
Fig. 1 is a schematic flowchart of a semi-homomorphic encryption method provided in an embodiment of the present application, and as shown in fig. 1, the method includes:
s10, receiving the public key of the semi-homomorphic decryption device;
s11, acquiring a key;
s12, obtaining a predicted value according to the key;
s13, encrypting the predicted value according to the public key to obtain a predicted value list;
s14, analyzing the predicted value list to obtain an analysis result;
s15, the analysis result is sent to the semi-homomorphic decryption device, so that the semi-homomorphic decryption device decrypts the analysis result.
In the implementation process, the predicted value is encrypted according to the public key, and the obtained predicted value list is analyzed to obtain an analysis result, so that the operation efficiency in the encryption process can be improved, the occupied space of the secret key is reduced, the encryption effect is improved, and the encryption time is shortened.
semi-Homomorphic Encryption (PHE) is a cryptographic primitive that is an asymmetric Encryption that can be added and subtracted in the secret domain, with only the party with the private key decrypting the result. The semi-homomorphic encrypted secret is generally ambiguous, meaning that the same number, e.g., 0, is encrypted with the same public key, with the results of the two encryptions being different.
The semi-homomorphic encryption only supports one operation of addition or multiplication, or can simultaneously support the addition and multiplication operations of limited times, and has the advantages of simple principle, easy realization, good performance and the like.
Semi-homomorphic encryption may generate keys for generating the public key PK (public Key) and the private key SK (secret Key) of the encrypted data, as well as some public parameters PP (public parameter).
Common uses of semi-homomorphic encryption include:
1. user data is encrypted using PK to obtain ciphertext ct (cipertext).
2. The ciphertext CT is decrypted by using the SK to obtain a data plaintext PT (plaintext).
3. And (4) ciphertext homomorphic addition, and inputting two CTs for homomorphic addition operation.
4. And (4) ciphertext homomorphic subtraction, and inputting two CTs for homomorphic subtraction.
5. And (3) ciphertext homomorphic scalar multiplication, inputting a CT and a scalar PT, and calculating a scalar multiplication result of the CT.
Further, S3 includes:
carrying out pseudo-random replacement on the secret key to obtain a replacement sequence;
and obtaining the predicted value according to the permutation sequence.
In the implementation process, the secret key is subjected to pseudo-random replacement to obtain a replacement sequence, so that the accuracy and stability of encryption can be improved, and the encryption effect is better.
Further, S4 includes:
and arranging and recombining the predicted values according to the public key to obtain a predicted value list.
In the implementation process, the predicted values are arranged and recombined according to the public key, so that the encryption performance can be improved, and the encryption effect is better.
In S5, taking the embodiment of the present application as an example, the analyzing the predicted value list may be performed by performing homomorphic subtraction on the predicted values by using ciphertext homomorphic subtraction to obtain an analysis result.
Example two
Fig. 2 is a schematic flowchart of a semi-homomorphic decryption method provided in an embodiment of the present application, and as shown in fig. 2, the method includes:
s20, sending the public key to the semi-homomorphic encryption device;
s21, receiving the analysis result sent from the semi-homomorphic encryption device;
s22, obtaining a private key;
and S23, decrypting the analysis result according to the private key to obtain a decryption result.
In the implementation process, the analysis result is decrypted according to the private key to obtain a decryption result, so that the accuracy of the decryption result is ensured, the running time is improved, the occupied space of the key is reduced, and the decryption time is shortened.
EXAMPLE III
In order to implement a corresponding method of the above embodiment to achieve corresponding functions and technical effects, the following provides a semi-homomorphic encryption apparatus, as shown in fig. 3, the apparatus including:
a first receiving module 10, configured to receive a public key of a semi-homomorphic decryption device;
a first obtaining module 11, configured to obtain a secret key;
a prediction module 12, configured to obtain a prediction value according to the key;
the encryption module 13 is configured to encrypt the predicted value according to the public key to obtain a predicted value list;
the analysis module 14 is configured to analyze the predicted value list to obtain an analysis result;
and the first sending module 15 is configured to send the analysis result to the semi-homomorphic decryption device, so that the semi-homomorphic decryption device decrypts the analysis result.
In the implementation process, the predicted value is encrypted according to the public key, and the obtained predicted value list is analyzed to obtain an analysis result, so that the operation efficiency in the encryption process can be improved, the occupied space of the secret key is reduced, the encryption effect is improved, and the encryption time is shortened.
Further, the prediction module 12 is further configured to:
carrying out pseudo-random replacement on the secret key to obtain a replacement sequence;
and obtaining a predicted value according to the permutation sequence.
In the implementation process, the secret key is subjected to pseudo-random replacement to obtain a replacement sequence, so that the accuracy and stability of encryption can be improved, and the encryption effect is better.
Further, the encryption module 13 is further configured to:
and arranging and recombining the predicted values according to the public key to obtain a predicted value list.
In the implementation process, the predicted values are arranged and recombined according to the public key, so that the encryption performance can be improved, and the encryption effect is better.
The semi-homomorphic encryption device can implement the method of the first embodiment. The alternatives in the first embodiment are also applicable to the present embodiment, and are not described in detail here.
The rest of the embodiments of the present application may refer to the contents of the first embodiment, and in this embodiment, details are not repeated.
Example four
In order to implement the corresponding method of the above embodiment to achieve the corresponding functions and technical effects, the following provides a semi-homomorphic decryption apparatus, as shown in fig. 4, the apparatus including:
a second sending module 20, configured to send the public key to the semi-homomorphic encryption apparatus;
a second receiving module 21, configured to receive an analysis result sent from the semi-homomorphic encryption apparatus;
a second obtaining module 22, configured to obtain a private key;
and the decryption module 23 is configured to decrypt the analysis result according to the private key to obtain a decryption result.
In the implementation process, the analysis result is decrypted according to the private key to obtain a decryption result, so that the accuracy of the decryption result is ensured, the running time is improved, the occupied space of the key is reduced, and the decryption time is shortened.
The semi-homomorphic decryption apparatus can implement the method of the second embodiment. The options in the second embodiment above are also applicable to this embodiment, and are not described in detail here.
The rest of the embodiments of the present application may refer to the contents of the second embodiment, and in this embodiment, details are not repeated.
EXAMPLE five
An encryption system provided in the embodiment of the present application, as shown in fig. 5, includes a semi-homomorphic encryption device in the third embodiment and a semi-homomorphic decryption device in the fourth embodiment:
a first receiving module 10, configured to receive a public key of a semi-homomorphic decryption device;
a first obtaining module 11, configured to obtain a secret key;
a prediction module 12, configured to obtain a prediction value according to the key;
the encryption module 13 is configured to encrypt the predicted value according to the public key to obtain a predicted value list;
the analysis module 14 is configured to analyze the predicted value list to obtain an analysis result;
a first sending module 15, configured to send the analysis result to the semi-homomorphic decryption device, so that the semi-homomorphic decryption device decrypts the analysis result;
a second sending module 20, configured to send the public key to the semi-homomorphic encryption apparatus;
a second receiving module 21, configured to receive an analysis result sent from the semi-homomorphic encryption apparatus;
a second obtaining module 22, configured to obtain a private key;
and the decryption module 23 is configured to decrypt the analysis result according to the private key to obtain a decryption result.
EXAMPLE six
An embodiment of the present application provides an electronic device, which includes a memory and a processor, where the memory is used to store a computer program, and the processor runs the computer program to make the electronic device execute the semi-homomorphic encryption method according to the first embodiment.
Alternatively, the electronic device may be a server.
Referring to fig. 6, fig. 6 is a schematic structural composition diagram of an electronic device according to an embodiment of the present disclosure. The electronic device may include a processor 61, a communication interface 62, a memory 63, and at least one communication bus 64. Wherein the communication bus 64 is used to enable direct connection communication of these components. The communication interface 62 of the device in the embodiment of the present application is used for communicating signaling or data with other node devices. The processor 61 may be an integrated circuit chip having signal processing capabilities.
The Processor 61 may be a general-purpose Processor including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor 61 may be any conventional processor or the like.
The Memory 63 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Read Only Memory (EPROM), an electrically Erasable Read Only Memory (EEPROM), and the like. The memory 63 has stored therein computer readable instructions which, when executed by said processor 61, the device is able to carry out the various steps involved in the method embodiment of fig. 1 described above.
Optionally, the electronic device may further include a memory controller, an input output unit. The memory 63, the memory controller, the processor 61, the peripheral interface, and the input/output unit are electrically connected to each other directly or indirectly to realize data transmission or interaction. For example, these components may be electrically coupled to each other via one or more communication buses 64. The processor 61 is adapted to execute executable modules stored in the memory 63, such as software functional modules or computer programs comprised by the device.
The input and output unit is used for providing a task for a user to create and start an optional time period or preset execution time for the task creation so as to realize the interaction between the user and the server. The input/output unit may be, but is not limited to, a mouse, a keyboard, and the like.
It will be appreciated that the configuration shown in fig. 6 is merely illustrative and that the electronic device may include more or fewer components than shown in fig. 6 or have a different configuration than shown in fig. 6. The components shown in fig. 6 may be implemented in hardware, software, or a combination thereof.
In addition, an embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the semi-homomorphic encryption method according to the first embodiment.
Embodiments of the present application further provide a computer program product, which when running on a computer, causes the computer to execute the method described in the method embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based devices that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.

Claims (10)

1. A semi-homomorphic encryption method for use in a semi-homomorphic encryption device, the method comprising:
receiving a public key of the semi-homomorphic decryption device;
acquiring a secret key;
obtaining a predicted value according to the secret key;
encrypting the predicted value according to the public key to obtain a predicted value list;
analyzing the prediction value list to obtain an analysis result;
and sending the analysis result to a semi-homomorphic decryption device so that the semi-homomorphic decryption device decrypts the analysis result.
2. The semi-homomorphic encryption method of claim 1, wherein said step of obtaining a predicted value based on said key comprises:
carrying out pseudo-random replacement on the secret key to obtain a replacement sequence;
and obtaining the predicted value according to the permutation sequence.
3. The semi-homomorphic encryption method of claim 1, wherein said step of encrypting said predicted value according to said public key to obtain a predicted value list comprises:
and arranging and recombining the predicted values according to the public key to obtain the predicted value list.
4. A semi-homomorphic decryption method for use with a semi-homomorphic decryption device, the method comprising:
sending the public key to the semi-homomorphic encryption device;
receiving an analysis result sent from the semi-homomorphic encryption device;
obtaining a private key;
and decrypting the analysis result according to the private key to obtain a decryption result.
5. A semi-homomorphic encryption apparatus, the apparatus comprising:
the first receiving module is used for receiving and transmitting a public key of the semi-homomorphic decryption device;
the first acquisition module is used for acquiring a secret key;
the prediction module is used for obtaining a prediction value according to the secret key;
the encryption module is used for encrypting the predicted value according to the public key to obtain a predicted value list;
the analysis module is used for analyzing the predicted value list to obtain an analysis result;
and the first sending module is used for sending the analysis result to a semi-homomorphic decryption device so that the semi-homomorphic decryption device decrypts the analysis result.
6. The semi-homomorphic encryption device of claim 5, wherein the prediction module is further configured to:
carrying out pseudo-random replacement on the secret key to obtain a replacement sequence;
and obtaining the predicted value according to the permutation sequence.
7. The semi-homomorphic encryption device of claim 5, wherein the encryption module is further configured to:
and arranging and recombining the predicted values according to the public key to obtain the predicted value list.
8. A semi-homomorphic decryption device, the device comprising:
the second sending module is used for sending the public key to the semi-homomorphic encryption device;
the second receiving module is used for receiving the analysis result sent from the semi-homomorphic encryption device;
the second acquisition module is used for acquiring a private key;
and the decryption module is used for decrypting the analysis result according to the private key to obtain a decryption result.
9. An electronic device, comprising a memory for storing a computer program and a processor for executing the computer program to cause the electronic device to perform the semi-homomorphic encryption method of any of claims 1-3 or 4.
10. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the semi-homomorphic encryption method of any one of claims 1 to 3 or 4.
CN202210745427.9A 2022-06-27 2022-06-27 Semi-homomorphic encryption method and device, electronic equipment and storage medium Pending CN115102686A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210745427.9A CN115102686A (en) 2022-06-27 2022-06-27 Semi-homomorphic encryption method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210745427.9A CN115102686A (en) 2022-06-27 2022-06-27 Semi-homomorphic encryption method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115102686A true CN115102686A (en) 2022-09-23

Family

ID=83295268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210745427.9A Pending CN115102686A (en) 2022-06-27 2022-06-27 Semi-homomorphic encryption method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115102686A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116208316A (en) * 2023-04-27 2023-06-02 蓝象智联(杭州)科技有限公司 Semi-homomorphic encryption method and device for saving storage space and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116208316A (en) * 2023-04-27 2023-06-02 蓝象智联(杭州)科技有限公司 Semi-homomorphic encryption method and device for saving storage space and storage medium
CN116208316B (en) * 2023-04-27 2023-07-18 蓝象智联(杭州)科技有限公司 Semi-homomorphic encryption method and device for saving storage space and storage medium

Similar Documents

Publication Publication Date Title
US10652010B2 (en) Fully homomorphic encrypted ciphertext query method and system
CN112202754B (en) Data encryption method and device, electronic equipment and storage medium
CN106817358B (en) Encryption and decryption method and device for user resources
JP2014119486A (en) Secret retrieval processing system, secret retrieval processing method, and secret retrieval processing program
CN110019075B (en) Log encryption method and device and log decryption method and device
CN111131282B (en) Request encryption method and device, electronic equipment and storage medium
CN110505054B (en) Data processing method, device and equipment based on dynamic white box
US20160013933A1 (en) Order-preserving encryption system, device, method, and program
WO2014007296A1 (en) Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
US11251936B2 (en) System and method for performing homomorphic aggregation over encrypted data
JP6915375B2 (en) Polynomial-based homomorphic encryption
CN112865957A (en) Data encryption transmission method and device, computer target equipment and storage medium
Raj et al. Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud
CN111404892B (en) Data supervision method and device and server
CN110995720A (en) Encryption method, device, host terminal and encryption chip
Shantha et al. Analysis and implementation of ECC algorithm in lightweight device
CN114443718A (en) Data query method and system
CN111555880A (en) Data collision method and device, storage medium and electronic equipment
CN115102686A (en) Semi-homomorphic encryption method and device, electronic equipment and storage medium
JP6585846B2 (en) Secret calculation system, secret calculation device, secret calculation method, and program
CN110249299A (en) Generate method, chip and the electronic equipment of random number
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN115001869A (en) Encryption transmission method and system
Liu et al. Proofs of encrypted data retrievability with probabilistic and homomorphic message authenticators
CN115037442B (en) Model effect detection method and device, storage medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination