CN103475472B - The full homomorphic cryptography method of NTRU types on ring LWE - Google Patents

The full homomorphic cryptography method of NTRU types on ring LWE Download PDF

Info

Publication number
CN103475472B
CN103475472B CN201310322018.9A CN201310322018A CN103475472B CN 103475472 B CN103475472 B CN 103475472B CN 201310322018 A CN201310322018 A CN 201310322018A CN 103475472 B CN103475472 B CN 103475472B
Authority
CN
China
Prior art keywords
key
ciphertext
full homomorphic
public key
homomorphic cryptography
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310322018.9A
Other languages
Chinese (zh)
Other versions
CN103475472A (en
Inventor
陈智罡
潘铁军
奚李峰
金冉
宋新霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Wanli College
Original Assignee
Zhejiang Wanli College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Wanli College filed Critical Zhejiang Wanli College
Priority to CN201310322018.9A priority Critical patent/CN103475472B/en
Publication of CN103475472A publication Critical patent/CN103475472A/en
Application granted granted Critical
Publication of CN103475472B publication Critical patent/CN103475472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention discloses a kind of full homomorphic cryptography methods of NTRU types on ring LWE, by defined parameters;Carry out the ciphering process of a part homomorphism;Proceed without the full homomorphic cryptography process of startup.It is exchanged and mould switching technology by key, with addition encryption and multiplication encryption in ciphering process, the noise for exporting ciphertext is less than the noise of input ciphertext, play the role of updating ciphertext, but its efficiency realized will be due to the process of startup, to realize the full homomorphic cryptography method for being not necessarily to start, encryption efficiency is high, and the ciphertext of acquisition is also shorter.

Description

The full homomorphic cryptography method of NTRU types on ring LWE
Technical field
The present invention relates to encryption method field, the full homomorphic cryptography method of NTRU types on specifically a kind of ring LWE.
Background technology
Full homomorphic cryptography can carry out ciphertext the calculating of arbitrary function, this is special in the case where not knowing key Property so that full homomorphic cryptography is widely used demand, such as;Cloud computing safety, data base ciphertext search, Secure meter Calculation, ciphertext data programmable system etc..Full homomorphic cryptography is applied under cloud computing environment, user can be by encrypted data It is contracted out to high in the clouds, then high in the clouds can be according to the request (such as inquiry, statistics etc.) of user, and it (is to ciphertext to do corresponding calculate Carry out, the encryption of general type cannot calculate ciphertext, and only full homomorphic cryptography just can be with), then result is returned Back to user, desired result can be obtained by after user's decryption.User is because the data of oneself are encrypted without being exposed to High in the clouds, data-privacy safety are ensured that high in the clouds can do ciphertext arbitrary calculation process because being not necessarily to decryption, from And realize the safety of cloud computing.Full homomorphic cryptography research is had important section by the very big concern of academia and industrial quarters Learn meaning and application value.
Full homomorphic cryptography was just proposed by Rivest, Adleman and Dertouzos early in 1978, just became password later The open problem of one of educational circles, is known as " Holy grail " of password educational circles.Then many homomorphic encryption schemes were generated in succession, these Or scheme is to meet additive homomorphism or is to meet multiplicative homomorphic, more also it can meet limited sub-addition simultaneously and multiply The homomorphism scheme of method, but neither one is that (" complete " of full homomorphism refers to that arbitrary function can be counted full homomorphism It calculates).Until Gentry in 2009 it is breakthrough construct first full homomorphic encryption scheme.Gentry is in circuit counting model Under, full homomorphic encryption scheme is constructed based on ideal lattice.Although full homomorphic encryption scheme realizes, the scheme of Gentry has Two defects:First is that (progressive complexity is about inefficient), wherein λ is security parameter);Second is the mistake of structural scheme Two relied in journey assume (circulation safe problem and sparse subset and problem) not by people's in-depth study mistake.So The scheme of Gentry is like one piece with white jade defective, although having breakthrough meaning, there is also some problems.
The building method of Gentry is divided into three steps:The first step constructs a Somewhat homomorphic encryption scheme, i.e., can only hold Row limited number of time multiplication and additional calculation;Second step, compression decryption circuit, that is, simplify decryption circuit so that decrypt the depth of circuit The circuit depth that can be executed less than Somewhat homomorphisms scheme;Third walks, startup scheme, i.e., after each cryptogram computation, to close Literary homomorphism executes decryption circuit, as the noise of gained ciphertext remain in a fixed size, be equivalent to noise reduction.
The full homomorphic encryption scheme of the first generation follows the initial building methods of Gentry.The full homomorphic encryption scheme of the second generation is based on LWE problem or RLWE problems, structural form are simpler.Especially in BGV schemes, an effective Noise management is introduced Technology:Mould switching technology so that without starting the noise that can about subtract ciphertext.After its principle is each ciphertext product, to close Literary vector is multiplied by a scale factor and is reduced.Carrying for the noise of the exponential multiplication number of plies can be obtained using mould switching technology Height is combined with Internet Key Exchange, can obtain the full homomorphic encryption scheme of hierarchical without starting.
NTRU encipherment schemes are earliest one of encipherment schemes, and with efficiently famous, therefore are constructed complete same on NTRU State encipherment scheme is very significant, and the prior art is not based on the full homomorphic encryption scheme on NTRU.Based on above for complete same The analysis of state encryption method, the full homomorphic cryptography method of the prior art also there is also encryption efficiencies poor, the too long of defect of ciphertext.
Invention content
The technical problem to be solved by the present invention is to provide NTRU types on the ring LWE that a kind of encryption efficiency is high, ciphertext is shorter Full homomorphic cryptography method.
Technical solution of the invention is to provide the full homomorphic cryptography method of NTRU types on the ring LWE of following steps, packet Include following steps:
One, defined parameters:
For integer q, definitionEncryption beAnd Rq=R/qR is enterprising Capable, wherein φ (x)=χn+ 1 is cyclotomic polynomial, and n is 2 power side, q be prime number and
If polynomial f ∈ R and satisfaction | | f | |≤ B, then it is the boundaries B to claim f;
{ χn(n ∈ N) be distributed collection on a R, if for arbitrary f ← χnHave | | f | |≤ B, then claim { χnIt is B Boundary is distributed, i.e. the boundaries B distribution one boundaries B multinomial of output on a R;
Gaussian ProfileIt has the following properties that:For, arbitrary real numberHave:
Two, the ciphering process of a part homomorphism is carried out;
(1) parameter is established:Select μ mould q and n=(λ, μ) and Gaussian Profile χ=χ (λ, μ) so that these parameters It can ensure and obtain 2 on ring LWEλSafety;It enablesParameter params=(q, n, χ);
(2) generation of key:F ' ← χ is chosen, calculates f ← 2f '+1 so that f ≡ 1 (mod2);If f is in RqIn be irreversible , then f ', setting private key sk=f ∈ R are chosen again;
(3) generation of public key:Choose g ← χ, setting public key pk=h=2gf-1∈Rq
(4) it encrypts:Choose s, e ← χ, output ciphertext c ← hs+2e+m ∈ RqEven if it is close that public key adds an information m to obtain Literary c;
(5) it decrypts:Calculate μ ← fc ∈ Rq;Export m ← μm od2;
Due to fc=fhs+2fe+fm=2gs+2fe+fm, if | | fc | |< q/2, then μ=fc, μ (mod2)=fm (mod2)=m, as long as so meeting | | fc | |< q/2, then above-mentioned steps are correct;
Three, the full homomorphic cryptography process of startup is proceeded without;
(1) parameter is established:L is the number of plies of circuit, enables μ=μ (λ, L)=θ (log λ+logL), and to j=0 ..., L is obtained The mode sequence q to successively decrease0..., qL, the identical Gaussian Profile χ of each layer of use and ringParameter paramsj={ qj, λ, χ, n } and (j=0 ..., L);
(2) generation of public key:Key f is generated in the method for the second step of step 2j, walked with the third of step 2 Method generate public key hj;It enablesTo f 'jAnd fj+1Key exchange is carried out, is enabledKey sk includes fj, Public key pk includes hjWithWherein j=0 ..., L does not have ζ, each layer of circuit to have corresponding public key and private as j=L Key triple
(3) it encrypts:An information m is added to be encrypted public key pk;
(4) it decrypts;Assuming that ciphertext c is in jth layer circuit, corresponding key fj, private key sk is decrypted to obtain in plain text M,
(5) additive process:Assuming that c1、c2Decruption key be fj, i.e., in same layer circuit, if not same layer circuit can To carry out key exchange;It enablesc3Key be fj, by c3Key be set asThat is f 'jAgain by about subtracting The method of ciphertext noise obtains new ciphertext c4
(6) multiplication process:Assuming that c1、c2Decruption key be fj, i.e., in same layer circuit, if not same layer circuit can To carry out key exchange;It enablesc3Key beAgain by about subtracting the method for ciphertext noise, Obtain new ciphertext c4
Method using the present invention, compared with prior art, the present invention has the following advantages:The present invention is exchanged by key With mould switching technology, with addition encryption and multiplication encryption in ciphering process, the noise for exporting ciphertext is less than input ciphertext Noise plays the role of updating ciphertext, but its efficiency realized will be not necessarily to startup due to the process of startup to realize Full homomorphic cryptography method, encryption efficiency is high, and the ciphertext of acquisition is also shorter.
As an improvement, the method for about subtracting ciphertext noise includes two steps:The first step is that key exchanges, and ciphertext is converted At the ciphertext of next layer of circuit, key byIt is transformed into fj+1, c1Corresponding key is fj+1, corresponding mould is qj, the second stepping Row mould exchanges, and about subtracts the noise of ciphertext, c2Corresponding key is fj+1, corresponding mould is qj+1;fj+1Value is smaller, is selected from height This distribution χ, to ensure that the validity of mould exchange.
As an improvement, it includes two processes that the key, which exchanges,:First process is two keys of input and mould, output Auxiliary information is to ensure to exchange;Second process is input auxiliary information and initial ciphertext, exports a new ciphertext, initial ciphertext It is to same encryption of plaintext with new ciphertext.
Specific implementation mode
With regard to specific embodiment, the invention will be further described below.
The full homomorphic cryptography method of NTRU types, includes the following steps on the ring LWE of the present invention:
One, defined parameters:
For integer q, definitionEncryption beAnd Rq=R/qR is enterprising Capable, wherein φ (x)=χn+ 1 is cyclotomic polynomial, and n is 2 power side, q be prime number and
If polynomial f ∈ R and satisfaction | | f | |≤ B, then it is the boundaries B to claim f;
{ χn(n ∈ N) be distributed collection on a R, if for arbitrary f ← χnHave | | f | |≤ B, then claim { χnIt is B Boundary is distributed, i.e. the boundaries B distribution one boundaries B multinomial of output on a R;
Gaussian ProfileIt has the following properties that:ForArbitrary real numberHave:
Two, the ciphering process of a part homomorphism is carried out;
(1) parameter is established:Select μ mould q and n=(λ, μ) and Gaussian Profile χ=χ (λ, μ) so that these parameters It can ensure and obtain 2 on ring LWEλSafety;It enablesParameter params=(q, n, χ);
(2) generation of key:F ' ← χ is chosen, calculates f ← 2f '+1 so that f ≡ 1 (mod2);If f is in RqIn be irreversible , then f ', setting private key sk=f ∈ R are chosen again;
(3) generation of public key:Choose g ← χ, setting public key pk=h=2gf-1∈Rq
(4) it encrypts:Choose s, e ← χ, output ciphertext c ← hs+2e+m ∈ RqEven if it is close that public key adds an information m to obtain Literary c;
(5) it decrypts:Calculate μ ← fc∈Rq;Export m ← μm od2;
Due to fc=fhs+2fe+fm=2gs+2fe+fm, if | | fc | |< q/2, then μ=fc, μ (mod2)=fm (mod2)=m, as long as so meeting | | fc | |< q/2, then above-mentioned steps are correct;
Three, the full homomorphic cryptography process of startup is proceeded without;
(1) parameter is established:L is the number of plies of circuit, enables μ=μ (λ, L)=θ (log λ+logL), and to j=0 ..., L is obtained The mode sequence q to successively decrease0..., qL, the identical Gaussian Profile χ of each layer of use and ringParameter paramsj={ qj, λ, χ, n } and (j=0 ..., L);
(2) generation of public key:Key f is generated in the method for the second step of step 2j, walked with the third of step 2 Method generate public key hj;It enablesIt is rightAnd fj+1Key exchange is carried out, is enabledKey sk includes fj, public Key pk includes hjWithWherein j=0 ..., L does not have ζ, each layer of circuit to have corresponding public key and private key as j=L Triple
(3) it encrypts:An information m is added to be encrypted public key pk;
(4) it decrypts;Assuming that ciphertext c is in jth layer circuit, corresponding key fj, private key sk is decrypted to obtain in plain text M,
(5) additive process:Assuming that c1、c2Decruption key be fj, i.e., in same layer circuit, if not same layer circuit can To carry out key exchange;It enablesc3Key be fj, by c3Key be set asI.e.Again by about subtracting The method of ciphertext noise obtains new ciphertext c4
(6) multiplication process:Assuming that c1、c2Decruption key be fj, i.e., in same layer circuit, if not same layer circuit can To carry out key exchange;It enablesc3Key beAgain by about subtracting the method for ciphertext noise, obtain Go out new ciphertext c4
The method for about subtracting ciphertext noise includes two steps:The first step is that key exchanges, and ciphertext is converted into next layer The ciphertext of circuit, key byIt is transformed into fj+1, f1Corresponding key is fj+1, corresponding mould is qj, second step progress mould exchange, About subtract the noise of ciphertext, f2Corresponding key is fj+1, corresponding mould is qj+1;fj+1Value is smaller, is selected from Gaussian Profile χ, from And it ensure that the validity that mould exchanges.
It includes two processes that the key, which exchanges,:First process is two keys of input and mould, exports auxiliary information To ensure to exchange;Second process is input auxiliary information and initial ciphertext, exports a new ciphertext, initial ciphertext and new ciphertext It is to same encryption of plaintext.
Only preferred embodiments of the present invention are described above, but are not to be construed as limiting the scope of the invention.This Invention is not only limited to above example, and concrete structure is allowed to vary.In short, all guarantors in independent claims of the present invention Various change is within the scope of the invention made by shield range.

Claims (3)

1. a kind of full homomorphic cryptography method of NTRU types on ring LWE, it is characterised in that:Include the following steps:
One, defined parameters:
For integer q, definitionEncryption beAnd RqIt is carried out on=R/qR, Wherein φ (x)=xn+ 1 is cyclotomic polynomial, and n is 2 power side, q be prime number and
If polynomial f ∈ R and satisfaction | | f | |≤ B, then it is the boundaries B to claim f;
n, n ∈ N are the distributed collections on a R, if for arbitrary f ← χnHave | | f | |≤ B, then claim { χnIt is the boundaries B It is distributed, i.e. the boundaries B distribution one boundaries B multinomial of output on a R;
Gaussian ProfileIt has the following properties that:ForArbitrary real numberHave:
RingThe product of upper element has following property:||s·t(modφ(x))||≤n·||s||·||t||;χ is on R The boundaries B are distributed, and s1... sk← χ, then haveIt is nk-1BkBoundary;
Two, the ciphering process of a part homomorphism is carried out;
(1) parameter is established:Select μ mould q and n=(λ, μ) and Gaussian Profile χ=χ (λ, μ) so that these parameters can Guarantee obtains 2 on ring LWEλSafety;It enablesParameter params=(q, n, χ);
(2) generation of key:F ' ← χ is chosen, calculates f ← 2f '+1 so that f ≡ 1 (mod2);If f is in RqIn be it is irreversible, then Again f ', setting private key sk=f ∈ R are chosen;
(3) generation of public key:Choose g ← χ, setting public key pk=h=2gf-1∈Rq
(4) it encrypts:Choose s, e ← χ, output ciphertext c ← hs+2e+m ∈ RqEven if public key adds an information m to obtain ciphertext c;
(5) it decrypts:Calculate μ ← fc ∈ Rq;Export m ← μm od 2;
Due to fc=fhs+2fe+fm=2gs+2fe+fm, if | | fc | |< q/2, then μ=fc, μ (mod 2)=fm (mod 2) =m, as long as so meeting | | fc | |< q/2, then above-mentioned steps are correct;
Three, the full homomorphic cryptography process of startup is proceeded without;
(1) parameter is established:L is the number of plies of circuit, enables μ=μ (λ, L)=θ (log λ+logL), to j=0 ..., L is successively decreased Mode sequence q0..., qL, the identical Gaussian Profile χ of each layer of use and ringParameter paramsj= {qj, λ, χ, n }, j=0 ..., L;
(2) generation of public key:Key f is generated in the method for the second step of step 2j, in the method for the third step of step 2 Generate public key hj;It enablesIt is rightAnd fj+1Key exchange is carried out, is enabledKey sk includes fj, public key pk Including hjWithWherein j=0 ..., L does not have ζ, each layer of circuit to have corresponding public key and private key ternary as j=L Group
(3) it encrypts:An information m is added to be encrypted public key pk;
(4) it decrypts;Assuming that ciphertext c is in jth layer circuit, corresponding key fj, private key sk is decrypted to obtain plaintext m,
(5) additive process:Assuming that c1、c2Decruption key be fj, if not carrying out key exchange if same layer circuit;It enablesEnable f 'j=fj 2, c3Key be set as f 'j, then the method by about subtracting ciphertext noise obtains new close Literary c4
(6) multiplication process:Assuming that c1、c2Decruption key be fj, if not carrying out key exchange if same layer circuit;It enablesEnable f 'j=fj 2, c3Key be set as f 'j, then the method by about subtracting ciphertext noise, it obtains new Ciphertext c4
2. the full homomorphic cryptography method of NTRU types on ring LWE according to claim 1, it is characterised in that:Described about subtracts The method of ciphertext noise includes two steps:The first step is that key exchanges, and ciphertext is converted into the ciphertext of next layer of circuit, key is by fj 2 It is transformed into fj+1, c1Corresponding key is fj+1, corresponding mould is qj, second step carry out mould exchange, about subtract the noise of ciphertext, c2It is right The key answered is fj+1, corresponding mould is qj+1;fj+1Value is smaller, is selected from Gaussian Profile χ.
3. the full homomorphic cryptography method of NTRU types on ring LWE according to claim 2, it is characterised in that:The key It includes two processes to exchange:First process is two keys of input and mould, and output auxiliary information is to ensure to exchange;Second mistake Journey is input auxiliary information and initial ciphertext, exports a new ciphertext, initial ciphertext and new ciphertext are to same encryption of plaintext.
CN201310322018.9A 2013-07-22 2013-07-22 The full homomorphic cryptography method of NTRU types on ring LWE Active CN103475472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310322018.9A CN103475472B (en) 2013-07-22 2013-07-22 The full homomorphic cryptography method of NTRU types on ring LWE

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310322018.9A CN103475472B (en) 2013-07-22 2013-07-22 The full homomorphic cryptography method of NTRU types on ring LWE

Publications (2)

Publication Number Publication Date
CN103475472A CN103475472A (en) 2013-12-25
CN103475472B true CN103475472B (en) 2018-07-20

Family

ID=49800185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310322018.9A Active CN103475472B (en) 2013-07-22 2013-07-22 The full homomorphic cryptography method of NTRU types on ring LWE

Country Status (1)

Country Link
CN (1) CN103475472B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337736B (en) * 2014-06-30 2018-10-30 华为技术有限公司 Full homomorphism message authentication method, apparatus and system
EP3304803A4 (en) * 2015-06-02 2018-05-02 Telefonaktiebolaget LM Ericsson (publ) Method and encryption node for encrypting message
CN105391554B (en) * 2015-11-09 2019-02-01 中国电子科技集团公司第三十研究所 A kind of method and system for realizing fingerprint matching using ciphertext
CN106375094A (en) * 2016-08-31 2017-02-01 江苏高网信息科技有限公司 NTRUMLS signature method applicable to mobile payment
CN106533684B (en) * 2016-12-02 2019-03-08 江苏理工学院 Public key encryption method based on LPN
CN107707608A (en) * 2017-07-26 2018-02-16 日照职业技术学院 A kind of household Internet of Things network control system
CN107682140A (en) * 2017-11-20 2018-02-09 中国科学院重庆绿色智能技术研究院 The file encryption-decryption method of the anti-quantum attack for the low thermal expansion that multinomial point represents
CN109936435B (en) * 2019-01-24 2022-08-30 中国人民武装警察部队工程大学 NTRU type multi-key fully homomorphic encryption method with fast homomorphic operation process
CN109889320B (en) * 2019-01-24 2022-04-15 中国人民武装警察部队工程大学 BGV type multi-key fully homomorphic encryption method
CN110324135B (en) * 2019-07-04 2022-05-31 浙江理工大学 Homomorphic encryption matrix determinant security outsourcing method based on cloud computing
CN110545179A (en) * 2019-08-29 2019-12-06 中芯昊月(深圳)科技控股有限公司 R-LWE-based NTRU encryption method and security proving method thereof
CN111064558B (en) * 2020-01-09 2023-04-07 浙江理工大学 Homomorphic encryption matrix continuous multiplication secure outsourcing method based on cloud computing
CN111586685B (en) * 2020-04-26 2022-05-03 重庆邮电大学 Anonymous roaming authentication method based on lattices
CN112329519B (en) * 2020-09-21 2024-01-02 中国人民武装警察部队工程大学 Safe online fingerprint matching method
CN112818366B (en) * 2021-02-01 2023-09-26 东北大学 Image feature detection method based on ntru full homomorphic encryption

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102387343A (en) * 2010-08-25 2012-03-21 索尼公司 Terminal device, server, data processing system, data processing method, and program
CN102694644A (en) * 2012-05-16 2012-09-26 华中科技大学 Interface unit for fully homomorphic encryption chip
CN102822816A (en) * 2010-03-30 2012-12-12 国际商业机器公司 An efficient homomorphic encryption scheme for bilinear forms
CN103078947A (en) * 2013-01-11 2013-05-01 江苏物联网研究发展中心 Mass data exchange and transaction architecture system of internet of things

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8630422B2 (en) * 2009-11-10 2014-01-14 International Business Machines Corporation Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102822816A (en) * 2010-03-30 2012-12-12 国际商业机器公司 An efficient homomorphic encryption scheme for bilinear forms
CN102387343A (en) * 2010-08-25 2012-03-21 索尼公司 Terminal device, server, data processing system, data processing method, and program
CN102694644A (en) * 2012-05-16 2012-09-26 华中科技大学 Interface unit for fully homomorphic encryption chip
CN103078947A (en) * 2013-01-11 2013-05-01 江苏物联网研究发展中心 Mass data exchange and transaction architecture system of internet of things

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于LWE问题的无证书全同态加密体制;光焱,顾纯祥 等;《电子与信息学报》;20130415;全文 *

Also Published As

Publication number Publication date
CN103475472A (en) 2013-12-25

Similar Documents

Publication Publication Date Title
CN103475472B (en) The full homomorphic cryptography method of NTRU types on ring LWE
Zhang et al. DeepPAR and DeepDPA: privacy preserving and asynchronous deep learning for industrial IoT
Wang An identity-based data aggregation protocol for the smart grid
CN103259643B (en) A kind of full homomorphic cryptography method of matrix
CN110011781B (en) Homomorphic encryption method and medium for transaction amount encryption and supporting zero knowledge proof
CN105491006B (en) Cloud outsourcing key sharing means and method
CN107294697B (en) Symmetrical full homomorphic cryptography method based on plaintext similar matrix
CN111106936A (en) SM 9-based attribute encryption method and system
CN110414981B (en) Homomorphic encryption method supporting ZKPs and blockchain transaction amount encryption method
CN103401839B (en) A kind of many authorization center encryption method based on attribute protection
CN107196926A (en) A kind of cloud outsourcing privacy set comparative approach and device
KR20130085491A (en) Multi-user searchable encryption system with index validation and tracing and method thereof
CN103618728A (en) Attribute-based encryption method for multiple authority centers
CN110022309B (en) Safe and efficient data sharing method in mobile cloud computing system
CN106341232A (en) Anonymous entity identification method based on password
CN104038493B (en) Bilinear pairing-free cloud storage data security audit method
Chu et al. Privacy-preserving smart metering with regional statistics and personal enquiry services
CN105162573A (en) Attribute encryption method based on multi-linear mapping and achieving strategy of secret key revocation in an authority separating way
CN104135473A (en) A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
CN101958793A (en) Double public key cryptograph identity identification, secrete key verification and digital signing integrated solution
CN103988466A (en) Group encryption methods and devices
CN104767611A (en) Signcryption method from public key infrastructure environment to certificateless environment
CN105763528A (en) Multi-recipient anonymous encryption apparatus under hybrid mechanism
CN109889320A (en) A kind of full homomorphic cryptography method of efficient BGV type multi-key cipher
CN102710661A (en) Cloud storage and aggregation architecture and data storage and aggregation method by using same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant