CN109889320B - BGV type multi-key fully homomorphic encryption method - Google Patents
BGV type multi-key fully homomorphic encryption method Download PDFInfo
- Publication number
- CN109889320B CN109889320B CN201910065976.XA CN201910065976A CN109889320B CN 109889320 B CN109889320 B CN 109889320B CN 201910065976 A CN201910065976 A CN 201910065976A CN 109889320 B CN109889320 B CN 109889320B
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- key
- homomorphic
- bgv
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention particularly relates to a high-efficiency BGV type multi-key fully homomorphic encryption method, which comprises the following steps: carrying out BGV homomorphic encryption on a plaintext of a user participating in operation to obtain a ciphertext corresponding to the user; expanding the ciphertext of the user participating in the operation to obtain an expanded ciphertext corresponding to the user set; performing homomorphic operation on the expanded ciphertext of the user set participating in the operation to obtain a high-dimensional BGV ciphertext, performing BGV homomorphic encryption and GSW homomorphic encryption on the key of the user participating in the calculation respectively, performing ciphertext expansion and mixed homomorphic multiplication on the encrypted result to obtain a calculation key, and performing dimensionality reduction on the high-dimensional BGV ciphertext through the calculation key; and (4) running a mode changing function on the ciphertext subjected to dimension reduction, reducing the noise in the ciphertext, and finally outputting a final ciphertext result of homomorphic operation. The BGV type multi-key fully homomorphic encryption method can allow homomorphic operation to be carried out between ciphertexts of users with different keys, thereby realizing a safe multi-party computing function.
Description
Technical Field
The invention belongs to the field of information security and privacy protection, and particularly relates to a high-efficiency BGV (band gap virtual) type multi-key fully homomorphic encryption method.
Background
The Full Homomorphic Encryption (FHE) can randomly calculate a ciphertext under the condition that a secret key is unknown, has the property of exchangeable encryption and operation, has high theoretical and application values in the current cloud computing environment, and can be widely applied to ciphertext retrieval, safe multi-party computation, cloud data analysis and the like. Since 2009 Gentry proposed the first lattice-based all-homomorphic encryption scheme Gen09, more and more all-homomorphic encryption schemes (DGHV10, BV11a, BV11b, BGV12, GSW13, AP14, etc.) were proposed based on the blueprints that Gentry depicts for all-homomorphic encryption.
Multi-key fully homomorphic encryption (mkhe) allows computation of ciphertexts of different private keys, an extension of fully homomorphic encryption in secure multiparty computing. LATV12 first proposes the concept of mkhe and proposes a multi-key fully homomorphic encryption scheme based on NTRU public key cryptosystem, but the security of the encryption scheme based on NTRU is based on the non-standard assumption on the polynomial ring, and the difficult problem of strict reduction to the lattice can not be solved, so the security needs to be further examined.
Clear and McGoldrick use GSW type FHE to provide a first GSW type MKFHE scheme CM15 based on error learning problem (LWE), because LWE problem can be quantum-reduced to the difficulty problem of the worst case on an ideal lattice, the safety of the scheme is guaranteed, and the number of the participator keys in the scheme has no upper limit. The CM15 is improved by Mukherjee and Wichs, and an LWE-based MKFHE scheme MW16 is provided, which can be used for realizing one-round threshold decryption protocol and realizing a two-round secure multi-party computing (MPC) protocol on the basis of the one-round threshold decryption protocol.
The CM15 and MW16 schemes need to set the number of users participating in homomorphic computation in advance, and cannot realize the addition of new users in the computation process, and this type of mkhe is called single-hop (single-hop) type mkhe in PS 16. Meanwhile, the PS16 proposes the concept of multi-hop (multi-hop) mkhe: the cryptograph of the original participant after homomorphic operation can be operated again with the cryptograph of the newly added participant, namely, any participant can be dynamically added into the cryptograph operation process in real time. BP16 proposes the concept of a fully dynamic mkhe, i.e. the number of participants does not need to be set in advance.
On TCC2017, chenlong et al propose a BGV type multi-hop mkhe based on RLWE. The scheme supports the cipher text packing technology based on the Chinese remainder theorem, simplifies the cipher text extension process in the MKFHE, and can be used for constructing two rounds of MPC protocols and threshold decryption protocols.
Currently, the BGV type MKFHE scheme supporting Batched Multi-hop is represented by CZW 17. The BGV type MKFHE scheme has the defects of ciphertext quantity, relatively large public parameter and large calculation quantity in the key generation and calculation process.
Disclosure of Invention
In order to solve the defects of relatively large cipher text amount and public parameters and large operation amount in the process of generating and calculating the key in the prior art, the invention provides a high-efficiency BGV type multi-key fully homomorphic encryption method, which can allow homomorphic operation to be carried out between cipher texts of users with different keys, thereby realizing a safe multi-party calculation function. In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
an efficient BGV-type multi-key fully homomorphic encryption method comprises the following steps:
the method comprises the following steps: carrying out BGV homomorphic encryption on a plaintext of a user participating in operation to obtain a ciphertext corresponding to the user;
step two: expanding the ciphertext of the user participating in the operation to obtain an expanded ciphertext corresponding to the user set;
step three: performing homomorphic operation on the expanded ciphertext of the user set participating in the operation to obtain a high-dimensional BGV ciphertext, performing BGV homomorphic encryption and GSW homomorphic encryption on the key of the user participating in the calculation respectively, performing ciphertext expansion and mixed homomorphic multiplication on the encrypted result to obtain a calculation key, and performing dimensionality reduction on the high-dimensional BGV ciphertext through the calculation key;
step four: and (4) running a mode changing function on the ciphertext subjected to dimension reduction, reducing the noise in the ciphertext, and finally outputting a final ciphertext result of homomorphic operation.
Further, the specific operation of the step one is as follows: the safety parameter l, the integer m, the modulus q ═ ploy (n), the polynomial ring R ═ Z [ X ] are given]/ΦmAnd the ring B-bounded discrete c (B < q), the integer N ═ O (nlogq),polynomial ring RqR/qR; the circuit depth is L, and the modulus q of each layer of circuitL>>qL-1>>>>q0A small integer p and coprime to all moduli,RqR/qR; selecting L +1 random common vectorsL ═ 0., L; defining S as an ordered set, wherein the ordered set comprises ordered tags of all participants related to the ciphertext and no repeated elements; defining a ciphertext tuple ct ═ { c, { S }, l }, which includes ciphertext c of user set S, user set S
(1) And (3) key generation: generating the required key for the jth participant:
Random selectionDefining:l is belonged to { L.,. 0}, and a public key pk is generatedl,j={pl,j},l∈{L,...,0};
A generation unit for calculating a calculation key required for the homomorphic calculation of the ciphertext,
(a) for m e {0l-1, j ∈ { 1., k }, ζ ∈ { 0., k }, calculating
(b) For j ∈ { 1.,. k }, ζ ∈ { 0.,. k }, a calculation is performed
(2) And (3) encryption process: inputting plaintext mu e R to be encryptedpAnd the public key pkl,jRandomly selecting R ∈ R2And the error matrix E ═ E (E)1,e2)←χ2Generating a plaintext mujLayer i ciphertext:
and outputting the ciphertext tuple ct ═ { c, { j }, l }.
Further, the specific operation of the second step is as follows:
(1) decompose ciphertext c into k +1 equal parts:
(2) And (3) generating an extended ciphertext:
Further, the specific operation of the third step is as follows: inputting t ciphertext groups (ct) after ciphertext expansion1,…ctt) And assuming that it is in the same circuit layer, anj belongs to { 1.,. t }, and a public user set is generated
(1) By calling basic homomorphic arithmetic units in the schemeAndhomomorphic operation circuit for t ciphertextsThe result after the operation is
(2) Generating a calculation key evk required in a ciphertext operationS=MKFHE.EvkGen(emS);
further, the specific operation of the step four is as follows: inputting a ciphertext of the layer I after homomorphic operationComputing
Compared with the prior art, the invention has the beneficial effects that:
1. the invention converts the BGV ciphertext and the GSW ciphertext from a single user to multiple users, thereby reducing the size of the expanded ciphertext;
2. the invention improves the generation process of the conversion key required in the key conversion technology, replaces the original RGSW ciphertext multiplication by the mixed homomorphic multiplication of the RBGV and the RGSW ciphertext, and reduces the size of public parameters and calculation keys;
3. the value range of the private key coefficient of the user is set to be { -1,0,1}, so that the size and the number of ciphertexts in the key generation process are reduced;
4. the invention reduces the data volume in the homomorphic calculation process, and the reduction of the data volume can further reduce the calculation complexity of homomorphic calculation.
Drawings
FIG. 1 is a schematic flow diagram of the present invention.
Detailed Description
The present invention will be described in further detail with reference to specific examples, but the embodiments of the present invention are not limited thereto.
The embodiment provides an efficient BGV-type multi-key fully homomorphic encryption method, which is characterized in that a single-user ciphertext is converted into a multi-user ciphertext by using a ciphertext expansion technology, so that a multi-key fully homomorphic encryption scheme is converted into a single-key fully homomorphic encryption scheme, the ciphertext is processed by using a key conversion technology and a mode conversion technology, and the dimensionality and the noise of the ciphertext are reduced. The BGV type multi-key fully homomorphic encryption method can be effectively applied to safe multi-party computing among multiple users in a cloud computing environment, and has the excellent characteristics of confidentiality, ciphertext availability, collusion attack resistance, quantum attack resistance and the like. Compared with the BGV type multi-key fully homomorphic encryption scheme [ CZW17],
referring to fig. 1, the BGV-type multi-key fully homomorphic encryption method includes the following steps:
the method comprises the following steps: carrying out BGV homomorphic encryption on a plaintext of a user participating in operation to obtain a ciphertext corresponding to the user;
step two: expanding the ciphertext of the user participating in the operation to obtain an expanded ciphertext corresponding to the user set;
step three: performing homomorphic operation on the expanded ciphertext of the user set participating in the operation to obtain a high-dimensional BGV ciphertext, performing BGV homomorphic encryption and GSW homomorphic encryption on the key of the user participating in the calculation respectively, performing ciphertext expansion and mixed homomorphic multiplication on the encrypted result to obtain a calculation key, and performing dimensionality reduction on the high-dimensional BGV ciphertext through the calculation key;
step four: and (4) running a mode changing function on the ciphertext subjected to dimension reduction, reducing the noise in the ciphertext, and finally outputting a final ciphertext result of homomorphic operation.
Initialization: the safety parameter l, the integer m, the modulus q ═ ploy (n), the polynomial ring R ═ Z [ X ] are given]/ΦmAnd the ring B-bounded discrete c (B < q), the integer N ═ O (nlogq),polynomial ring RqR/qR; the circuit depth is L, and the modulus q of each layer of circuitL>>qL-1>>…>>q0A small integer p and coprime to all moduli,RqR/qR; selecting L +1 random common vectorsL is 0, …, L; defining S as an ordered set, wherein the ordered set comprises ordered tags of all participants related to the ciphertext and no repeated elements; defining a cipher text tuple ct ═ { c, { S }, l }, wherein the cipher text c of the user set S, the user set S and the corresponding circuit are contained
And (3) key generation: generating the required key for the jth participant:
Random selectionDefining:l is belonged to { L.,. 0}, and a public key pk is generatedl,j={pl,j},l∈{L,...,0};
A generation unit for calculating a calculation key required for the homomorphic calculation of the ciphertext,
(a) for m e {0l-1, j ∈ { 1., k }, ζ ∈ { 0., k }, calculating
(b) For j ∈ { 1.,. k }, ζ ∈ { 0.,. k }, a calculation is performed
And (3) encryption process: inputting plaintext mu e R to be encryptedpAnd the public key pkl,jRandomly selecting R ∈ R2And the error matrix E ═ E (E)1,e2)←χ2Generating a plaintext mujLayer i ciphertext:
and outputting the ciphertext tuple ct ═ { c, { j }, l }.
And (3) decryption process: input deviceAnd corresponding private key, outputting the plaintextOutputting the plaintext
BGV ciphertext expansion process:
(1) decompose ciphertext c into k +1 equal parts:
(2) And (3) generating an extended ciphertext:
The homomorphic operation process of the multi-user ciphertext: inputting t ciphertext groups (ct) after ciphertext expansion1,…,ctt) And assuming that it is in the same circuit layer, anj belongs to {1, …, t }, and a public user set is generated
(1) By calling basic homomorphic arithmetic units in the schemeAndhomomorphic operation circuit for t ciphertextsThe result after the operation is
(2) Generating a calculation key evk required in a ciphertext operationS=MKFHE.EvkGen(emS);
and (3) die changing process: inputting a ciphertext of the layer I after homomorphic operationComputing
And (3) safety analysis: in terms of basic scheme, the invention and CZW17 use the same BGV encryption scheme and GSW encryption scheme. The main differences between the present invention and CZW17 are two points: on one hand, a mixed homomorphic multiplication function among a BGV ciphertext nested expansion function, a GSW type ciphertext split expansion function and an RBGV ciphertext and an RGSW ciphertext is provided, the input and the output of the three functions are ciphertexts, and the calculation process is on the ciphertexts, so the safety of the scheme cannot be reduced; on the other hand, the coefficient value of the private key of the BGV ciphertext is limited to {0,1} from c, so the dimensionality N of the polynomial needs to be increased to a certain extent to ensure the safety of the scheme.
The invention is compared with the storage overhead of CZW 17:
the foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.
Claims (1)
1. A BGV-type multi-key fully homomorphic encryption method is characterized by comprising the following steps:
the method comprises the following steps: the method comprises the steps of conducting BGV type homomorphic encryption on a plaintext of a user participating in operation to obtain a ciphertext corresponding to the user, specifically, giving a security parameter l, an integer m, a modulus q ═ ploy (n), a polynomial ring R ═ Z [ X ], (n)]/ΦmAnd a ring B-bounded discrete component c, B < q, the integer N ═ O (nlogq),polynomial ring RqR/qR; the circuit depth is L, and the modulus q of each layer of circuitL>>qL-1>>…>>q0A small integer p and coprime to all moduli,RqR/qR; selecting L +1 random common vectorsL ═ 0., L; definition S is an ordered set, whichThe method comprises the steps of including the tags with sequences of all the participants involved in the ciphertext, wherein the tags have no repeated elements; defining a ciphertext tuple ct ═ { c, { S }, l }, wherein the ciphertext c of the user set S, the user set S and corresponding circuit level l are included;
(1) and (3) key generation: generating the required key for the jth participant:
Random selectionDefining:l is belonged to { L.,. 0}, and a public key pk is generatedl,j={pl,j},l∈{L,...,0};
A generation unit for calculating a calculation key required for the homomorphic calculation of the ciphertext,
(a) for m e {0l-1, j ∈ { 1., k }, ζ ∈ { 0., k }, calculating
(b) For j ∈ { 1.,. k }, ζ ∈ { 0.,. k }, a calculation is performed
(2) And (3) encryption process: inputting plaintext mu e R to be encryptedpAnd the public key pkl,jRandomly selecting R ∈ R2And the error matrix E ═ E (E)1,e2)←χ2Generating a plaintext mujLayer i ciphertext:
outputting a ciphertext tuple ct ═ { c, { j }, l };
step two: expanding the ciphertext of the user participating in the operation to obtain an expanded ciphertext corresponding to the user set, wherein the BGV ciphertext expansion process comprises the following steps: CTExt (c)lS'): cipher text tupleIs extended toWherein S belongs to S', (1) decomposing the ciphertext c into k +1 equal parts:corresponding private keyAnd user set S ═ i1,...,ik}; (2) and (3) generating an extended ciphertext:whereinCorresponding extended keyEasy to verify
Step three: performing homomorphic operation on the expanded ciphertext of the user set participating in the operation to obtain a high-dimensional BGV ciphertext, performing BGV homomorphic encryption and GSW homomorphic encryption on the key of the user participating in the calculation respectively, performing ciphertext expansion and mixed homomorphic multiplication on the encrypted result to obtain a calculation key, performing dimensionality reduction on the high-dimensional BGV ciphertext through the calculation key, and performing a multi-user ciphertext homomorphic operation process: inputting t ciphertext groups (ct) after ciphertext expansion1,...ctt) And assuming that it is in the same circuit layer, anj belongs to { 1.,. t }, and a public user set is generated(1) By calling basic homomorphic arithmetic units in the schemeAndfor t ciphertext homomorphic operation circuits C, the result after operation is(2) Generating a calculation key evk required in a ciphertext operationS=MKFHE.EvkGen(emS) (ii) a (3) For ciphertextTo carry outAnd (3) reducing the dimensionality:
step four: and (3) operating a mode changing function on the ciphertext subjected to dimension reduction, reducing noise in the ciphertext, and finally outputting a final ciphertext result of homomorphic operation, wherein the mode changing function is as follows: inputting a ciphertext of the layer I after homomorphic operationComputing
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910065976.XA CN109889320B (en) | 2019-01-24 | 2019-01-24 | BGV type multi-key fully homomorphic encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910065976.XA CN109889320B (en) | 2019-01-24 | 2019-01-24 | BGV type multi-key fully homomorphic encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109889320A CN109889320A (en) | 2019-06-14 |
CN109889320B true CN109889320B (en) | 2022-04-15 |
Family
ID=66926677
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910065976.XA Active CN109889320B (en) | 2019-01-24 | 2019-01-24 | BGV type multi-key fully homomorphic encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889320B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266721B (en) * | 2019-07-05 | 2020-04-28 | 西南交通大学 | Homomorphic-based cloud-assisted dynamic universal secure multi-party computing method |
CN110855421B (en) * | 2019-10-25 | 2023-11-07 | 高秀芬 | Improved isomorphic encryption method |
CN110889139B (en) * | 2019-11-26 | 2021-03-23 | 支付宝(杭州)信息技术有限公司 | Method and device for multi-party combined dimensionality reduction processing aiming at user privacy data |
CN111342950A (en) * | 2019-12-16 | 2020-06-26 | 中国人民武装警察部队工程大学 | BGV type multi-key fully homomorphic encryption method with directional decryption function |
CN112152777B (en) * | 2020-08-18 | 2022-04-22 | 西安交通大学 | Homomorphic cryptographic operation-oriented key conversion method, system, equipment and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475472A (en) * | 2013-07-22 | 2013-12-25 | 浙江万里学院 | Method for NTRU-type fully-homomorphic encryption on LWE circle |
CN107359979A (en) * | 2017-07-25 | 2017-11-17 | 西安电子科技大学 | Symmetrical full homomorphic cryptography method based on Representation theorem |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9281941B2 (en) * | 2012-02-17 | 2016-03-08 | International Business Machines Corporation | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
US9749128B2 (en) * | 2014-05-15 | 2017-08-29 | Xerox Corporation | Compact fuzzy private matching using a fully-homomorphic encryption scheme |
US9846785B2 (en) * | 2015-11-25 | 2017-12-19 | International Business Machines Corporation | Efficient two party oblivious transfer using a leveled fully homomorphic encryption |
FR3057090B1 (en) * | 2016-09-30 | 2018-10-19 | Safran Identity & Security | METHODS FOR SECURELY LEARNING PARAMETERS FROM A CONVOLVED NEURON NETWORK AND SECURED CLASSIFICATION OF INPUT DATA |
CN106534313B (en) * | 2016-11-17 | 2019-09-13 | 浙江工商大学 | The frequency measuring method and system of facing cloud end data publication protection safety and privacy |
US10439799B2 (en) * | 2017-02-27 | 2019-10-08 | United States Of America As Represented By Secretary Of The Navy | System and method for automating indirect fire protocol using fully homomorphic encryption |
CN107147484B (en) * | 2017-05-12 | 2020-03-31 | 南京邮电大学 | Floating point number fully homomorphic encryption method facing privacy protection |
CN107864033B (en) * | 2017-05-16 | 2020-04-24 | 中国人民武装警察部队工程大学 | Bootstrap type symmetrical fully homomorphic encryption method |
CN107294698B (en) * | 2017-07-25 | 2019-11-26 | 西安电子科技大学 | The full homomorphic cryptography method that single ciphertext homomorphism calculates |
CN107592195A (en) * | 2017-09-12 | 2018-01-16 | 北京电子科技学院 | A kind of accurate full homomorphism ciphertext data manipulation method and system |
CN108718231B (en) * | 2018-07-04 | 2023-05-23 | 深圳大学 | Fully homomorphic encryption method, fully homomorphic encryption device and computer readable storage medium |
-
2019
- 2019-01-24 CN CN201910065976.XA patent/CN109889320B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475472A (en) * | 2013-07-22 | 2013-12-25 | 浙江万里学院 | Method for NTRU-type fully-homomorphic encryption on LWE circle |
CN107359979A (en) * | 2017-07-25 | 2017-11-17 | 西安电子科技大学 | Symmetrical full homomorphic cryptography method based on Representation theorem |
Also Published As
Publication number | Publication date |
---|---|
CN109889320A (en) | 2019-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109889320B (en) | BGV type multi-key fully homomorphic encryption method | |
CN109936435B (en) | NTRU type multi-key fully homomorphic encryption method with fast homomorphic operation process | |
Almaiah et al. | A new hybrid text encryption approach over mobile ad hoc network | |
Wang et al. | Cryptanalysis of a symmetric fully homomorphic encryption scheme | |
CN111510281B (en) | Homomorphic encryption method and device | |
CN109831297A (en) | A kind of full homomorphic cryptography method of more identity for supporting thresholding to decrypt | |
CN107864033B (en) | Bootstrap type symmetrical fully homomorphic encryption method | |
CN111342950A (en) | BGV type multi-key fully homomorphic encryption method with directional decryption function | |
Chotard et al. | Multi-client functional encryption with repetition for inner product | |
Al-Arjan et al. | Intelligent security in the era of AI: The key vulnerability of RC4 algorithm | |
Phuong et al. | Efficient hidden vector encryption with constant-size ciphertext | |
Han et al. | Attribute-based signcryption scheme with non-monotonic access structure | |
Wu et al. | New identity based proxy re-encryption scheme from lattices | |
Ahila et al. | State of art in homomorphic encryption schemes | |
JP2000047581A (en) | Ciphering method, ciphering and deciphering device, and cipher communication system | |
Zhao et al. | Improved linear cryptanalysis of CAST-256 | |
Nalwaya et al. | A cryptographic approach based on integrating running key in feedback mode of elgamal system | |
Parenreng et al. | The E-mail security system using El-Gamal hybrid algorithm and AES (advanced encryption standard) algorithm | |
CN115001651A (en) | Multi-party computing method based on fully homomorphic encryption and suitable for semi-honest model | |
Nuida et al. | On the security of pseudorandomized information-theoretically secure schemes | |
Ali | Randomly encryption using genetic algorithm | |
Apon et al. | Bi-deniable inner product encryption from LWE | |
Wang et al. | A fully secure unidirectional and multi-use proxy re-encryption scheme | |
CN111130786A (en) | Multi-party cooperative SM2 key generation and ciphertext decryption method and medium | |
Tiplea | A brief introduction to quadratic residuosity based cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |