CN109962778A - Multi-party homomorphic cryptography method based on integer - Google Patents

Multi-party homomorphic cryptography method based on integer Download PDF

Info

Publication number
CN109962778A
CN109962778A CN201910216898.9A CN201910216898A CN109962778A CN 109962778 A CN109962778 A CN 109962778A CN 201910216898 A CN201910216898 A CN 201910216898A CN 109962778 A CN109962778 A CN 109962778A
Authority
CN
China
Prior art keywords
key
integer
indicate
encryption
formula
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910216898.9A
Other languages
Chinese (zh)
Inventor
李慧贤
韩智鹏
庞辽军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN201910216898.9A priority Critical patent/CN109962778A/en
Publication of CN109962778A publication Critical patent/CN109962778A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Abstract

The multi-party homomorphic cryptography method based on integer that the invention discloses a kind of, for solving the technical problem of the existing homomorphic cryptography method applicability difference based on integer.Technical solution is to generate encryption side and the respective public and private key of decryption side by key generation centre first, encryption side carries out encryption to data using its public key and forms ciphertext, then ciphertext is transferred to cloud computing platform to be calculated, handled by encryption side, is finally decrypted by decryption side using the private key that key generation centre generates.The present invention extends encryption side using stochastic transformation method, constructs one based on approximate greatest common divisor difficult problem and adds close side's homomorphic cryptography method based on integer.Reduce computation complexity by the extremely efficient to encryption side so that the homomorphic cryptography method based on integer is more adaptable in adding the environment that close side participates in, whole system it is more efficient, and be capable of the data-privacy safety of effective protection user.

Description

Multi-party homomorphic cryptography method based on integer
Technical field
The homomorphic cryptography method based on integer that the present invention relates to a kind of, in particular to a kind of multi-party homomorphism based on integer add Decryption method.
Background technique
Document " Fully Homomorphic Encryption over the Integers:Lecture Notes in Computer Science,Advances in Cryptology–EUROCRYPT 2010:29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3,2010.Proceedings, pp.24-43. " disclose one kind Homomorphic cryptography method based on integer.This method is transported on the basis of the homomorphic cryptography method of part using the integer mould in number theory It can be regarded as the basis for algorithm, shorten keys sizes and ciphertext length, compared to the homomorphic cryptography method effect of lattice operation construction It increases in rate.Meanwhile using homomorphic decryption, Re-encryption Technology, it is complete same that original part homomorphic cryptography method, which is expanded, State encryption method realizes the calculating to ciphertext arbitrary number of times.But in cloud computing environment, this method needs more in a side It is inefficient in the case where secondary upload data.Also, this method is directed to a case where side encrypts side decryption, however practical A decryption side needs to correspond to multiple encryption sides, such as cloud medical environment in situation, and a doctor generally requires to correspond to multiple trouble Person, and need for calculating task to be contracted out to third party cloud platform, this method can only provide a patient and carry out with a doctor Interaction, so the applicability in network environment this method of multi-user is not strong, and the efficiency of system is relatively low.
Summary of the invention
In order to overcome the shortcomings of that the existing homomorphic cryptography method applicability based on integer is poor, the present invention provides a kind of based on whole Several multi-party homomorphic cryptography methods.This method generates encryption side and the respective public and private key of decryption side by key generation centre first, Encryption side carries out encryption to data using its public key and forms ciphertext, and then ciphertext is transferred to cloud computing platform to count by encryption side It calculates, processing, is finally decrypted by decryption side using the private key that key generation centre generates.The present invention utilizes stochastic transformation method Encryption side is extended, one is constructed based on approximate greatest common divisor difficult problem and close side homomorphic cryptography side is added based on integer Method.Reduce computation complexity by the extremely efficient to encryption side, so that the homomorphic cryptography method based on integer is being added It is more adaptable in the environment that close side participates in, whole system it is more efficient, and be capable of the data-privacy of effective protection user Safety.
The technical solution adopted by the present invention to solve the technical problems: a kind of multi-party homomorphic cryptography method based on integer, Its main feature is that the following steps are included:
Step 1: key generation centre according to the security parameter λ of system generate decryption side S public private key pair, wherein λ= 2k, k is positive integer;
The private key sk of S is
Sk=p (1)
The public key pk of S is
Pk={ x0,x1,...,xτ} (2)
In formula (1), sk indicates that the private key of S, p are by key generation centre from section [2η-1,2η)∩(2Z++ 1) random on One η odd positive integers of selection, i.e.,Wherein η indicates the positive integer of η >=1,Generation Table random selection, [2η-1,2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate Positive Integer Set, (2Z++ 1) odd Positive Integer Set is indicated.
In formula (2), pk indicates that the public key of S, τ indicate the element number for including in public key pk, each element in the public key Meet condition xυ=qυp+2rυ, wherein υ ∈ { 0,1 ..., τ }, and guarantee in public key set { x0,x1,...,xτIn x0Number Value is maximum.qυAnd rυIt is the randomly selected two groups of integers of key generation centre, i.e., υ∈{0,1,...,τ}.HereRandom selection is represented,Indicate from 0 toBetween wrap Containing 0 and do not includePositive Integer Set;[-2ρ,2ρ] indicate from -2ρWith 2ρIt include -2 on sectionρWith 2ρInteger set;Z table Show integer set.
Step 2: key generation centre generates encryption side E according to the security parameter λ of systemiPublic private key pair, wherein λ= 2k, k is positive integer, i ∈ { 1,2 ..., n };
EiPrivate key skiFor
ski=pi (3)
EiPublic key pkiFor
pki={ x 'i,0,x′i,1,...,x′i,τ} (4)
In formula (3), skiIndicate EiPrivate key, piIt is by the randomly selected η of key generation centreiThe surprise of position is just whole Number, i.e.,Wherein η i indicates the positive integer of i >=1 η,It represents and randomly chooses, [2η-1,2η) It indicates from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate Positive Integer Set, (2Z++ 1) odd Positive Integer Set is indicated.
In formula (4), pkiIndicate EiPublic key, what wherein i ∈ { 1,2 ..., n }, n were represented is the number of encryption side.It is public Key pkiIn each element meet condition x 'i,j=xi,jmodxi,0.WhereinAnd it needs to guarantee collecting Close { xi,0,xi,1,...,xi,τIn xi,0Numerical value is maximum, formulaIn qi,jAnd ri,jFor in key generation The randomly selected two groups of integers of the heart, i.e.,I ∈ { 1,2 ..., n }, j ∈ {0,1,...,τ};FormulaInIt is that random permutation is carried out to the element of public key pk in formula (2) Algorithm πiThe integer of generation, replacement algorithm πiDetailed process be: key generation centre is to+1 element of τ in the public key pk of S Position carries out stochastic transformation generation
Step 3: encryption side EiIn its public key pkiSet Xi={ x 'i,0,x′i,1,...,x′i,τIn random selection one Nonvoid subset Si={ x "i,0,x″I, 1,...,x″i,t, meetAnd t is the positive integer for meeting t≤τ.Then EiChoosing Select a random integersEiFollowing computations are executed, ciphertext c is obtainedi,l:
In formula, mi,lIt is encryption side EiThe plaintext m of inputiBinary form, and mi,l∈ { 0,1 }, miIt is encryption side Ei The plaintext of input, binary length L, L are the integer greater than 0.
Step 4: the polynomial computation rule f that cloud computing platform needs to be implemented ciphertext according to decryption side S, converts f to Corresponding Boolean circuit g, then cloud computing platform execution circuit assessment algorithm, calculates multiple ciphertexts, after obtaining assessment Ciphertext C*:
In formula, Boolean circuit of the g expression cloud platform according to polynomial transformation, Evaluate indication circuit assessment algorithm,Indicate the cloud platform ciphertext encrypted by multiple encryption sides to be calculated.
It is calculated Step 5: decryption side S executes decryption using key sk=p, obtains plaintext M*:
M*=(C*mod p)mod2 (7)
In formula, p indicates that the private key of decryption side, mod indicate modular arithmetic.
The beneficial effects of the present invention are: this method generates encryption side and the respective public affairs of decryption side by key generation centre first Private key, encryption side using its public key to data carry out encryption forms ciphertext, then encryption side by ciphertext transfer to cloud computing platform into Row is calculated, is handled, and is finally decrypted by decryption side using the private key that key generation centre generates.The present invention utilizes stochastic transformation Method extends encryption side, constructs close side's homomorphism of adding based on integer based on approximate greatest common divisor difficult problem and adds Decryption method.Reduce computation complexity by the extremely efficient to encryption side, so that the homomorphic cryptography method based on integer exists Add it is more adaptable in the environment that close side participates in, whole system it is more efficient, and be capable of the data of effective protection user Personal secrets.
Specifically, this method utilize decryption side public key element stochastic transformation, by the homomorphic cryptography method based on integer from Single encryption side, which is extended to, adds close side, and the calculating by cloud computing platform to ciphertext, decryption side can be decrypted correctly.Same item Under part, when sole user needs to upload n times data, document " Fully Homomorphic Encryption over the Integers:Lecture Notes in Computer Science,Advances in Cryptology–EUROCRYPT 2010:29th Annual International Conference on the Theory and Applications of Cryptographic Techniques,French Riviera,May 30–June 3,2010.Proceedings,pp.24- 43. " need to carry out the decryption oprerations of 2n key generation operation and n times, this method need to only carry out n+1 secondary key generate operation and 1 decryption oprerations, reduces the storage overhead of key, while saving key and generating time loss and decryption time loss, mentions Algorithm computational efficiency is risen.Meanwhile this method supports different user to upload the scene of data, and multi-user side is supported to participate in, and is promoted Adaptability in cloud computing environment, improves the efficiency of whole system.
It elaborates with reference to the accompanying drawings and detailed description to the present invention.
Detailed description of the invention
Fig. 1 is the flow chart of the multi-party homomorphic cryptography method the present invention is based on integer.
The flow chart of cloud platform execution circuit assessment algorithm in Fig. 2 Fig. 1.
Specific embodiment
Explanation of nouns:
KGC: key generation centre;
Ei: the running encryption side of algorithm;
S: the running decryption side of algorithm;
Cloud Platform: cloud computing service platform;
λ: the system security parameter generated by KGC, wherein λ=2k, k is positive integer;
γ: decryption side S public key bit length is positive integer;
γi: encryption side EiPublic key bit length, be positive integer;
η: decryption side S private key bit length is positive integer;
ηi: encryption side EiPrivate key bit length, be positive integer;
ρ: decryption side S noise bits length is positive integer;
ρi: encryption side EiNoise bits length, be positive integer;
τ: decryption side S public key element number is positive integer;
T: the element number in nonvoid subset chosen in Encryption Algorithm is positive integer;
P: being the private key of decryption side S for randomly selected odd positive integer;
pi: it is encryption side E for randomly selected odd-integral numberiPrivate key;
qυ: the integer generated at random for KGC;
rυ: the integer generated at random for KGC;
For the set for carrying out stochastic transformation generation to public key pk;
xv: for the component of decryption side S public key, and v=0,1 ..., τ;
x′i,j: for encryption side EiThe component of public key, and i=1,2 ..., n, j=0,1 ..., τ;
The integer of stochastic transformation generation is carried out for the element of public key pk;
x″i,j: the element in nonvoid subset selected in Encryption Algorithm for encryption side, and i=1,2 ..., n, j=0, 1,…,t;
qi,j: the integer generated at random for KGC;
ri,j: the integer generated at random for KGC;
mi: for encryption side EiThe plaintext for needing to encrypt;
mi,l: for plaintext miThe binary value of each;
L: for plaintext miBinary length;
ci,l: for plaintext mi,lCiphertext after Encryption Algorithm calculates;
C*: for the ciphertext after the calculating of Evaluate algorithm;
F: the polynomial computation rule that decryption side needs to carry out ciphertext;
G: the calculative circuit of cloud computing platform, g ∈ Fε
Fε: for door, OR circuit set;
M*: indicate the plaintext after decipherment algorithm calculates;
Xi: indicate the public key set of encryption side;
Si: indicate the nonvoid subset randomly selected in encryption Fang Qi public key set;
πi: indicate the random permutation algorithm carried out to encryption side;
∈: indicate that an element belongs to the symbol of a set;
∩: indicate that two are gathered the operation that seeks common ground;
Mod: modular arithmetic is indicated;
∑: summation operation is indicated;
It indicates arbitrarily to choose element in a set;
Indicate that a set is the subset symbol of another set.
Referring to Fig.1-2.It considers the following scenario, in medical system, there are multiple sufferer Ei, wherein i=1,2 ..., n, Middle n is integer and n >=1, belongs to doctor S treatment, but due to the limitation of hospital internal computing system condition, need by The diagnostic analysis of patient data is carried out in cloud computing service platform Cloud Platform auxiliary doctor, due to patient data requirement The privacy of height, therefore the processing work of sufferer private data can be implemented by means of this method.
The participant that this method is related to are as follows: key generation centre (Key Generation Center, KGC), n sufferer Encryption side Ei, wherein i=1,2 ..., n, wherein n is integer and n >=1, decryption side doctor S and cloud computing service platform (Cloud Platform, CP).
If it is the product of ciphertext a Yu ciphertext b that circuit assessment algorithm is calculative, required for the ciphertext c exported The circuit of operation is as shown in Figure 2.Ciphertext a and ciphertext b is respectively to pass through the ciphertext that Encryption Algorithm is calculated, and cloud computing platform will A and b, by AND gate circuit, exports ciphertext c, ciphertext c is the product of ciphertext a and b as inputting.
Due in Encryption Algorithm, being that obtain after encryption by " position " to encrypting in plain text is an integer.And boolean Circuit is based on binary operation, so the circuit assessment algorithm of homomorphic encryption algorithm uses Boolean circuit, circuit is commented Complexity of the complexity of estimation algorithm dependent on the Boolean circuit of institute's operation.If Boolean circuit is carried out with corresponding power function It compares, its plus operation and multiplication are converted with the corresponding OR circuit of Boolean circuit, "AND" circuit.Boolean's electricity The complexity on road depends on the quantity of gate circuit, therefore these circuits can be converted any form of polynomial computation.
The security parameter of this method are as follows:
λ is the system security parameter generated by KGC, wherein λ=2k, k is positive integer;
γ is the public key bit length of decryption side S, γiIt is encryption side EiPublic key bit length;
η is the private key bit length of decryption side S, ηiIt is encryption side EiPrivate key bit length;
ρ is the noise bits length of decryption side S, ρiIt is encryption side EiNoise bits length;
Wherein γ, γi, η, ηi, ρ, ρiIt is positive integer, while the security parameter that KGC is generated in this method needs to meet such as Lower condition ρ=λ, ρi=λ, η=λ+γ, ηi=λ+γ.
The present invention is based on the multi-party homomorphic cryptography method of integer, specific step is as follows:
1, KGC generates the public private key pair of doctor S according to the security parameter λ of system, wherein λ=2k, k is positive integer;
The private key sk of doctor is
Sk=p (1)
The public key pk of doctor is
Pk={ x0,x1,...,xτ} (2)
In formula (1), sk indicates that the private key of doctor S, p are by key generation centre from section [2η-1,2η)∩(2Z++ 1) on Randomly selected one η odd positive integers, i.e.,Wherein η indicates the positive integer of η >=1,It represents and randomly chooses, [2η-1,2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1 Not comprising 2η;Z+Indicate Positive Integer Set, (2Z++ 1) odd Positive Integer Set is indicated.
In formula (2), pk indicates that the public key of doctor S, τ indicate the element number that public key pk includes, each member in the public key Element meets condition xυ=qυp+2rυ, wherein υ ∈ { 0,1 ..., τ }, and guarantee in public key { x0,x1,...,xτIn x0Numerical value It is maximum.qυAnd rυIt is the randomly selected two groups of integers of key generation centre, i.e., υ ∈{0,1,...,τ}.HereRandom selection is represented,Indicate from 0 toBetween comprising 0 and not including's Positive Integer Set;[-2ρ,2ρ] indicate from -2ρWith 2ρIt include -2 on sectionρWith 2ρInteger set;Z indicates integer set.
2, KGC generates patient E according to the security parameter λ of systemiPublic private key pair, wherein λ=2k, k is positive integer, i ∈ {1,2,...,n};
Patient EiPrivate key skiFor
ski=pi (3)
Patient EiPublic key pkiFor
pki={ x 'i,0,x′i,1,...,x′i,τ} (4)
In formula (3), skiIndicate patient EiPrivate key, piIt is by the randomly selected η of key generation centreiThe surprise of position Positive integer, i.e.,Wherein ηiIndicate ηi>=1 positive integer,It represents and randomly chooses, [2η-1, 2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate positive integer collection It closes, (2Z++ 1) odd Positive Integer Set is indicated.
In formula (4), pkiIndicate EiPublic key, that wherein i ∈ { 1,2 ..., n }, n are represented is the patient for participating in encryption Number.Public key pkiIn each element meet condition x 'i,j=xi,jmodxi,0, i ∈ { 1,2 ..., n }, j ∈ { 0,1 ..., τ }; WhereinAnd it needs to guarantee in set { xi,0,xi,1,...,xi,τIn xi,0Numerical value is maximum, formulaIn qi,jAnd ri,jIndicate the randomly selected two groups of integers of key generation centre, i.e.,I ∈ { 1,2 ..., n }, j ∈ { 0,1 ..., τ };FormulaInIt is that random permutation algorithm π is carried out to the element of public key pk in formula (2)iThe integer of generation, Replacement algorithm πiDetailed process be: key generation centre carries out stochastic transformation to the position of+1 element of τ in the public key pk of S It generates
3, patient executes Encryption Algorithm.
The public private key pair for the patient that formula (4) generates is sent to patient, patient E by KGCiThe public affairs generated according to formula (4) Key, in its public key pkiSet Xi={ x 'i,0,x′i,1,...,x′i,τOne nonvoid subset S of middle random selectioni={ x "i,0, x″i,1,...,x″i,t, meetAnd t is the positive integer for meeting t≤τ.Then EiSelect a random integersEiFollowing computations are executed, ciphertext c is obtainedi,l:
Then patient EiSelect a random integersPatient EiIt executes following Encryption Algorithm and calculates ciphertext ci,l:
In formula, mi,lIt is patient EiThe plaintext m of inputiBinary form, and mi,l∈ { 0,1 }, miIt is patient EiInput Plaintext, binary length L, L are the integer greater than 0.
4, cloud computing platform execution circuit assessment algorithm.
The polynomial computation rule that cloud computing platform needs to be implemented ciphertext according to doctor S, converts corresponding boolean for f Circuit g, g ∈ Fε, wherein FεFor with door, OR circuit set;The basic principle of conversion be by the addition in f be converted into or door electricity Road, multiplication are converted into AND gate circuit.Then cloud computing platform execution circuit assessment algorithm calculates multiple ciphertexts.It will be public The ciphertext obtained after multiple patient's encryptions in formula (5) exports ciphertext C as input, by the calculating of Boolean circuit*
In formula, g indicates cloud computing platform according to the Boolean circuit of polynomial transformation, and the assessment of Evaluate indication circuit is calculated Method,Indicate the cloud computing platform ciphertext encrypted by multiple patients to be calculated.Due to the present invention is based on be Modulo-two operation on integer, so cloud computing platform selection is based on binary Boolean circuit.Specific conversion method be by Ciphertext multiplying be converted to door operation, ciphertext add operation is converted to or door operation, and ciphertext is then input to gate Middle carry out operation, returns the result value, obtains ciphertext C*
5, doctor S executes decipherment algorithm.
Ciphertext after calculating in formula (6) is sent to doctor by cloud computing platform, and doctor S executes solution using private key sk=p Close algorithm is decrypted calculating, obtains plaintext M*:
M*=(C*mod p)mod2 (7)
In formula, C*Indicate the ciphertext obtained after cloud computing platform calculates, p indicates that the private key of S, mod indicate modular arithmetic.

Claims (1)

1. a kind of multi-party homomorphic cryptography method based on integer, it is characterised in that the following steps are included:
Step 1: key generation centre generates the public private key pair of decryption side S, wherein λ=2 according to the security parameter λ of systemk, k is Positive integer;
The private key sk of S is
Sk=p (1)
The public key pk of S is
Pk={ x0,x1,...,xτ} (2)
In formula (1), sk indicates that the private key of S, p are by key generation centre from section [2η-1,2η)∩(2Z++ 1) it is randomly choosed on One η odd positive integers, i.e.,Wherein η indicates the positive integer of η >=1,Represent with Machine selection, [2η-1,2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+ Indicate Positive Integer Set, (2Z++ 1) odd Positive Integer Set is indicated;
In formula (2), pk indicates that the public key of S, τ indicate the element number for including in public key pk, and each element meets in the public key Condition xυ=qυp+2rυ, wherein υ ∈ { 0,1 ..., τ }, and guarantee in public key set { x0,x1,...,xτIn x0Numerical value most Greatly;qυAnd rυIt is the randomly selected two groups of integers of key generation centre, i.e., υ∈ {0,1,...,τ};HereRandom selection is represented,Indicate from 0 toBetween comprising 0 and not includingJust Integer set;[-2ρ,2ρ] indicate from -2ρWith 2ρIt include -2 on sectionρWith 2ρInteger set;Z indicates integer set;
Step 2: key generation centre generates encryption side E according to the security parameter λ of systemiPublic private key pair, wherein λ=2k, k is Positive integer, i ∈ { 1,2 ..., n };
EiPrivate key skiFor
ski=pi (3)
EiPublic key pkiFor
pki={ x 'i,0,x′i,1,...,x′i,τ} (4)
In formula (3), skiIndicate EiPrivate key, piIt is by the randomly selected η of key generation centreiThe odd positive integer of position, i.e.,Wherein ηiIndicate ηi>=1 positive integer,It represents and randomly chooses, [2η-1,2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate Positive Integer Set, (2Z++1) Indicate odd Positive Integer Set;
In formula (4), pkiIndicate EiPublic key, what wherein i ∈ { 1,2 ..., n }, n were represented is the number of encryption side;Public key pki In each element meet condition x 'i,j=xi,jmodxi,0;WhereinAnd it needs to guarantee gathering {xi,0,xi,1,...,xi,τIn xi,0Numerical value is maximum, formulaIn qi,jAnd ri,jFor key generation centre Randomly selected two groups of integers, i.e.,I ∈ { 1,2 ..., n }, j ∈ 0, 1,...,τ};FormulaInIt is that random permutation algorithm is carried out to the element of public key pk in formula (2) πiThe integer of generation, replacement algorithm πiDetailed process be: position of the key generation centre to+1 element of τ in the public key pk of S Carry out stochastic transformation generation
Step 3: encryption side EiIn its public key pkiSet Xi={ x 'i,0,x′i,1,...,x′i,τOne non-empty of middle random selection Subset Si={ x "i,0,x″i,1,...,x″i,t, meetAnd t is the positive integer for meeting t≤τ;Then EiSelection one A random integersEiFollowing computations are executed, ciphertext c is obtainedi,l:
In formula, mi,lIt is encryption side EiThe plaintext m of inputiBinary form, and mi,l∈ { 0,1 }, miIt is encryption side EiInput Plaintext, binary length L, L are the integer greater than 0;
Step 4: the polynomial computation rule f that cloud computing platform needs to be implemented ciphertext according to decryption side S, converts f to accordingly Boolean circuit g, then cloud computing platform execution circuit assessment algorithm, calculates multiple ciphertexts, close after being assessed Literary C*:
In formula, Boolean circuit of the g expression cloud platform according to polynomial transformation, Evaluate indication circuit assessment algorithm,Indicate the cloud platform ciphertext encrypted by multiple encryption sides to be calculated;
It is calculated Step 5: decryption side S executes decryption using key sk=p, obtains plaintext M*:
M*=(C*modp)mod2 (7)
In formula, p indicates that the private key of decryption side, mod indicate modular arithmetic.
CN201910216898.9A 2019-03-21 2019-03-21 Multi-party homomorphic cryptography method based on integer Pending CN109962778A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910216898.9A CN109962778A (en) 2019-03-21 2019-03-21 Multi-party homomorphic cryptography method based on integer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910216898.9A CN109962778A (en) 2019-03-21 2019-03-21 Multi-party homomorphic cryptography method based on integer

Publications (1)

Publication Number Publication Date
CN109962778A true CN109962778A (en) 2019-07-02

Family

ID=67024554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910216898.9A Pending CN109962778A (en) 2019-03-21 2019-03-21 Multi-party homomorphic cryptography method based on integer

Country Status (1)

Country Link
CN (1) CN109962778A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110891066A (en) * 2019-12-03 2020-03-17 重庆交通大学 Proxy anonymous communication method based on homomorphic encryption scheme
CN111585743A (en) * 2020-04-28 2020-08-25 西安电子科技大学 Homomorphic encryption public key compression method for many-to-one on integer
CN112926078A (en) * 2021-04-23 2021-06-08 电子科技大学 Compact multi-target attribute-based addition homomorphic encryption method
CN115801228A (en) * 2023-01-09 2023-03-14 佰聆数据股份有限公司 Method and device for encrypting interactive information, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610910A (en) * 2015-12-18 2016-05-25 中南民族大学 Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers
CN106100818A (en) * 2016-06-02 2016-11-09 苏州健雄职业技术学院 A kind of data ciphering method of the full homomorphic cryptography multinomial based on integer
US20180375640A1 (en) * 2017-06-26 2018-12-27 Microsoft Technology Licensing, Llc Variable Relinearization in Homomorphic Encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610910A (en) * 2015-12-18 2016-05-25 中南民族大学 Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers
CN106100818A (en) * 2016-06-02 2016-11-09 苏州健雄职业技术学院 A kind of data ciphering method of the full homomorphic cryptography multinomial based on integer
US20180375640A1 (en) * 2017-06-26 2018-12-27 Microsoft Technology Licensing, Llc Variable Relinearization in Homomorphic Encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王彩芬: "《基于整数的多对一全同态加密方案》", 《电子与信息学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110891066A (en) * 2019-12-03 2020-03-17 重庆交通大学 Proxy anonymous communication method based on homomorphic encryption scheme
CN110891066B (en) * 2019-12-03 2022-03-01 重庆交通大学 Proxy anonymous communication method based on homomorphic encryption scheme
CN111585743A (en) * 2020-04-28 2020-08-25 西安电子科技大学 Homomorphic encryption public key compression method for many-to-one on integer
CN112926078A (en) * 2021-04-23 2021-06-08 电子科技大学 Compact multi-target attribute-based addition homomorphic encryption method
CN112926078B (en) * 2021-04-23 2022-12-27 电子科技大学 Compact multi-target attribute-based addition homomorphic encryption method
CN115801228A (en) * 2023-01-09 2023-03-14 佰聆数据股份有限公司 Method and device for encrypting interactive information, electronic equipment and storage medium
CN115801228B (en) * 2023-01-09 2023-04-28 佰聆数据股份有限公司 Interactive information encryption method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
Wang et al. Cryptanalysis of a symmetric fully homomorphic encryption scheme
CN109962778A (en) Multi-party homomorphic cryptography method based on integer
KR100857323B1 (en) Methods, devices and systems for generating anonymous public keys in a secure communication system
Frikken Practical private DNA string searching and matching through efficient oblivious automata evaluation
Azarderakhsh et al. Practical supersingular isogeny group key agreement
JP4869824B2 (en) Receiver device, sender device, cryptographic communication system, and program
Kumari et al. Preserving health care data security and privacy using Carmichael's theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing systems
Wang et al. Privacy preserving computations over healthcare data
Mahdavi et al. Practical over-threshold multi-party private set intersection
Padhye et al. Introduction to cryptography
CN107819581A (en) The generation method and system of number and elliptic curve point comprising secret
Patel et al. An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography
Mohan et al. Improved ElGamal cryptosystem for secure data transfer in IoT networks
CN105393488A (en) Method for establishing public key cryptogram against quantum computing attack
Patel et al. Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation
CN108880782A (en) The secrecy calculation method of minimum value under a kind of cloud computing platform
US20190215148A1 (en) Method of establishing anti-attack public key cryptogram
Dumas et al. Private multi-party matrix multiplication and trust computations
Liao et al. Cryptanalysis of an identity-based encryption scheme with equality test and improvement
CN113535121B (en) Safe and efficient mathematical division calculation optimization method based on secret sharing protocol
Nalwaya et al. A cryptographic approach based on integrating running key in feedback mode of elgamal system
Vigila et al. A new elliptic curve cryptosystem for securing sensitive data applications
You et al. Secure two-party computation approach for ntruencrypt
Lakum et al. A key-ordered decisional learning parity with noise (DLPN) scheme for public key encryption scheme in cloud computing
Malyutina An analogue of the El Gamal scheme based on the Markovski algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702

RJ01 Rejection of invention patent application after publication