CN109962778A - Multi-party homomorphic cryptography method based on integer - Google Patents
Multi-party homomorphic cryptography method based on integer Download PDFInfo
- Publication number
- CN109962778A CN109962778A CN201910216898.9A CN201910216898A CN109962778A CN 109962778 A CN109962778 A CN 109962778A CN 201910216898 A CN201910216898 A CN 201910216898A CN 109962778 A CN109962778 A CN 109962778A
- Authority
- CN
- China
- Prior art keywords
- key
- integer
- indicate
- encryption
- formula
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Abstract
The multi-party homomorphic cryptography method based on integer that the invention discloses a kind of, for solving the technical problem of the existing homomorphic cryptography method applicability difference based on integer.Technical solution is to generate encryption side and the respective public and private key of decryption side by key generation centre first, encryption side carries out encryption to data using its public key and forms ciphertext, then ciphertext is transferred to cloud computing platform to be calculated, handled by encryption side, is finally decrypted by decryption side using the private key that key generation centre generates.The present invention extends encryption side using stochastic transformation method, constructs one based on approximate greatest common divisor difficult problem and adds close side's homomorphic cryptography method based on integer.Reduce computation complexity by the extremely efficient to encryption side so that the homomorphic cryptography method based on integer is more adaptable in adding the environment that close side participates in, whole system it is more efficient, and be capable of the data-privacy safety of effective protection user.
Description
Technical field
The homomorphic cryptography method based on integer that the present invention relates to a kind of, in particular to a kind of multi-party homomorphism based on integer add
Decryption method.
Background technique
Document " Fully Homomorphic Encryption over the Integers:Lecture Notes in
Computer Science,Advances in Cryptology–EUROCRYPT 2010:29th Annual
International Conference on the Theory and Applications of Cryptographic
Techniques, French Riviera, May 30-June 3,2010.Proceedings, pp.24-43. " disclose one kind
Homomorphic cryptography method based on integer.This method is transported on the basis of the homomorphic cryptography method of part using the integer mould in number theory
It can be regarded as the basis for algorithm, shorten keys sizes and ciphertext length, compared to the homomorphic cryptography method effect of lattice operation construction
It increases in rate.Meanwhile using homomorphic decryption, Re-encryption Technology, it is complete same that original part homomorphic cryptography method, which is expanded,
State encryption method realizes the calculating to ciphertext arbitrary number of times.But in cloud computing environment, this method needs more in a side
It is inefficient in the case where secondary upload data.Also, this method is directed to a case where side encrypts side decryption, however practical
A decryption side needs to correspond to multiple encryption sides, such as cloud medical environment in situation, and a doctor generally requires to correspond to multiple trouble
Person, and need for calculating task to be contracted out to third party cloud platform, this method can only provide a patient and carry out with a doctor
Interaction, so the applicability in network environment this method of multi-user is not strong, and the efficiency of system is relatively low.
Summary of the invention
In order to overcome the shortcomings of that the existing homomorphic cryptography method applicability based on integer is poor, the present invention provides a kind of based on whole
Several multi-party homomorphic cryptography methods.This method generates encryption side and the respective public and private key of decryption side by key generation centre first,
Encryption side carries out encryption to data using its public key and forms ciphertext, and then ciphertext is transferred to cloud computing platform to count by encryption side
It calculates, processing, is finally decrypted by decryption side using the private key that key generation centre generates.The present invention utilizes stochastic transformation method
Encryption side is extended, one is constructed based on approximate greatest common divisor difficult problem and close side homomorphic cryptography side is added based on integer
Method.Reduce computation complexity by the extremely efficient to encryption side, so that the homomorphic cryptography method based on integer is being added
It is more adaptable in the environment that close side participates in, whole system it is more efficient, and be capable of the data-privacy of effective protection user
Safety.
The technical solution adopted by the present invention to solve the technical problems: a kind of multi-party homomorphic cryptography method based on integer,
Its main feature is that the following steps are included:
Step 1: key generation centre according to the security parameter λ of system generate decryption side S public private key pair, wherein λ=
2k, k is positive integer;
The private key sk of S is
Sk=p (1)
The public key pk of S is
Pk={ x0,x1,...,xτ} (2)
In formula (1), sk indicates that the private key of S, p are by key generation centre from section [2η-1,2η)∩(2Z++ 1) random on
One η odd positive integers of selection, i.e.,Wherein η indicates the positive integer of η >=1,Generation
Table random selection, [2η-1,2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate Positive Integer Set, (2Z++ 1) odd Positive Integer Set is indicated.
In formula (2), pk indicates that the public key of S, τ indicate the element number for including in public key pk, each element in the public key
Meet condition xυ=qυp+2rυ, wherein υ ∈ { 0,1 ..., τ }, and guarantee in public key set { x0,x1,...,xτIn x0Number
Value is maximum.qυAnd rυIt is the randomly selected two groups of integers of key generation centre, i.e., υ∈{0,1,...,τ}.HereRandom selection is represented,Indicate from 0 toBetween wrap
Containing 0 and do not includePositive Integer Set;[-2ρ,2ρ] indicate from -2ρWith 2ρIt include -2 on sectionρWith 2ρInteger set;Z table
Show integer set.
Step 2: key generation centre generates encryption side E according to the security parameter λ of systemiPublic private key pair, wherein λ=
2k, k is positive integer, i ∈ { 1,2 ..., n };
EiPrivate key skiFor
ski=pi (3)
EiPublic key pkiFor
pki={ x 'i,0,x′i,1,...,x′i,τ} (4)
In formula (3), skiIndicate EiPrivate key, piIt is by the randomly selected η of key generation centreiThe surprise of position is just whole
Number, i.e.,Wherein η i indicates the positive integer of i >=1 η,It represents and randomly chooses, [2η-1,2η)
It indicates from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate Positive Integer Set,
(2Z++ 1) odd Positive Integer Set is indicated.
In formula (4), pkiIndicate EiPublic key, what wherein i ∈ { 1,2 ..., n }, n were represented is the number of encryption side.It is public
Key pkiIn each element meet condition x 'i,j=xi,jmodxi,0.WhereinAnd it needs to guarantee collecting
Close { xi,0,xi,1,...,xi,τIn xi,0Numerical value is maximum, formulaIn qi,jAnd ri,jFor in key generation
The randomly selected two groups of integers of the heart, i.e.,I ∈ { 1,2 ..., n }, j ∈
{0,1,...,τ};FormulaInIt is that random permutation is carried out to the element of public key pk in formula (2)
Algorithm πiThe integer of generation, replacement algorithm πiDetailed process be: key generation centre is to+1 element of τ in the public key pk of S
Position carries out stochastic transformation generation
Step 3: encryption side EiIn its public key pkiSet Xi={ x 'i,0,x′i,1,...,x′i,τIn random selection one
Nonvoid subset Si={ x "i,0,x″I, 1,...,x″i,t, meetAnd t is the positive integer for meeting t≤τ.Then EiChoosing
Select a random integersEiFollowing computations are executed, ciphertext c is obtainedi,l:
In formula, mi,lIt is encryption side EiThe plaintext m of inputiBinary form, and mi,l∈ { 0,1 }, miIt is encryption side Ei
The plaintext of input, binary length L, L are the integer greater than 0.
Step 4: the polynomial computation rule f that cloud computing platform needs to be implemented ciphertext according to decryption side S, converts f to
Corresponding Boolean circuit g, then cloud computing platform execution circuit assessment algorithm, calculates multiple ciphertexts, after obtaining assessment
Ciphertext C*:
In formula, Boolean circuit of the g expression cloud platform according to polynomial transformation, Evaluate indication circuit assessment algorithm,Indicate the cloud platform ciphertext encrypted by multiple encryption sides to be calculated.
It is calculated Step 5: decryption side S executes decryption using key sk=p, obtains plaintext M*:
M*=(C*mod p)mod2 (7)
In formula, p indicates that the private key of decryption side, mod indicate modular arithmetic.
The beneficial effects of the present invention are: this method generates encryption side and the respective public affairs of decryption side by key generation centre first
Private key, encryption side using its public key to data carry out encryption forms ciphertext, then encryption side by ciphertext transfer to cloud computing platform into
Row is calculated, is handled, and is finally decrypted by decryption side using the private key that key generation centre generates.The present invention utilizes stochastic transformation
Method extends encryption side, constructs close side's homomorphism of adding based on integer based on approximate greatest common divisor difficult problem and adds
Decryption method.Reduce computation complexity by the extremely efficient to encryption side, so that the homomorphic cryptography method based on integer exists
Add it is more adaptable in the environment that close side participates in, whole system it is more efficient, and be capable of the data of effective protection user
Personal secrets.
Specifically, this method utilize decryption side public key element stochastic transformation, by the homomorphic cryptography method based on integer from
Single encryption side, which is extended to, adds close side, and the calculating by cloud computing platform to ciphertext, decryption side can be decrypted correctly.Same item
Under part, when sole user needs to upload n times data, document " Fully Homomorphic Encryption over the
Integers:Lecture Notes in Computer Science,Advances in Cryptology–EUROCRYPT
2010:29th Annual International Conference on the Theory and Applications of
Cryptographic Techniques,French Riviera,May 30–June 3,2010.Proceedings,pp.24-
43. " need to carry out the decryption oprerations of 2n key generation operation and n times, this method need to only carry out n+1 secondary key generate operation and
1 decryption oprerations, reduces the storage overhead of key, while saving key and generating time loss and decryption time loss, mentions
Algorithm computational efficiency is risen.Meanwhile this method supports different user to upload the scene of data, and multi-user side is supported to participate in, and is promoted
Adaptability in cloud computing environment, improves the efficiency of whole system.
It elaborates with reference to the accompanying drawings and detailed description to the present invention.
Detailed description of the invention
Fig. 1 is the flow chart of the multi-party homomorphic cryptography method the present invention is based on integer.
The flow chart of cloud platform execution circuit assessment algorithm in Fig. 2 Fig. 1.
Specific embodiment
Explanation of nouns:
KGC: key generation centre;
Ei: the running encryption side of algorithm;
S: the running decryption side of algorithm;
Cloud Platform: cloud computing service platform;
λ: the system security parameter generated by KGC, wherein λ=2k, k is positive integer;
γ: decryption side S public key bit length is positive integer;
γi: encryption side EiPublic key bit length, be positive integer;
η: decryption side S private key bit length is positive integer;
ηi: encryption side EiPrivate key bit length, be positive integer;
ρ: decryption side S noise bits length is positive integer;
ρi: encryption side EiNoise bits length, be positive integer;
τ: decryption side S public key element number is positive integer;
T: the element number in nonvoid subset chosen in Encryption Algorithm is positive integer;
P: being the private key of decryption side S for randomly selected odd positive integer;
pi: it is encryption side E for randomly selected odd-integral numberiPrivate key;
qυ: the integer generated at random for KGC;
rυ: the integer generated at random for KGC;
For the set for carrying out stochastic transformation generation to public key pk;
xv: for the component of decryption side S public key, and v=0,1 ..., τ;
x′i,j: for encryption side EiThe component of public key, and i=1,2 ..., n, j=0,1 ..., τ;
The integer of stochastic transformation generation is carried out for the element of public key pk;
x″i,j: the element in nonvoid subset selected in Encryption Algorithm for encryption side, and i=1,2 ..., n, j=0,
1,…,t;
qi,j: the integer generated at random for KGC;
ri,j: the integer generated at random for KGC;
mi: for encryption side EiThe plaintext for needing to encrypt;
mi,l: for plaintext miThe binary value of each;
L: for plaintext miBinary length;
ci,l: for plaintext mi,lCiphertext after Encryption Algorithm calculates;
C*: for the ciphertext after the calculating of Evaluate algorithm;
F: the polynomial computation rule that decryption side needs to carry out ciphertext;
G: the calculative circuit of cloud computing platform, g ∈ Fε;
Fε: for door, OR circuit set;
M*: indicate the plaintext after decipherment algorithm calculates;
Xi: indicate the public key set of encryption side;
Si: indicate the nonvoid subset randomly selected in encryption Fang Qi public key set;
πi: indicate the random permutation algorithm carried out to encryption side;
∈: indicate that an element belongs to the symbol of a set;
∩: indicate that two are gathered the operation that seeks common ground;
Mod: modular arithmetic is indicated;
∑: summation operation is indicated;
It indicates arbitrarily to choose element in a set;
Indicate that a set is the subset symbol of another set.
Referring to Fig.1-2.It considers the following scenario, in medical system, there are multiple sufferer Ei, wherein i=1,2 ..., n,
Middle n is integer and n >=1, belongs to doctor S treatment, but due to the limitation of hospital internal computing system condition, need by
The diagnostic analysis of patient data is carried out in cloud computing service platform Cloud Platform auxiliary doctor, due to patient data requirement
The privacy of height, therefore the processing work of sufferer private data can be implemented by means of this method.
The participant that this method is related to are as follows: key generation centre (Key Generation Center, KGC), n sufferer
Encryption side Ei, wherein i=1,2 ..., n, wherein n is integer and n >=1, decryption side doctor S and cloud computing service platform
(Cloud Platform, CP).
If it is the product of ciphertext a Yu ciphertext b that circuit assessment algorithm is calculative, required for the ciphertext c exported
The circuit of operation is as shown in Figure 2.Ciphertext a and ciphertext b is respectively to pass through the ciphertext that Encryption Algorithm is calculated, and cloud computing platform will
A and b, by AND gate circuit, exports ciphertext c, ciphertext c is the product of ciphertext a and b as inputting.
Due in Encryption Algorithm, being that obtain after encryption by " position " to encrypting in plain text is an integer.And boolean
Circuit is based on binary operation, so the circuit assessment algorithm of homomorphic encryption algorithm uses Boolean circuit, circuit is commented
Complexity of the complexity of estimation algorithm dependent on the Boolean circuit of institute's operation.If Boolean circuit is carried out with corresponding power function
It compares, its plus operation and multiplication are converted with the corresponding OR circuit of Boolean circuit, "AND" circuit.Boolean's electricity
The complexity on road depends on the quantity of gate circuit, therefore these circuits can be converted any form of polynomial computation.
The security parameter of this method are as follows:
λ is the system security parameter generated by KGC, wherein λ=2k, k is positive integer;
γ is the public key bit length of decryption side S, γiIt is encryption side EiPublic key bit length;
η is the private key bit length of decryption side S, ηiIt is encryption side EiPrivate key bit length;
ρ is the noise bits length of decryption side S, ρiIt is encryption side EiNoise bits length;
Wherein γ, γi, η, ηi, ρ, ρiIt is positive integer, while the security parameter that KGC is generated in this method needs to meet such as
Lower condition ρ=λ, ρi=λ, η=λ+γ, ηi=λ+γ.
The present invention is based on the multi-party homomorphic cryptography method of integer, specific step is as follows:
1, KGC generates the public private key pair of doctor S according to the security parameter λ of system, wherein λ=2k, k is positive integer;
The private key sk of doctor is
Sk=p (1)
The public key pk of doctor is
Pk={ x0,x1,...,xτ} (2)
In formula (1), sk indicates that the private key of doctor S, p are by key generation centre from section [2η-1,2η)∩(2Z++ 1) on
Randomly selected one η odd positive integers, i.e.,Wherein η indicates the positive integer of η >=1,It represents and randomly chooses, [2η-1,2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1
Not comprising 2η;Z+Indicate Positive Integer Set, (2Z++ 1) odd Positive Integer Set is indicated.
In formula (2), pk indicates that the public key of doctor S, τ indicate the element number that public key pk includes, each member in the public key
Element meets condition xυ=qυp+2rυ, wherein υ ∈ { 0,1 ..., τ }, and guarantee in public key { x0,x1,...,xτIn x0Numerical value
It is maximum.qυAnd rυIt is the randomly selected two groups of integers of key generation centre, i.e., υ
∈{0,1,...,τ}.HereRandom selection is represented,Indicate from 0 toBetween comprising 0 and not including's
Positive Integer Set;[-2ρ,2ρ] indicate from -2ρWith 2ρIt include -2 on sectionρWith 2ρInteger set;Z indicates integer set.
2, KGC generates patient E according to the security parameter λ of systemiPublic private key pair, wherein λ=2k, k is positive integer, i ∈
{1,2,...,n};
Patient EiPrivate key skiFor
ski=pi (3)
Patient EiPublic key pkiFor
pki={ x 'i,0,x′i,1,...,x′i,τ} (4)
In formula (3), skiIndicate patient EiPrivate key, piIt is by the randomly selected η of key generation centreiThe surprise of position
Positive integer, i.e.,Wherein ηiIndicate ηi>=1 positive integer,It represents and randomly chooses, [2η-1,
2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate positive integer collection
It closes, (2Z++ 1) odd Positive Integer Set is indicated.
In formula (4), pkiIndicate EiPublic key, that wherein i ∈ { 1,2 ..., n }, n are represented is the patient for participating in encryption
Number.Public key pkiIn each element meet condition x 'i,j=xi,jmodxi,0, i ∈ { 1,2 ..., n }, j ∈ { 0,1 ..., τ };
WhereinAnd it needs to guarantee in set { xi,0,xi,1,...,xi,τIn xi,0Numerical value is maximum, formulaIn qi,jAnd ri,jIndicate the randomly selected two groups of integers of key generation centre, i.e.,I ∈ { 1,2 ..., n }, j ∈ { 0,1 ..., τ };FormulaInIt is that random permutation algorithm π is carried out to the element of public key pk in formula (2)iThe integer of generation,
Replacement algorithm πiDetailed process be: key generation centre carries out stochastic transformation to the position of+1 element of τ in the public key pk of S
It generates
3, patient executes Encryption Algorithm.
The public private key pair for the patient that formula (4) generates is sent to patient, patient E by KGCiThe public affairs generated according to formula (4)
Key, in its public key pkiSet Xi={ x 'i,0,x′i,1,...,x′i,τOne nonvoid subset S of middle random selectioni={ x "i,0,
x″i,1,...,x″i,t, meetAnd t is the positive integer for meeting t≤τ.Then EiSelect a random integersEiFollowing computations are executed, ciphertext c is obtainedi,l:
Then patient EiSelect a random integersPatient EiIt executes following Encryption Algorithm and calculates ciphertext
ci,l:
In formula, mi,lIt is patient EiThe plaintext m of inputiBinary form, and mi,l∈ { 0,1 }, miIt is patient EiInput
Plaintext, binary length L, L are the integer greater than 0.
4, cloud computing platform execution circuit assessment algorithm.
The polynomial computation rule that cloud computing platform needs to be implemented ciphertext according to doctor S, converts corresponding boolean for f
Circuit g, g ∈ Fε, wherein FεFor with door, OR circuit set;The basic principle of conversion be by the addition in f be converted into or door electricity
Road, multiplication are converted into AND gate circuit.Then cloud computing platform execution circuit assessment algorithm calculates multiple ciphertexts.It will be public
The ciphertext obtained after multiple patient's encryptions in formula (5) exports ciphertext C as input, by the calculating of Boolean circuit*。
In formula, g indicates cloud computing platform according to the Boolean circuit of polynomial transformation, and the assessment of Evaluate indication circuit is calculated
Method,Indicate the cloud computing platform ciphertext encrypted by multiple patients to be calculated.Due to the present invention is based on be
Modulo-two operation on integer, so cloud computing platform selection is based on binary Boolean circuit.Specific conversion method be by
Ciphertext multiplying be converted to door operation, ciphertext add operation is converted to or door operation, and ciphertext is then input to gate
Middle carry out operation, returns the result value, obtains ciphertext C*。
5, doctor S executes decipherment algorithm.
Ciphertext after calculating in formula (6) is sent to doctor by cloud computing platform, and doctor S executes solution using private key sk=p
Close algorithm is decrypted calculating, obtains plaintext M*:
M*=(C*mod p)mod2 (7)
In formula, C*Indicate the ciphertext obtained after cloud computing platform calculates, p indicates that the private key of S, mod indicate modular arithmetic.
Claims (1)
1. a kind of multi-party homomorphic cryptography method based on integer, it is characterised in that the following steps are included:
Step 1: key generation centre generates the public private key pair of decryption side S, wherein λ=2 according to the security parameter λ of systemk, k is
Positive integer;
The private key sk of S is
Sk=p (1)
The public key pk of S is
Pk={ x0,x1,...,xτ} (2)
In formula (1), sk indicates that the private key of S, p are by key generation centre from section [2η-1,2η)∩(2Z++ 1) it is randomly choosed on
One η odd positive integers, i.e.,Wherein η indicates the positive integer of η >=1,Represent with
Machine selection, [2η-1,2η) indicate from 2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+
Indicate Positive Integer Set, (2Z++ 1) odd Positive Integer Set is indicated;
In formula (2), pk indicates that the public key of S, τ indicate the element number for including in public key pk, and each element meets in the public key
Condition xυ=qυp+2rυ, wherein υ ∈ { 0,1 ..., τ }, and guarantee in public key set { x0,x1,...,xτIn x0Numerical value most
Greatly;qυAnd rυIt is the randomly selected two groups of integers of key generation centre, i.e., υ∈
{0,1,...,τ};HereRandom selection is represented,Indicate from 0 toBetween comprising 0 and not includingJust
Integer set;[-2ρ,2ρ] indicate from -2ρWith 2ρIt include -2 on sectionρWith 2ρInteger set;Z indicates integer set;
Step 2: key generation centre generates encryption side E according to the security parameter λ of systemiPublic private key pair, wherein λ=2k, k is
Positive integer, i ∈ { 1,2 ..., n };
EiPrivate key skiFor
ski=pi (3)
EiPublic key pkiFor
pki={ x 'i,0,x′i,1,...,x′i,τ} (4)
In formula (3), skiIndicate EiPrivate key, piIt is by the randomly selected η of key generation centreiThe odd positive integer of position, i.e.,Wherein ηiIndicate ηi>=1 positive integer,It represents and randomly chooses, [2η-1,2η) indicate from
2η-1To 2ηBetween the set that constitutes of all odd positive integers, and include 2η-1Not comprising 2η;Z+Indicate Positive Integer Set, (2Z++1)
Indicate odd Positive Integer Set;
In formula (4), pkiIndicate EiPublic key, what wherein i ∈ { 1,2 ..., n }, n were represented is the number of encryption side;Public key pki
In each element meet condition x 'i,j=xi,jmodxi,0;WhereinAnd it needs to guarantee gathering
{xi,0,xi,1,...,xi,τIn xi,0Numerical value is maximum, formulaIn qi,jAnd ri,jFor key generation centre
Randomly selected two groups of integers, i.e.,I ∈ { 1,2 ..., n }, j ∈ 0,
1,...,τ};FormulaInIt is that random permutation algorithm is carried out to the element of public key pk in formula (2)
πiThe integer of generation, replacement algorithm πiDetailed process be: position of the key generation centre to+1 element of τ in the public key pk of S
Carry out stochastic transformation generation
Step 3: encryption side EiIn its public key pkiSet Xi={ x 'i,0,x′i,1,...,x′i,τOne non-empty of middle random selection
Subset Si={ x "i,0,x″i,1,...,x″i,t, meetAnd t is the positive integer for meeting t≤τ;Then EiSelection one
A random integersEiFollowing computations are executed, ciphertext c is obtainedi,l:
In formula, mi,lIt is encryption side EiThe plaintext m of inputiBinary form, and mi,l∈ { 0,1 }, miIt is encryption side EiInput
Plaintext, binary length L, L are the integer greater than 0;
Step 4: the polynomial computation rule f that cloud computing platform needs to be implemented ciphertext according to decryption side S, converts f to accordingly
Boolean circuit g, then cloud computing platform execution circuit assessment algorithm, calculates multiple ciphertexts, close after being assessed
Literary C*:
In formula, Boolean circuit of the g expression cloud platform according to polynomial transformation, Evaluate indication circuit assessment algorithm,Indicate the cloud platform ciphertext encrypted by multiple encryption sides to be calculated;
It is calculated Step 5: decryption side S executes decryption using key sk=p, obtains plaintext M*:
M*=(C*modp)mod2 (7)
In formula, p indicates that the private key of decryption side, mod indicate modular arithmetic.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910216898.9A CN109962778A (en) | 2019-03-21 | 2019-03-21 | Multi-party homomorphic cryptography method based on integer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910216898.9A CN109962778A (en) | 2019-03-21 | 2019-03-21 | Multi-party homomorphic cryptography method based on integer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109962778A true CN109962778A (en) | 2019-07-02 |
Family
ID=67024554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910216898.9A Pending CN109962778A (en) | 2019-03-21 | 2019-03-21 | Multi-party homomorphic cryptography method based on integer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109962778A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110891066A (en) * | 2019-12-03 | 2020-03-17 | 重庆交通大学 | Proxy anonymous communication method based on homomorphic encryption scheme |
CN111585743A (en) * | 2020-04-28 | 2020-08-25 | 西安电子科技大学 | Homomorphic encryption public key compression method for many-to-one on integer |
CN112926078A (en) * | 2021-04-23 | 2021-06-08 | 电子科技大学 | Compact multi-target attribute-based addition homomorphic encryption method |
CN115801228A (en) * | 2023-01-09 | 2023-03-14 | 佰聆数据股份有限公司 | Method and device for encrypting interactive information, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610910A (en) * | 2015-12-18 | 2016-05-25 | 中南民族大学 | Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers |
CN106100818A (en) * | 2016-06-02 | 2016-11-09 | 苏州健雄职业技术学院 | A kind of data ciphering method of the full homomorphic cryptography multinomial based on integer |
US20180375640A1 (en) * | 2017-06-26 | 2018-12-27 | Microsoft Technology Licensing, Llc | Variable Relinearization in Homomorphic Encryption |
-
2019
- 2019-03-21 CN CN201910216898.9A patent/CN109962778A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610910A (en) * | 2015-12-18 | 2016-05-25 | 中南民族大学 | Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers |
CN106100818A (en) * | 2016-06-02 | 2016-11-09 | 苏州健雄职业技术学院 | A kind of data ciphering method of the full homomorphic cryptography multinomial based on integer |
US20180375640A1 (en) * | 2017-06-26 | 2018-12-27 | Microsoft Technology Licensing, Llc | Variable Relinearization in Homomorphic Encryption |
Non-Patent Citations (1)
Title |
---|
王彩芬: "《基于整数的多对一全同态加密方案》", 《电子与信息学报》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110891066A (en) * | 2019-12-03 | 2020-03-17 | 重庆交通大学 | Proxy anonymous communication method based on homomorphic encryption scheme |
CN110891066B (en) * | 2019-12-03 | 2022-03-01 | 重庆交通大学 | Proxy anonymous communication method based on homomorphic encryption scheme |
CN111585743A (en) * | 2020-04-28 | 2020-08-25 | 西安电子科技大学 | Homomorphic encryption public key compression method for many-to-one on integer |
CN112926078A (en) * | 2021-04-23 | 2021-06-08 | 电子科技大学 | Compact multi-target attribute-based addition homomorphic encryption method |
CN112926078B (en) * | 2021-04-23 | 2022-12-27 | 电子科技大学 | Compact multi-target attribute-based addition homomorphic encryption method |
CN115801228A (en) * | 2023-01-09 | 2023-03-14 | 佰聆数据股份有限公司 | Method and device for encrypting interactive information, electronic equipment and storage medium |
CN115801228B (en) * | 2023-01-09 | 2023-04-28 | 佰聆数据股份有限公司 | Interactive information encryption method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Cryptanalysis of a symmetric fully homomorphic encryption scheme | |
CN109962778A (en) | Multi-party homomorphic cryptography method based on integer | |
KR100857323B1 (en) | Methods, devices and systems for generating anonymous public keys in a secure communication system | |
Frikken | Practical private DNA string searching and matching through efficient oblivious automata evaluation | |
Azarderakhsh et al. | Practical supersingular isogeny group key agreement | |
JP4869824B2 (en) | Receiver device, sender device, cryptographic communication system, and program | |
Kumari et al. | Preserving health care data security and privacy using Carmichael's theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing systems | |
Wang et al. | Privacy preserving computations over healthcare data | |
Mahdavi et al. | Practical over-threshold multi-party private set intersection | |
Padhye et al. | Introduction to cryptography | |
CN107819581A (en) | The generation method and system of number and elliptic curve point comprising secret | |
Patel et al. | An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography | |
Mohan et al. | Improved ElGamal cryptosystem for secure data transfer in IoT networks | |
CN105393488A (en) | Method for establishing public key cryptogram against quantum computing attack | |
Patel et al. | Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation | |
CN108880782A (en) | The secrecy calculation method of minimum value under a kind of cloud computing platform | |
US20190215148A1 (en) | Method of establishing anti-attack public key cryptogram | |
Dumas et al. | Private multi-party matrix multiplication and trust computations | |
Liao et al. | Cryptanalysis of an identity-based encryption scheme with equality test and improvement | |
CN113535121B (en) | Safe and efficient mathematical division calculation optimization method based on secret sharing protocol | |
Nalwaya et al. | A cryptographic approach based on integrating running key in feedback mode of elgamal system | |
Vigila et al. | A new elliptic curve cryptosystem for securing sensitive data applications | |
You et al. | Secure two-party computation approach for ntruencrypt | |
Lakum et al. | A key-ordered decisional learning parity with noise (DLPN) scheme for public key encryption scheme in cloud computing | |
Malyutina | An analogue of the El Gamal scheme based on the Markovski algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190702 |
|
RJ01 | Rejection of invention patent application after publication |