CN113901506A - Post-quantum encryption method supporting multi-party private data operation in secret state - Google Patents
Post-quantum encryption method supporting multi-party private data operation in secret state Download PDFInfo
- Publication number
- CN113901506A CN113901506A CN202111481147.3A CN202111481147A CN113901506A CN 113901506 A CN113901506 A CN 113901506A CN 202111481147 A CN202111481147 A CN 202111481147A CN 113901506 A CN113901506 A CN 113901506A
- Authority
- CN
- China
- Prior art keywords
- key
- ciphertext
- private
- homomorphic
- post
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000006870 function Effects 0.000 claims abstract description 8
- 239000013598 vector Substances 0.000 claims description 20
- 238000005070 sampling Methods 0.000 claims description 4
- 125000004122 cyclic group Chemical group 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 4
- 238000004891 communication Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 241001274658 Modulus modulus Species 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N10/00—Quantum computing, i.e. information processing based on quantum-mechanical phenomena
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Evolutionary Computation (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Artificial Intelligence (AREA)
- Computational Mathematics (AREA)
- Condensed Matter Physics & Semiconductors (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Complex Calculations (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111481147.3A CN113901506B (en) | 2021-12-07 | 2021-12-07 | Post-quantum encryption method supporting multi-party private data operation in secret state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111481147.3A CN113901506B (en) | 2021-12-07 | 2021-12-07 | Post-quantum encryption method supporting multi-party private data operation in secret state |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113901506A true CN113901506A (en) | 2022-01-07 |
CN113901506B CN113901506B (en) | 2022-03-11 |
Family
ID=79025581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111481147.3A Active CN113901506B (en) | 2021-12-07 | 2021-12-07 | Post-quantum encryption method supporting multi-party private data operation in secret state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113901506B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115276948A (en) * | 2022-07-20 | 2022-11-01 | 京信数据科技有限公司 | Homomorphic encryption calculation method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108880782A (en) * | 2018-08-31 | 2018-11-23 | 西安科技大学 | The secrecy calculation method of minimum value under a kind of cloud computing platform |
CN109936435A (en) * | 2019-01-24 | 2019-06-25 | 中国人民武装警察部队工程大学 | With the quick full homomorphic cryptography method of homomorphism calculating process NTRU type multi-key cipher |
CN112543091A (en) * | 2020-10-26 | 2021-03-23 | 中国人民武装警察部队工程大学 | Multi-key fully homomorphic encryption method with fixed ciphertext length |
-
2021
- 2021-12-07 CN CN202111481147.3A patent/CN113901506B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108880782A (en) * | 2018-08-31 | 2018-11-23 | 西安科技大学 | The secrecy calculation method of minimum value under a kind of cloud computing platform |
CN109936435A (en) * | 2019-01-24 | 2019-06-25 | 中国人民武装警察部队工程大学 | With the quick full homomorphic cryptography method of homomorphism calculating process NTRU type multi-key cipher |
CN112543091A (en) * | 2020-10-26 | 2021-03-23 | 中国人民武装警察部队工程大学 | Multi-key fully homomorphic encryption method with fixed ciphertext length |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115276948A (en) * | 2022-07-20 | 2022-11-01 | 京信数据科技有限公司 | Homomorphic encryption calculation method and system |
Also Published As
Publication number | Publication date |
---|---|
CN113901506B (en) | 2022-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Murphy et al. | Essential algebraic structure within the AES | |
CN107707358B (en) | EC-KCDSA digital signature generation method and system | |
Oktaviana et al. | Three-pass protocol implementation in caesar cipher classic cryptography | |
Lin et al. | Cryptanalysis of a chaotic stream cipher and its improved scheme | |
CN105162589A (en) | Lattice-based verifiable attribute encryption method | |
Rahim et al. | Combination vigenere cipher and one time pad for data security | |
CN115412239A (en) | SM 2-based public key encryption and decryption method with re-randomness | |
CN113901506B (en) | Post-quantum encryption method supporting multi-party private data operation in secret state | |
Mi et al. | Oblivious transfer based on NTRUEncrypt | |
Meng et al. | Asymmetric encryption algorithms: primitives and applications | |
Zhang et al. | Efficient multiple sources network coding signature in the standard model | |
CN104601323B (en) | Solves the method for socialism millionaires' problem based on BDD | |
Nalwaya et al. | A cryptographic approach based on integrating running key in feedback mode of elgamal system | |
Backes et al. | Fully secure inner-product proxy re-encryption with constant size ciphertext | |
Li et al. | Unidirectional FHPRE Scheme from Lattice for Cloud Computing. | |
Aydin et al. | A provable secure image encryption schema based on fractional order chaotic systems | |
Parenreng et al. | The E-mail security system using El-Gamal hybrid algorithm and AES (advanced encryption standard) algorithm | |
Anand et al. | Real-time symmetric cryptography using quaternion julia set | |
Chahar et al. | Design of a new Security Protocol | |
Yin et al. | A symmetric key exchange protocol bsaed on virtual S-box | |
CN111130786A (en) | Multi-party cooperative SM2 key generation and ciphertext decryption method and medium | |
Wei et al. | Homomorphic Encryption Based Privacy Protection Techniques for Cloud Computing | |
Mukhopadhyay | Cryptography: Advanced encryption standard (aes) | |
Hraiz et al. | Symmetric encryption algorithm using graph representation | |
Al-Saleh et al. | Double-A--A Salsa20 Like: The Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220402 Address after: 210000 room 1212, hatch Eagle building, No. 99, Tuanjie Road, yanchuang Park, Jiangbei new area, Nanjing, Jiangsu Province Patentee after: NANJING QUMENGLIAN INFORMATION TECHNOLOGY Co.,Ltd. Patentee after: Suzhou mengchain Digital Technology Co.,Ltd. Address before: 210000 room 1212, hatch Eagle building, No. 99, Tuanjie Road, yanchuang Park, Jiangbei new area, Nanjing, Jiangsu Province Patentee before: NANJING QUMENGLIAN INFORMATION TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220915 Address after: Room 1301, 13th Floor, Xiangrong Building, No. 55, Nantiancheng Road, High-speed Rail New Town, Xiangcheng District, Suzhou City, Jiangsu Province 215100 Patentee after: Suzhou mengchain Digital Technology Co.,Ltd. Address before: 210000 room 1212, hatch Eagle building, No. 99, Tuanjie Road, yanchuang Park, Jiangbei new area, Nanjing, Jiangsu Province Patentee before: NANJING QUMENGLIAN INFORMATION TECHNOLOGY Co.,Ltd. Patentee before: Suzhou mengchain Digital Technology Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
CP03 | Change of name, title or address |
Address after: Room 603, 6th Floor, Block A, Building 10, Launching Area of Yangtze River Delta International R&D Community, No. 286 Qinglonggang Road, High Speed Rail New City, Xiangcheng District, Suzhou City, Jiangsu Province, 215100 Patentee after: Suzhou Shumai Technology Co.,Ltd. Country or region after: China Address before: Room 1301, 13th Floor, Xiangrong Building, No. 55, Nantiancheng Road, High-speed Rail New Town, Xiangcheng District, Suzhou City, Jiangsu Province 215100 Patentee before: Suzhou mengchain Digital Technology Co.,Ltd. Country or region before: China |
|
CP03 | Change of name, title or address |