Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Asymmetric FHE (Fully Homomorphic Encryption) method and secret key substitution and cipher text delivery methods thereof

A homomorphic encryption, asymmetric technology, applied in the field of information security, to achieve the effect of improving computing speed, eliminating security risks, and wide application

Active Publication Date: 2017-09-19
上海麟羿信息科技有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this technology is a symmetric encryption method, which is often subject to various constraints in practical applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric FHE (Fully Homomorphic Encryption) method and secret key substitution and cipher text delivery methods thereof
  • Asymmetric FHE (Fully Homomorphic Encryption) method and secret key substitution and cipher text delivery methods thereof
  • Asymmetric FHE (Fully Homomorphic Encryption) method and secret key substitution and cipher text delivery methods thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Because the ciphertext obtained by the fully homomorphic encryption method is operable, the ciphertext encrypted with the same key can be operated by relying on the operation support function, but the ciphertext encrypted with different keys cannot. Therefore, we call the space formed by all ciphertexts generated using the same key as the key space corresponding to this key. Only two ciphertexts in the same key space can be operated, while ciphertexts in different key spaces Ciphertext cannot be manipulated.

[0042] The asymmetric fully homomorphic encryption system involved in this embodiment is implemented in the following ways:

[0043] i) System initialization, setting with C K,1 ={A 1 ,X 1 ,B 1} as the unit ciphertext corresponding to the private key K, where: f(x i )>0 and f() is differentiable, K={f(),Y}, A 1 ={a 1i |i∈I} is a real vector, X 1 ={x 1i |i∈I} is a real vector, Y={y i |i∈I} is a real number vector; I is a polynomial key dimension subscri...

Embodiment 2

[0056] This embodiment is based on the asymmetric encryption system in Embodiment 1, and further realizes the ciphertext delivery in the following ways:

[0057] Step 1) System initialization, that is, the sender generates a private key K for sending A ={f A (), Y A}, the receiving end generates the receiving private key K B ={f B (), Y B}, the sender generates the ciphertext C to be sent A ={A A ,X A ,B A}, the server randomly generates a temporary key K 1 ={f 1 (), Y 1} and delivered to the sender and receiver respectively;

[0058] Step 2) The receiving end randomly generates a temporary receiving key K 2 ={f 2 (), Y 2} and key delivery function f T (), and generate delivery support functions at the receiving end and key receiving permutation function where: h temp1 (x,x')≠x≠x'; then the receiving end will deliver the key function f T () Delivery to the sender, delivery support function G to the receiver T and key receiving permutation function G 2→B ...

Embodiment 3

[0074] In some cases, the two parties to the ciphertext delivery can reach mutual trust. At this time, you can also choose a simplified ciphertext delivery operation. This operation does not require the participation of the server side, and can be completed only by the sending and receiving parties. The whole process is as follows:

[0075] Step 1) The receiving end randomly generates a temporary receiving private key K 1 ={f 1 (), Y 1}, key delivery function f T () and key receiving permutation function G 1→B , and will temporarily receive the private key K 1 and the key delivery function f T () delivered to the sender;

[0076] The receiving end preferably will temporarily receive the private key K after completing the transmission 1 destroy;

[0077] Step 2) The sender randomly generates a temporary private key K for sending 2 ={f 2 (), Y 2} and key sending permutation function G A→2 , and will send the ciphertext C A Convert to intermediate ciphertext C 2 ;Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an asymmetric FHE method and secret key substitution and cipher text delivery methods thereof. A private key and a public key are generated randomly, and the secret key is used to generate an operation support function, a unit cipher text of secret key encryption and a public key encryption operation support function; a plaintext is encrypted to generate a cipher text, namely, the secret key is used for encryption directly to obtain a direct cipher text, or the public key corresponding to the secret key is used to carry out encryption operation to obtain a compatible cipher text in the same secret key space; and when the cipher text needs to be delivered to the receiving end safely, the sending, receiving and server ends or the sending and receiving ends complete delivery of the cipher text. Operation of the cipher text is carried out directly without leakage of the plaintext, a safe data storage and operation environment is provided, the computing speed is improved substantially compared with the prior art, the required cipher text volume and expansion speed are lower, the methods can be realized in different manners, and a data owner can use different cloud computing services needless of worrying about leakage of sensitive and secrete data.

Description

technical field [0001] The present invention relates to a technology in the field of information security, in particular to an asymmetric fully homomorphic encryption and its key replacement and ciphertext delivery methods. Background technique [0002] The existing fully homomorphic encryption method introduces random noise for encryption, and introduces a data cleaning operation after each homomorphic operation, so that the size of the noise is always kept within the range that does not affect the calculation result. However, because the algorithm is very complex, the calculation process is complicated, and each bit of the plaintext is encrypted, resulting in a huge amount of overall calculation, and at the same time, the storage space required for the ciphertext is also quite large, so it is difficult to apply it in practice. serving. [0003] Chinese patent application number CN201510192143.1 describes a polynomial fully homomorphic encryption method and system based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06
CPCH04L9/008H04L9/0825H04L9/083H04L9/085H04L63/0442H04L63/06
Inventor 郑珂威
Owner 上海麟羿信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products