Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A fully homomorphic key distribution method for leveled

A key distribution, fully homomorphic technology, applied in homomorphic encrypted communication and key distribution, which can solve problems such as retrieval difficulties and key management burdens

Active Publication Date: 2020-05-22
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problems existing in the existing technology are: for the data shared by multiple users, each user still needs to hold a different retrieval key when retrieving, which brings the burden of key management; In state-of-the-art ciphertext retrieval technology, ciphertext operations need to correspond to the same public key, and multiple keys make retrieval very difficult.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fully homomorphic key distribution method for leveled
  • A fully homomorphic key distribution method for leveled
  • A fully homomorphic key distribution method for leveled

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0098] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0099] Such as figure 1 As shown, the method for Leveled fully homomorphic key distribution provided by the embodiment of the present invention includes the following steps:

[0100] S101: The key generation center KGC calculates signature public and private keys for group members and discloses system parameters;

[0101] S102: The key generation center KGC distributes the signature key to the group members;

[0102] S103: The group members negotiate the group shared key;

[0103] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of data sharing, and discloses a full-homomorphic secret key distribution method for Leveled. The method comprises the steps that a KGC (key generating center) calculates signature public and private keys for group members, and discloses the system parameters; the KGC distributes the signature keys to the group members, and the group members carry out the negotiation of the group sharing of secret keys; a central node employs the shared secret keys for the sharing of the homomorphic secret key parameters; each group member employs the homomorphic secret key parameters for calculation, thereby completing the distribution of the homomorphic secret keys. The method achieves the sharing of the homomorphic secret keys among the group users, and the users outside the group cannot obtain the secret key. The method can be used for the searching of the privacy data shared by the group users.

Description

technical field [0001] The invention belongs to the technical field of data sharing, and in particular relates to a Leveled fully homomorphic key distribution method. Background technique [0002] User privacy data retrieval means that users store their private data on untrusted third-party servers, such as cloud servers. In order to complete the data retrieval without disclosing the private data, it is not only necessary to encrypt the data, but also to perform certain processing on the encrypted data. The homomorphic encryption algorithm just meets this requirement. If multiple users participate in the shared data retrieval work, the premise of using the homomorphic encryption algorithm is that the sharing of homomorphic keys among multiple users must be realized. In group user sharing private data retrieval, the existing scheme is only for a single retrieval user, each user has its own unique key system, without any interference between each other, for private data share...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/008H04L9/0825
Inventor 高军涛王丹妮王笠燕王誉晓李雪莲
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products