期刊文献+

基于整数的全同态加密体制的研究 被引量:4

Research on Integer-based Fully Homomorphic Encryption System
下载PDF
导出
摘要 DGHV体制是在对Gentry的基于理想格的全同态加密体制进行简化的基础上提出的,但该体制仅能对单比特的明文的加解密,并且效率不够高。2013年,Jean-Sebastien等人对DGHV体制进行了改进,完成了对明文序列的加解密。本文以改进的DGHV算法为基础,分析了改进DGHV算法的思路和方法,并对相应的压缩算法和自举算法进行了分析,给出了正确性证明和安全性证明,最后指出了改进的DGHV算法的主要优势。 In this paper, a Gentry's fully homomorphic encryption based on ideal lattice was simplified and a new scheme named DGHV was put forward. The DGHV scheme has low efficiency because it can only decrypt a single bit at one time. The DGHV scheme was improved by Jean - Sebastian and his partners and an improved DGHV scheme is proposed in 2013. Starting from the idea and method of the improved DGHV, we mainly analyze the squashed scheme and the bootstrap scheme and provide the proof of security and correctness; we also indicate the advantage of the improved scheme.
作者 张爽 杨亚涛
出处 《北京电子科技学院学报》 2013年第2期29-34,共6页 Journal of Beijing Electronic Science And Technology Institute
基金 国家自然科学基金:后量子数字签名算法研究与设计(NO.61070219)
关键词 全同态 DGHV somewhat同态 压缩 自举 无误差近似最大公因子问题 Fully Homomorphic DGHV Somewhat Approximate GCD Problem Homomorphic Squashing Bootstraping Error - free
  • 相关文献

参考文献8

  • 1Rivest R L, Adleman L and Dertouzos M L. On data banks and privacy homomorphisms [ Z ]. Foundations of Secure Computation, 1978. 被引量:1
  • 2Gentry C. Fully homomorphic encryption using i- deal lattices [ C ]. STOC' 09, 2009 : 169 - 178. 被引量:1
  • 3Gentry C. A fully homomorphic encryption scheme [D/OL]. Stanford University, 2009. http:// crypto, stanford, edu/craig. 被引量:1
  • 4van Dijk M, Gentry C, Halevi S, et al. Fully ho- momorphic encryption over the integers [ C ]. Vol- ume 6110 of LNCS: Proc of Eurocrypt, 2010:24 -43. 被引量:1
  • 5Coron J, Lepoint T and Tibouchi M. Batch Fully Homomorphic Encryption over the Integers [ C ]. Advances in Cryptology. Eurocrypt 2011. Volume 6632 of LNCS, springer, 2011:129 - 148. 被引量:1
  • 6Smart N P, Vercauteren F. Fully homomorphic en- cryption with relatively small key and ciphertext sizes [ C ]//Volume 6056 of LNCS : Public Key Cryptography - PKC' 10, Springer, 2010. 被引量:1
  • 7GENTRY Craig, HALEVI Shai. Implementing Gentryg Fully -homomorphic Encryption Scheme [ C ]. EUROCRYFF. [ s. 1. ]: Springer, 2011: 129 - 148. 被引量:1
  • 8Stehle D and Steinfeld D. Faster Fully Homomor-phic Encryption[ C ]. Cryptology ePrint Archive: Report 2010/299 : http ://eprint. iacr. org/ 2010/299. 被引量:1

同被引文献43

  • 1Rivest R L, Adleman L, Detrouzos M L. On data banks and privacy homomorphism [ C ]//Proc of foundations of secure computation. New York : Academic Press, 1978 : 169-179. 被引量:1
  • 2Gentry C. A fully homomorphic encryption scheme [ D ]. Stan- ford : Stanford University ,2009. 被引量:1
  • 3van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic en- cryption over the integers [ C ]//Proceedings of EUROCRYPT 2010. Riviera, French : [ s. n. ] ,2010:24-43. 被引量:1
  • 4Smart N P, Vercauteren F. Fully homomorphic encryption with relatively small key and ciphertext sizes[ C ]//Proc of the 13th international conference on practice and theory in public key cryptography. Berlin : Springer-Verlag,2010:420-443. 被引量:1
  • 5Jean- Sebastien C, Mandal A, Nacache D, et al. Fully homo- morphic encryption over the integers with shorter public-keys [ C]//Proc of the 31st annual conference on advances in CR- YP-TOLOGY. Berlin: Springer-Verlag,2011:487-504. 被引量:1
  • 6Coron J S, Lepoint T, Tibouchi M. Batch fully homomorphic encryption over the integers[ R]. [ s. 1. ] : [ s. n. ] ,2013. 被引量:1
  • 7Li Jian, Song Danjie, Chen Sicong, et al. A simple fully homo- morphic encryption scheme available in cloud computing [ C ]//Proceedings of 2012 IEEE 2nd international conference on cloud computing and intelligence systems. Hangzhou: IEEE .2012:214-217. 被引量:1
  • 8宋丹劫.基于同态加密的云存储系统设计与实现[D].北京:北京邮电大学,2013. 被引量:1
  • 9Nguyen P Q, Stem J. Adapting density attacks to low weight knapsacks [ C ]//Proc of Asiacrypt ' 05. Heidelberg: Springer- Verlag,2005:41-58. 被引量:1
  • 10R.L.Rivest, L.Adleman, M.l,.Dertouzos,On data banks and privacy homomorphisms [J].Foundatkms of Security Com- putation,Academic Press. 1978,41 : 169-180. 被引量:1

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部