期刊文献+

基于RLWE的全同态加密方案 被引量:16

Fully homomorphic encryption scheme from RLWE
下载PDF
导出
摘要 基于Kristin Lauter等人的somewhat同态方案,提出"带密钥转换的重线性化技术"。结合该技术与"模转换",设计了一个基于RLWE的非自举的层次化全同态加密方案。该方案的同态操作简单,而且给出的平凡门操作使得电路层结构更清晰。最后利用自举技术作为优化提升了方案的同态运算能力。 Based on the somewhat homomorphic scheme of Kristin Lauter et al. a new technique, called Relinearization with key switching was presented. Combining this technique with modulus switching, a (leveled) fully homomorphic en- cryption scheme without bootstrapping from RLWE were designed. Homomorphic operations of this scheme is simple, and trivial gate operation given in the scheme can make level structure of circuit clearer. Finally, bootstrapping was used as optimization to evaluate capability of the proposed scheme.
出处 《通信学报》 EI CSCD 北大核心 2014年第1期173-182,共10页 Journal on Communications
基金 国家自然科学基金资助项目(61206437)~~
关键词 全同态加密 重线性化 模转换 fully homomorphic encryption relinearization modulus switching
  • 相关文献

参考文献19

  • 1RIVEST R L,ADLEMAN L,DERTOUZOS M L. On data banks and privacy homomorphisms[A].1978.169-180. 被引量:1
  • 2PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[A].{H}Springer,1999.223-238. 被引量:1
  • 3RIVEST R L,SHAMIR A,ADLEMAN L. A method for obtaining digital signatures public key cryptosystem[J].{H}Communications of the ACM,1978,(01):120-126. 被引量:1
  • 4BONEH D,GOH E J,NISSIM K. Evaluating 2-DNF formulas on ciphertexts[A].2005.325-342. 被引量:1
  • 5GENTRY C. Fully homomorphic encryption using ideal lattices[A].2009.169-178. 被引量:1
  • 6GENTRY C. A Fully Homomorphic Encryption Scheme[D].Stand-ford:Stanford University,2009. 被引量:1
  • 7DIJK M,GENTRY C,HALEVI S. Fully homomorphic encryp-tionover the integers[A].2010.24-43. 被引量:1
  • 8SMART N,VERCAUTEREN F. Ful y homomorphic encryption with relatively smal key and ciphertext sizes[A].2010.420-443. 被引量:1
  • 9GENTRY C,HALEVI S. Implementing gentry’s fully-homomorphic encryption scheme[A].2011.129-148. 被引量:1
  • 10GENTRY C,HALEVI S. Fully homomorphic encryption without squashing using depth-3 arithmetic circuits[EB/OL].http:/eprint.iacr.org/2011/279,2011. 被引量:1

同被引文献105

  • 1曹珍富,薛庆水.密码学的发展方向与最新进展[J].计算机教育,2005(1):19-21. 被引量:17
  • 2王成儒,张涛.一种快速图像纹理分析算法[J].光电工程,2005,32(1):74-76. 被引量:9
  • 3向广利,陈莘萌,马捷,张俊红.实数范围上的同态加密机制[J].计算机工程与应用,2005,41(20):12-14. 被引量:18
  • 4Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Compu- tation, 1978, 4(11): 169-180. 被引量:1
  • 5Paillier P. Public-Key cryptosystems based on composite degree residuosity classes [C] // EUROCRYPT 1999. Berlin, Heidelberg: Springer-Verlag, 1999: 223-238. 被引量:1
  • 6Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures public key cryptosystem[J]. Communica- tion of ACM, 1978, 21(1):120-126. 被引量:1
  • 7Boneh D, Goh E J, Nissim K. Evaluating 2-DNF formulas on ciphertexts[J]. Theory of Cryptography, 2005,6(8): 325-341. 被引量:1
  • 8Gentry C. Fully homomorphic encryption using ideal lattices [C] //Proceedings of the 41st annual ACM Symposium on Symposium on Theory of Computing-STOC\'09. New York: ACM Press, 2009: 169-169. 被引量:1
  • 9Gentry C. A Fully Homomorphic Encryption Scheme[D]. Standford: Stanford University, 2009. 被引量:1
  • 10Van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers [C] // Advances in Cryptol- ogvEUROCRYPT 2010. Berlin, Heidelberg: Springer- Verlag, 2010: 24-43. 被引量:1

引证文献16

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部