期刊文献+

支持同态算术运算的数据加密方案算法研究 被引量:15

Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
下载PDF
导出
摘要 针对在计算服务中,对用户信息加密以保护隐私时,无法对密文进行计算的问题,提出一种高效的支持密文四则算术运算的同态加密方案CESIL,包括密钥生成、加密、解密及密文运算4个算法。该方案首先借助多项式环重新定义向量的加法和乘法运算,构建多项式系数向量环;然后利用理想格在向量环上划分剩余类,建立商环及其代表元集合;最后,将整数明文映射为代表元,并用代表元所在剩余类的其他元素替换该代表元,以对明文进行加密。商环的运算特性保证CESIL方案支持对密文的加法和乘法运算。在实现CESIL方案时,利用快速傅里叶变换(FFT)算法进一步提高运算效率、减少密钥长度。理论分析及实验结果表明,CESIL是语义安全的,且相比已有的一些同态加密方案,CESIL支持更多的运算类型,拥有较高的运行效率和较小的密钥及密文长度,能更好地满足实际应用需求。 An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services. CESIL included key generation algorithm, encryption algorithm, decryption algorithm and calculation algorithm. In CESIL, a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice, the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class. The features of operations in quotient ring ensured CESIL operate on encrypted data. Furthermore, the fast Fourier transform(FFT) algorithm was used to increase the efficiency and decrease the length of key. Theoretical analysis and experimental results show that CESIL is semantically secure, and can do addition and multiplication operations on encrypted data homomorphically in a specific scope. Comparing to some existing homomorphic encryption schemes, the CESIL runs efficiently, and has shorter length in key and ciphertext. Thus, the CESIL fits the practical applications better.
出处 《通信学报》 EI CSCD 北大核心 2015年第1期167-178,共12页 Journal on Communications
基金 国家科技重大专项基金资助项目(2012ZX03002001) 高等学校博士学科点专项科研基金资助项目(20120201110013) 陕西省科技攻关基金资助项目(2012K06-30) 国家自然科学基金资助项目(61172090 61472316) 陕西省科技统筹创新工程基金资助项目(2013SZS16-Z01/P01/K01)~~
关键词 同态加密 隐私保护 理想格 代表元 计算服务 homomorphic encryption privacy-preserving ideal lattice representative computing service
  • 相关文献

参考文献20

  • 1RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[A]. DeMillo RA Foundations of Secure Computation[C]. NY, USA: Academic Press, 1978.169-180. 被引量:1
  • 2PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[A]. Proc of the Advances in Cryptology (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238. 被引量:1
  • 3GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299. 被引量:1
  • 4RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications oft.he ACM, 1978, 2l(2): 120-126. 被引量:1
  • 5ELGAMAL T. A public-key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472. 被引量:1
  • 6BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[A]. Second Theory of Cryptography Conference (TTC 2005)[C]. Cambridge, MA, USA, 2005.325-341. 被引量:1
  • 7GENTRY C. A Fully Homomorphic Encryption Scheme[D]. Califor- nia, USA: Stanford University, 2009. 被引量:1
  • 8GENTRY C. Fully homomorphic encryption using ideal lattices[A]. Proc of the 41st ACM Symposium on Theory of Computing(STOC' 09)[C]. Bethesda, Maryland, USA, 2009.169-178. 被引量:1
  • 9SMART P N, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[A]. Proc of the Public Key Cryptography (PKC 2010)[C]. Paris, France, 2010.420-443. 被引量:1
  • 10DIJK V M, GENTRY C, HALEVI S, et al. Fully homomorphic en- cryption over the integers[A]. Proc of the Advances in Cryptology (EUROCRYPT 2010)[C]. Riviera, France, 2010.24-43. 被引量:1

二级参考文献18

  • 1Huang R W, Gui X L, Yu S, Zhuang W. Study of privacypreserving framework for cloud storage. Computer Science and Information Systems, 2011, 8(3):801-819. 被引量:1
  • 2Liu Q, Wang G J, Wu J. An efficient privacy preserving keyword search scheme in cloud computing//Proceedings of the 12th IEEE International Conference on Computational Science and Engineering (CSE' 09). Vancouver, Canada, 2009:715-720. 被引量:1
  • 3Bonech D, Crescenzo G D, Ostrovsky R, Persiano G. Public-key eneryption with keyword search//Proceedings oI the Eurocrypt 2004. Interlaken, Switzerland, 2004: 506-522. 被引量:1
  • 4Song D X, Wagner P, Perrig P. Practical techniques for searches on encrypted data//Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2000:44-55. 被引量:1
  • 5Wang W C, Li Z W, Owens R, Bhargava B. Secure and efficient access to outsourced data//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago, Illinois, USA, 2009:55-66. 被引量:1
  • 6Bellovin S M, Cheswick W R. Privacy-enhanced searches using encrypted bloom filters. Technical Report 2004/022, IACR ePrint Cryptography Archive, 2004. 被引量:1
  • 7Ohtaki Y. Partial disclosure of searchable encrypted data with support for boolean queries//Proeeedings of the 3th International Conference on Availability, Reliability and Seeurity(ARES'2008). Barcelona, Spain, 2008: 1083-1090. 被引量:1
  • 8Li J, Wang Q, Wang C et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th Conference on Computer Communications (INFOCOM 2010). San Diego, California, USA, 20101 1-5. 被引量:1
  • 9Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data//Proceedings of the 30th International Conference on Distributed Computing Systems(ICDCS'2010). Genoa, Italy, 2010: 253-262. 被引量:1
  • 10Boldyreva A, Chenette N, Lee Y, O'Neill A. Order preserving symmetric encryption//Proceedings of the 28th Annual International Conference on Advances in Cryptology (Euro crypt 2009). Cologne, Germany, 2009:224-241. 被引量:1

共引文献60

同被引文献132

  • 1R.L.Rivest, L.Adleman, M.l,.Dertouzos,On data banks and privacy homomorphisms [J].Foundatkms of Security Com- putation,Academic Press. 1978,41 : 169-180. 被引量:1
  • 2Gentry Craig. Fully Homomorphic Encryption Using Ideal 1,attices [C]//Proc of the 41st Annual ACM Symposium on Theory of Computing. New York: ACM Press. 2009 : 169-178. 被引量:1
  • 3C. Jean Sebastien, A. Mandal, D. Nacache. Fully homo morphic encryption over the inlegers with shorter public kwys [C]//Proc of the 31st Annual Conference on Advances in CRYPTOLOGY. Berlin: Springer- Verlag,2011:487-504. 被引量:1
  • 4D. Stehle, R. Steinfeld. Fast fully homomorphic encryption [C]//Proc of ASICRYPT.2010 : 377-394. 被引量:1
  • 5Z.Brakerski.Fully homomorphic encryption without modulus switching from classical GapSVP [C]//Advances in Cryp tology CRYPTO. Berlin : Springer, 2012 : 868-886. 被引量:1
  • 6N. P. Smart. F. Vercauteren. Fully homomorphic SIMI) operations [C]//Designs. Codes and Cryptography. [S.l.] :Springer,2012 : 1-25. 被引量:1
  • 7C. Gentey, S. Halevi. Implementing Gentry ' s fully-homo- morphic encryption scheme [C]// Proc of the 30th Annual International Conference on Theory and Applica- tions Cryptographic Techniques: Advances in Cryptology. Berlin: Springer-Verlag,2011 : 129-148. 被引量:1
  • 8Van D M, Gentry C, Halevi S. Fully homomorphic en- cryption over the integers [C]//Proc of Advances in cryptology- EUROCRYPT 2010. Berlin: Springer, 2010: 24-43. 被引量:1
  • 9Gentry G. Computing arbitrary functions of encrypted data [J]. Communications of The ACM, 2010,53 (3): 97-105. 被引量:1
  • 10Z. Brakerski, V. Vaikuntanathan. Efficient fully homo- morphic encryption from (standard) LWE [C]//Proc of the 52nd IEEE Annual Symposium on Foundations of Computer Science.2011:97-106. 被引量:1

引证文献15

二级引证文献147

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部