期刊文献+

几种重要FHE加密结构的深入研究与分析

Research and Analysis of Several Key FHE Structures
下载PDF
导出
摘要 对当前几种重要的全同态加密结构的构造原理及性质进行了深入剖析,重点对FHE加解密算法、算法基于的难题假设、算法复杂度、密钥特征、密文扩展性等特点进行了深入分析与详细比较,并针对结构中的不足之处提出了改进与优化建议,为进一步对FHE结构优化提供借鉴。最后对全同态加密的应用前景进行了全面展望。 In-depth study on principles and properties of the current most important FHE ( Fully Homomor- phic Encryption) structures is done, with focus on analysis and comparison of FHE encryption and decryp- tion, algorithm based on hard problem, algorithm complexity, key characteristics and eiphertext expansion. In light of the deficiencies, some modified and optimized solutions are presented, and these could serve as a reference for further optimization of FHE structure. Finally, application prospects of FHE are forecasted.
作者 马飞 李娟
出处 《通信技术》 2016年第4期481-485,共5页 Communications Technology
基金 宁夏回族自治区‘计算机应用技术’重点学科项目资助 宁夏教育厅"十三五"自治区重点专业--网络工程专业重点建设项目资助~~
关键词 全同态加密 结构比较 云计算 LWE/RLWE FHE structure comparison cloud computing LWE/RLWE
  • 相关文献

参考文献13

  • 1Ronald L. Rivest, Leonard M. Adleman, Dertouzos M L.On Data Banks and Privacy Homomorphisms [ J ]. Founda-tions of Secure Computation, 1978,4( 11) :169-180. 被引量:1
  • 2Ronald L. Rivest, Adi Shamir, Leonard M. Adleman. AMethod for Obtaining Digital Signatures and Public - KeyCryptosystems [ J ]. Communications of the ACM, 1978,21(2) : 120-126. 被引量:1
  • 3Taher ElGamal. A Public Key Cryptosystem and A Signa-ture Scheme based on Discrete Logarithms [ C ] //Ad-vances in Cryptology. Springer Berlin Heidelberg,1984:10-18. 被引量:1
  • 4白永祥.一种高效群签名方案的设计与分析[J].通信技术,2015,48(2):214-218. 被引量:5
  • 5Pascal Paillier. Public-Key Cryptosystems based on Com-posite Degree Residuosity Classes [ C ]// Advances incryptology—EUROCRYPT ’ 99. Springer Berlin Heidel-berg, 1999: 223-238. 被引量:1
  • 6Dan Boneh, Eu-Jin Goh, Kobbi Nissim. Evaluating 2-DNF Formulas on CipherTexts [ M ] //Theory of Cryptogra-phy. Springer Berlin Heidelberg,2005 :325-341. 被引量:1
  • 7Oded Regev. On Lattices, Learning with Errors, RandomLinear Codes, and Cryptography [ J ] . Journal of the ACM(JACM) ,2009,56(6) :34. 被引量:1
  • 8Zvika Brakerski,Vinod Vaikuntanathan. Fully Homomor-phic Encryption from Ring-LWE and Security for Key De-pendent Messages [ M ] // Advances in Cryptology - CRYP-TO 2011. Springer Berlin Heidelberg,2011 *,505-52A. 被引量:1
  • 9Craig Gentry. Fully Homomorphic Encryption using IdealLattices[ C ] //STOC ( Proceedings of the Forty-first An-nual ACM Symposium on Theory of Computing),NewYork. 2009, 9: 169-178. 被引量:1
  • 10Zvika Brakerski, Vinod Vaikuntanathan. Efficient FullyHomomorphic Encryption from ( Standard ) LWE [ J ].SIAM Journal on Computing,2014,43(2) : 831-871. 被引量:1

二级参考文献6

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部