Multiple to One Fully Homomorphic Encryption Scheme over the Integers

被引:1
|
作者
Wang Caifen [1 ]
Cheng Yudan [1 ]
Liu Chao [1 ]
Zhao Bing [1 ]
Xu Qinbai [1 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
Fully homomorphic encryption; Multiple to one; Greatest Common Divisor (GCD) problem; Data expansion;
D O I
10.11999/JEIT171194
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fully homomorphic encryption allows any operation evaluation on encrypted data without decryption. The existing integer-based homomorphic encryption schemes are designed only for two participants namely one party encryption one party decryption (one-to-one), whose computational efficiency is generally low, plaintext space is small, so it can not be applied to big data, cloud computing and other actual scene. Therefore, a full homomorphic encryption scheme with multi-party encryption, one party decryption (multiple to one) is presented. The scheme simplifies the key generation process on the basis of guaranteeing the security, but also gives the range of the number of encrypted parties that can be decrypted accurately in the process of homomorphic operation. Meanwhile, in the random oracle model, the security of the new scheme is proved based on approximate Greatest Common Divisor (GCD) problem. Numerical analysis demonstrates that the presented scheme can not only extend the data traffic, but also improve the efficiency by comparing with the existing schemes. Simulation results show that proposed scheme is more practical in the range of integer, and meets the requirements of the users to the system response. Finally, the plaintext space is expanded to 3 bit, comparing and analysing the experiment with the scheme of 1 bit.
引用
收藏
页码:2119 / 2126
页数:8
相关论文
共 14 条
  • [1] On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes
    Chenal, Massimo
    Tang, Qiang
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 239 - 258
  • [2] Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
  • [3] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [4] 近似理想格上的全同态加密方案
    古春生
    [J]. 软件学报, 2015, 26 (10) : 2696 - 2719
  • [5] Gu chunsheng, 2013, Computer Engineering and Applications, V49, P101, DOI 10.3778/j.issn.1002-8331.1201.0401
  • [6] [光焱 Guang Yan], 2013, [电子与信息学报, Journal of Electronics & Information Technology], V35, P988
  • [7] Hu RY, 2016, ACSR ADV COMPUT, V47, P349
  • [8] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
  • [9] Smart NP, 2010, LECT NOTES COMPUT SC, V6056, P420
  • [10] Stehle D, 2010, LECT NOTES COMPUT SC, V6477, P377, DOI 10.1007/978-3-642-17373-8_22