首页 | 本学科首页   官方微博 | 高级检索  
     

基于中国剩余定理的公钥加密方案同态性
引用本文:王会勇,孙爽,冯勇.基于中国剩余定理的公钥加密方案同态性[J].计算机应用,2015,35(6):1668-1672.
作者姓名:王会勇  孙爽  冯勇
作者单位:1. 中国科学院 成都计算机应用研究所, 成都 610041; 2. 桂林电子科技大学 数学与计算科学学院, 广西 桂林 541004; 3. 中国科学院 重庆绿色智能技术研究院, 重庆 400714
基金项目:国家973计划项目,国家自然科学基金资助项目,广西壮族自治区自然科学基金资助项目
摘    要:针对现有(全)同态加密方案的整体性能不能达到实用要求的问题,为获得新的性能更好的同态加密思路,对基于中国剩余定理(CRT)的快速公钥加密方案的同态性进行了研究。考察了基于原方案构造加法和乘法同态操作的可能性,指出基于原方案不适于构造加法同态操作和乘法同态操作,并分析了原方案在安全性和效率方面存在的几个问题。提出了一个改进方案,分析了算法的安全性,尤其是对抗格基规约攻击的性能。研究了基于改进方案构造同态操作的可行性,并对原方案和改进方案的主要性能作了对比。最后对同态性构建过程中的经验进行了总结,提出了构建理想(全)同态加密方案的思路。

关 键 词:同态加密  中国剩余定理  同态性  格基规约攻击  LLL算法  
收稿时间:2014-12-31
修稿时间:2015-04-15

Homomorphism of a public key encryption scheme based on the chinese residue theorem
WANG Huiyong,SUN Shuang,FENG Yong.Homomorphism of a public key encryption scheme based on the chinese residue theorem[J].journal of Computer Applications,2015,35(6):1668-1672.
Authors:WANG Huiyong  SUN Shuang  FENG Yong
Affiliation:1. Chengdu Institute of Computer Application, Chinese Academy of Sciences, Chengdu Sichuan 610041, China;
2. School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin Guangxi 541004, China;
3. Chongqing Institute of Green Intelligent Technology, Chinese Academy of Sciences, Chongqing 400714, China
Abstract:The existing (fully) homomorphic encryption schemes fail to meet practical needs for poor efficiency. To explore new resolution for better homomorphic encryption schemes, the possibility to construct homomorphism on a public key encryption scheme in literature based on Chinese Residue Theorem (CRT) was studied. The possibility of the original scheme to construct the addition and multiplication homomorphic operations was investigated. The original scheme was proved to be unsuitable for constructing homomorphic addition and multiplication operations. Several problems concerning security and efficiency existing in the original scheme were analyzed. Then a revised scheme with tougher security under proper configurations was given, as well as its correctness verification. After that, analysis on security and computing complexity of the revised scheme was given, emphasizing on its ability against the lattice reduction attack. Afterwards, the feasibility of building homomorphic operations on the revised scheme was studied and the main performance comparison between the original and the revised schemes was constructed. Finally, experience on building homomorphism was summarized and some advice on constructing an ideal (fully) homomorphic encryption scheme was presented.
Keywords:Homomorphic Encryption (HE)  Chinese Residue Theorem CRT)  homomorphism  lattice-based reduction attack  Lenstra-Lenstra-Lovasz (LLL) algorithm
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号