首页 | 本学科首页   官方微博 | 高级检索  
     

基于NTRU的多密钥同态代理重加密方案及其应用
引用本文:李瑞琪,贾春福,王雅飞. 基于NTRU的多密钥同态代理重加密方案及其应用[J]. 通信学报, 2021, 0(3): 11-22
作者姓名:李瑞琪  贾春福  王雅飞
作者单位:南开大学网络空间安全学院;天津市网络与数据安全技术重点实验室
基金项目:国家重点研发计划基金资助项目(No.2018YFA0704703);国家自然科学基金资助项目(No.61972215,No.61702399,No.61972073);天津市自然科学基金资助项目(No.20JCZDJC00640)。
摘    要:为了提高同态加密算法在多用户云计算场景下的实用性,构造了一个基于NTRU的多密钥同态代理重加密方案.首先利用密文扩张思想提出了一种新的NTRU型多密钥同态密文形式,并基于此设计了相应的同态运算和重线性化过程,从而形成一个支持分布式解密的NTRU型多密钥同态加密方案;然后借助于密钥交换思想设计了重加密密钥和重加密过程,将...

关 键 词:同态加密  代理重加密  多密钥  云计算  联邦学习

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
LI Ruiqi,JIA Chunfu,WANG Yafei. Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application[J]. Journal on Communications, 2021, 0(3): 11-22
Authors:LI Ruiqi  JIA Chunfu  WANG Yafei
Affiliation:(College of Cyber Science,Nankai University,Tianjin 300350,China;Tianjin Key Laboratory of Network and Data Security Technology,Tianjin 300350,China)
Abstract:To improve the practicability of homomorphic encryption in the application of multi-user cloud computing,a NTRU-based multi-key homomorphic proxy re-encryption(MKH-PRE)scheme was constructed.Firstly,a new form of NTRU-based multi-key ciphertext was proposed based on the idea of ciphertext extension,and the corresponding homomorphic operations and relinearization procedure were designed on the basis of this new ciphertext form,so that a NTRU-based multi-key homomorphic encryption(MKHE)scheme which supported distributed decryption was constructed.Then,resorting to the idea of key switching,the re-encryption key and re-encryption procedure were put forward such that the functionality of proxy re-encryption(PRE)was integrated to this new NTRU-based MKHE scheme.The MKH-PRE scheme preserved the properties of MKHE and PRE,and had a better performance on the client side.The scheme was applied to the privacy-preserving problems in federated learning and an experiment of the application was carried out.The results demonstrate that the accuracy of learning is scarcely affected by the encryption procedure and the computational overhead of this MKH-PRE scheme is acceptable.
Keywords:homomorphic encryption  proxy re-encryption  multi-key  cloud computing  federated learning
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号