Advanced Search
Volume 40 Issue 9
Aug.  2018
Turn off MathJax
Article Contents
Caifen WANG, Yudan CHENG, Chao LIU, Bing ZHAO, Qinbai XU. Multiple to One Fully Homomorphic Encryption Scheme over the Integers[J]. Journal of Electronics & Information Technology, 2018, 40(9): 2119-2126. doi: 10.11999/JEIT171194
Citation: Caifen WANG, Yudan CHENG, Chao LIU, Bing ZHAO, Qinbai XU. Multiple to One Fully Homomorphic Encryption Scheme over the Integers[J]. Journal of Electronics & Information Technology, 2018, 40(9): 2119-2126. doi: 10.11999/JEIT171194

Multiple to One Fully Homomorphic Encryption Scheme over the Integers

doi: 10.11999/JEIT171194
Funds:  The National Natural Science Foundation of China (61202395, 61562077, 61662069, 61662071); The Natural Science Foundation of Gansu Province (145RJDA325)
  • Received Date: 2017-12-19
  • Rev Recd Date: 2018-05-02
  • Available Online: 2018-07-12
  • Publish Date: 2018-09-01
  • Fully homomorphic encryption allows any operation evaluation on encrypted data without decryption. The existing integer-based homomorphic encryption schemes are designed only for two participants namely one party encryption one party decryption (one-to-one), whose computational efficiency is generally low, plaintext space is small, so it can not be applied to big data, cloud computing and other actual scene. Therefore, a full homomorphic encryption scheme with multi-party encryption, one party decryption (multiple to one) is presented. The scheme simplifies the key generation process on the basis of guaranteeing the security, but also gives the range of the number of encrypted parties that can be decrypted accurately in the process of homomorphic operation. Meanwhile, in the random oracle model, the security of the new scheme is proved based on approximate Greatest Common Divisor (GCD) problem. Numerical analysis demonstrates that the presented scheme can not only extend the data traffic, but also improve the efficiency by comparing with the existing schemes. Simulation results show that proposed scheme is more practical in the range of integer, and meets the requirements of the users to the system response. Finally, the plaintext space is expanded to 3 bit, comparing and analysing the experiment with the scheme of 1 bit.
  • loading
  • RIVEST R. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120–126 doi: 10.1145/357980.358017
    GENTRY C. Fully homomorphic encryption using ideal lattices[C]. ACM Symposium on Theory of Computing, Bethesda, USA, 2009: 169–178.
    DIJK M, GENTRY C, HALEVI S, et al. Fully homomorphic encryption over the integers[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Berlin, Heidelberg, 2010: 24–43.
    STEHLE D and STEINFELD R. Faster fully homomorphic encryption[C]. Advances in Cryptology-ASIACRYPT 2010, International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 2010: 377–394.
    GENTRY C and HALEVI S. Implementing Gentry’s fully-homomorphic encryption scheme[C]. Advances in Cryptology-EUROCRYPT 2011, International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 2011: 129–148.
    SMART N and VERCAUTEREN F. Fully homomorphic encryption with relatively small Key and ciphertext sizes[C]. International Conference on Practice and Theory in Public Key Cryptography, Paris, France, 2010: 420–443.
    CHENAL M and TAHG Q. On key recovery attacks against existing somewhat homomorphic encryption schemes[J]. Lecture Notes in Computer Science, 2014, 8895: 239–258 doi: 10.1007/978-3-319-16295-9_13
    TANG Dianhua and ZHU Shixiong. Faster fully homomorphic encryption scheme over integer[J]. Computer Engineering&Applications, 2012, 48(28): 117–122 doi: 10.3778/j.issn.1002-8331.2012.28.023
    GU Chunsheng, JING Zhengjun, YU Zhimin et al. Breaking faster fully homomorphic encryption scheme over integer[J]. Computer Engineering&Applications, 2013, 49(21): 101–105 doi: 10.3778/j.issn.1002-8331.1201-0401
    光焱, 顾纯祥, 祝跃飞, 等. 一种基于LWE问题的无证书全同态加密体制[J]. 电子与信息学报, 2013, 35(4): 988–993 doi: 10.3724/SP.J.1146.2012.01102

    GUANG Yan, GU Chunxiang, ZHU Yuefei, et al. Certificateless fully homomorphic encryption based on LWE problem[J]. Journal of Electronics&Information Technology, 2013, 35(4): 988–993 doi: 10.3724/SP.J.1146.2012.01102
    古春生. 近似理想格上的全同态加密方案[J]. 软件学报, 2015, 26(10): 2696–2719 doi: 10.13328/j.cnki.jos.004808

    Gu Chunsheng. Fully homomorphic encryption from approximate ideal lattices[J]. Journal of Software, 2015, 26(10): 2696–2719 doi: 10.13328/j.cnki.jos.004808
    熊婉君, 韦永壮, 王会勇. 一个基于整数的全同态加密改进方案[J]. 密码学报, 2016, 3(1): 67–78 doi: 10.13868/j.cnki.jcr.000110

    XIONG Wanjun, WEI Yongzhuang, and WANG Huiyong. An improved fully homomorphic encryption scheme over the integers[J]. Journal of Cryptologic Research, 2016, 3(1): 67–78 doi: 10.13868/j.cnki.jcr.000110
    HU Renyuan, ZHANG Longjun, and QIN Yongzhen. Improved fully homomorphic encryption algorithm for cloud storage[C]. International Conference on Communications, Information Management and Network Security, Shanghai, China, 2016: 349–352.
    夏超.同态加密技术及其应用研究[D]. [硕士论文], 安徽大学, 2013.

    XIA Chao. Research of homomorphic encryption technolosgy and application[D]. [Master dissertation], Anhui University, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(2)

    Article Metrics

    Article views (2484) PDF downloads(72) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return