浏览全部资源
扫码关注微信
1. 信息工程大学,河南 郑州 450002
2. 数学工程与先进计算国家重点实验室,江苏 无锡 214125
3. 中国人民解放军66136部队,北京 100043
[ "郑永辉(1976-),男,江西乐平人,博士,信息工程大学讲师,主要研究方向为密码学。" ]
[ "康元基(1992-),男,辽宁凤城人, 66136部队助理工程师,主要研究方向为全同态加密。" ]
[ "顾纯祥(1976-),男,安徽霍山人,博士,信息工程大学副教授,主要研究方向为密码学。" ]
[ "董辉(1982-),男,河北丰南人,66136部队工程师,主要研究方向为模拟计算。" ]
网络出版日期:2017-04,
纸质出版日期:2017-04-25
移动端阅览
郑永辉, 康元基, 顾纯祥, 等. 环上基于属性的全同态加密体制设计[J]. 通信学报, 2017,38(4):55-63.
Yong-hui ZHENG, Yuan-ji KANG, Chun-xiang GU, et al. Attribute-based fully homomorphic encryption scheme over rings[J]. Journal on communications, 2017, 38(4): 55-63.
郑永辉, 康元基, 顾纯祥, 等. 环上基于属性的全同态加密体制设计[J]. 通信学报, 2017,38(4):55-63. DOI: 10.11959/j.issn.1000-436x.2017077.
Yong-hui ZHENG, Yuan-ji KANG, Chun-xiang GU, et al. Attribute-based fully homomorphic encryption scheme over rings[J]. Journal on communications, 2017, 38(4): 55-63. DOI: 10.11959/j.issn.1000-436x.2017077.
全同态加密在云计算的数据和隐私安全领域有重要应用,但现有全同态加密体制普遍存在密钥、密文尺寸偏大的弊端,严重制约其实用性。为此,以环上容错学习问题为基础,提出环上重编码体制与基于属性加密体制,并与全同态加密体制结合,构造基于属性的全同态加密体制,该体制无需公钥证书,可实现对加密数据细粒度访问控制,与已有同类成果相比,大大缩短了密钥与密文尺寸。
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing
but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large
which restricted its practical.To improve these drawbacks
a recoding scheme and a attribute-based encryption scheme based on learning with errors problem over rings were provided
then a attribute-based fully homomorphic encryption was constructed.The new scheme overcame the above mentioned drawbacks
because it did't need public key certificate
meanwhile
it can achieve the fine-grained access control to the ciphertext.Compared with similar results
proposed method decreases the size of keys and ciphertext greatly.
RIVEST R L , ADLEMAN L , DERTOUZOS M L . On data banks and privacy homomorphisms [J ] . Foundations of Secure Computation , 1978 , 4 ( 11 ): 169 - 180 .
GENTRY C , . Fully homomorphic encryption using ideal lattices [C ] // STOC , 2009 , 9 : 169 - 178 .
DUK M V , GENTRY C , HALEVI S , et al . Fully homomorphic encryption over the integers [C ] // The 29th Annual Eurocrypt Conference . Riviera,French , 2010 : 24 - 43 .
SMART N P , VERCAUTEREN F . Fully homomorp-hic encryption with relatively small key and cipher-ext sizes [C ] // The 13th International Conference on Practive and Theory in Public Key Cryptography(PKC2010) . Paris,France , 2010 : 420 - 443 .
GENTRY C , HALEVI S . Implementing gentry's fully homomorphic encryption scheme [C ] // EUROCRYP-T,Lecture Notes in Computer Science . 2011 : 129 - 148 .
BRAKERSKI Z , VAIKUNTANATHAN V . Efficient fully homomorphic encryption from (standard) LWE [J ] . SIAM Journal on Computing , 2014 , 43 ( 2 ): 831 - 871 .
BRAKERSKI Z , VAIKUNTANATHAN V . Fully homomorphic encryption from ring-LWE and security for key dependent messages [M ] . Advances in Cryptology CRYPTO 2011 . Springer Berlin Heidelberg , 2011 : 505 - 524 .
REGEV O . On lattices,learning with errors,random linear codes,and cryptography [J ] . Journal of the ACM (JACM) , 2009 , 56 ( 6 ): 34 .
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings [J ] . Journal of the ACM (JACM) , 2013 , 60 ( 6 ): 43 .
BRAKERSKI Z , Gentry C , VAIKUNTANATHAN V . (Leveled) fully homomorphic encryption without bootstrapping [C ] // The 3rd Innovations in Theoretical Computer Science Conference . ACM , 2012 : 309 - 325 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [M ] . Advances in Cryptology–EUROCRYPT 2005 . Springer Berlin Heidelberg , 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // Proceedings of the 13th ACM Conference on Computer and Communications Security . ACM , 2006 : 89 - 98 .
SHAMIR A , . Identity-based cryptosystems and signa-ture schemes [C ] // Advances in Cryptology . Springer Berlin Heidelberg , 1985 : 47 - 53 .
GORBUNOY S , VAIKUNTANATHAN V , WEE H . Attribute-based encryption for circuits [J ] . Journal of the ACM (JACM) , 2015 , 62 ( 6 ): 45 .
GENTRY C , SAHAI A , WATERS B . Homomorphic encryption from learning with errors:conceptually-simpler,asymptotically-faster,attribute-based [M ] . Advances in Cryptology–CRYPTO 2013 . Springer Berlin Heidelberg , 2013 : 75 - 92 .
LYUBASHEVSKY V , PEIKERT C , REGEV O . A toolkit for ring-LWE cryptography [M ] . Advances in Cryptology–EUROCRYPT 2013 . Springer Berlin Heidelberg , 2013 : 35 - 54 .
KANG Y J , GU C X , ZHENG Y H , et al . Identity-based fully homomorphism encryption from eigenvector [J ] . Journal of Software,doi:10.13328/j.cnki.jos.004991 .
GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions [C ] // The 40th Annual ACM Symposium on Theory of Computing . ACM , 2008 : 197 - 206 .
0
浏览量
649
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构