期刊文献+

利用LWR构造基于身份的全同态加密方案

Identity-based Fully Homomorphic Encryption from LWR
下载PDF
导出
摘要 针对目前基于LWE(Learn With Errors)构造全同态加密方案普遍需要高斯函数抽样、公钥尺寸过大等问题,提出利用高效的LWR(Learning With Rounding)替换传统的LWE,构造基于LWR(Learning With Rounding)的身份基全同态加密方案,对方案的安全性进行严格证明。LWR问题是LWE问题的变体,消除了LWE问题利用高斯函数抽样生成噪声的过程,具有更高的计算效率以及更小公钥和密文尺寸。 In order to solve the problem that the LWE based fully homomorphic encryption scheme generally needs samples of Gaussian function and oversized public key,a new LWR (Learning With Rounding) algorithm is proposed to replace the tradi tional LWE problem and construct a LWR With Rounding, and the safety of the program is strictly proved. The LWR problem is a variant of the LWE (Learn With Errors) problem,which eliminates the process of generating noise of LWE in using Gaussian function. The sampling has higher computational efficiency and public key and ciphertext is of smaller size.
作者 张兴兰 卢玉顺 ZHANG Xing-lan;LU Yu-shun(Department of Information,Beijing University of Technology,Beijing 100124,China)
出处 《软件导刊》 2018年第10期200-203,208,共5页 Software Guide
关键词 LWR LWE 基于身份 全同态加密 高斯函数 LWR LWE identity based encryption fully homomorphic encryption Gaussian noise sampling
  • 相关文献

参考文献3

二级参考文献17

  • 1REGEY O. On lattices, learning with errors, random linear codes, and cryptography[A]. Proceeding of the 37th ACM Symposium on Theory of Computing (STOC2005) [C]. Baltimore, MD, USA, 2005.84-93.
  • 2LYUBASHEYSKY Y, PEIKERT C, REGEY O. On ideal lattices and learning with errors over rings[A]. Proceeding of the 29th Annual Eurocrypt Conference[C]. Riviera, French, 2010.1-23.
  • 3GENTRY C. Fully homomorphic encryption using ideal lattices[A]. Proceeding of the 40st ACM Symposium on Theory of Computing (STOC2009)[C]. Bethesda, Maryland, USA, 2009.169-178.
  • 4DIJK M Y, GENTRY C, HALEYI S, et al. Fully homomorphic encryption over the integers[A]. Proceeding of the 29th Annual Eurocrypt Conference[C]. Riviera, French, 2010.24-43.
  • 5SMART N P, YERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[A]. Proceeding of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC2010)[C]. Paris, France, 2010.420-443.
  • 6GENTRY C, HALEYI S. Implementing gentry's fully homomorphic encryption scheme[A]. Proceeding the 30th Annual Eurocrypt Conference[C]. Tallinn, Estonia, 2011.129-148.
  • 7STEHL'E D, STEINFELD R. Faster fully homomorphic encryption [A]. Proceeding of the 16th Annual Asiacrypt Conference [C]. Singapore, 2010.377-394.
  • 8BRAKERSKJ Z, YAIKUNTANATHAN V. Efficient fully homomorphic encryption from (standard) LWE[A]. Proceeding of IEEE 52nd Annual Symposium on Foundations of Computer Science(FOCS2011)[C]. Palm Springs, CA, USA, 20/1.97-106.
  • 9BRAKERSKJ Z, GENTRY C, YAlKUNTANATHAN Y. Fully homomorphic encryption without bootstrapping[A]. Proceeding of Innovations in Theoretical Computer Science 2012[C]. Cambridge, MA, USA,2012.309-325.
  • 10GENTRY C, HALEY1 S, SMARTN P. Fully homomorphic encryption with polylog overhead[A]. Proceeding of the 31st Annual Eurocrypt Conference[C]. Canbridge, UK, 2012.465-482.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部