期刊文献+

A Method of Homomorphic Encryption 被引量:8

A Method of Homomorphic Encryption
下载PDF
导出
摘要 The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets. The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第1期181-184,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (90104005)
关键词 SECURITY private homomorphism similar modul homomorphic encryption scheme security private homomorphism similar modul homomorphic encryption scheme
  • 相关文献

参考文献3

  • 1Domingo-Ferrer J,Herrera-Joancomarti J.A New Privacy Homomorphism and Applications[].Information Processing Letters.1996
  • 2Diffie W,Hell man M.New Direction in Cryptography[].IEEE Trans.1976
  • 3Haber S.Multi-PartyCryptographic Computation: Tech- niques and applications[]..1998

同被引文献83

  • 1石井,吴哲,谭璐,王昊鹏,王娜.RSA数据加密算法的分析与改进[J].济南大学学报(自然科学版),2013,27(3):283-286. 被引量:26
  • 2杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 3史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 4王贵林,卿斯汉.对一种多重密钥共享认证方案的分析和改进[J].软件学报,2006,17(7):1627-1632. 被引量:11
  • 5尹春勇,李秦伟,孙汝霞.一种秘密同态的改进模式[J].贵州工业大学学报(自然科学版),2007,36(1):68-70. 被引量:3
  • 6Domingo-Ferrer J,Herrera-Joancomarti J. A new privacy homomorphism and applications [J]. Information Processing Letters,1996,60(5):277-282
  • 7VerykiosV, Bertino E. State of- the- art in Privacy- preserving Data Mining. SIGMOD,2004,33 (1)
  • 8Rizvi S J , Haritsa J R. Maintaining data privacy in association rule mining [A]// Proceedings of the 28th International Conference on Very Large Databases. Hong Kong,2002:682-693
  • 9Agrawal R, Srikant R. Privacy-preserving data mining [A]// Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. United States, 2000:439-450
  • 10Agrawal D,Aggarwal C. On the design and quantification of privacy preserving data mining algorithms [A]//Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Santa Barbara, United States: ACM Press,2001 :247-255

引证文献8

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部