期刊文献+

公钥密码体制的同态性分析 被引量:3

The Homomorphism Analysis of Public Key Cryptosystem
下载PDF
导出
摘要 同态加密算法是基于秘密同态的概念,是秘密同态的一个子集。同态加密技术可以对加密数据直接进行运算,并且运算结果也自动加密。正是基于此,使得同态加密技术在安全多方计算、数据库加密、电子投票等领域具有广泛的应用。同态特性主要包括加法特性、乘法特性、混合乘法特性。文章对目前广泛应用的三大公钥密码体制的同态特性进行了分析,并对满足加法同态的Pallier密码体制进行了研究。为后续研究全同态加密算法提供理论基础和方法指导。 Homomorphic encryption algorithm is based on the concept of homomorphism, which is a subset ot the homomorphism. Homomorphic encryption technology can do the operation to ciphertext directly, the op- eration results can be encrypted automatically, and the technology has a very broad application in secure multi - party computation, data encryption, electronic voting and other fields. A Homomorphic property in- cludes additively homomorphism, muhiplicatively homomorphism, and mixed multiplicatively homomor- phism. We study the homomorphic property of the three public key cryptosystem widely used now, and ana- lyze Pallier cryptosystem that meets additively homomorphism, which can provide theoretical basis and guid- ance to the follow - up study of fully homomorphic encryption algorithm.
出处 《北京电子科技学院学报》 2012年第2期55-59,共5页 Journal of Beijing Electronic Science And Technology Institute
关键词 同态加密算法 公钥密码体制 安全多方计算 数据库加密 电子投票 homomorphic encryption algorithm public key cryptosystem secure multi-party computation database encryption electronic voting
  • 相关文献

参考文献9

  • 1Rikke Bendlin, Ivan Damgard, Claudio Orlandi, Sarah Zakarias. Semi -Homomorphic Encryption and Multiparty Computation. Eurocrypt 2011, LNCS 6632, pp. 169 - 188, 2011.
  • 2Aggelos Kiayias and Moti Yung. Tree - Homomorphic Encryption and Scalable Hierarchical Secret - Ballot Elec- tions. Financial Cryptography and Data Security, Lecture Notes in Computer Science, 2010, Volume 6052/2010, PP. : 257 -271.
  • 3C. Gentry. A fully homomorphic encryption scheme [ D ]. PhD thesis, Stanford University, 2009.
  • 4T. Sander and C. Tschudin. Towards mobile cryptography. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 1998. IEEE Computer Society Press.
  • 5向广利,朱平.有理数的同态加密机制.第十七届全国信息保密学术会议(182007)论文集.2007:351-357.
  • 6Akihiro Yamamura. Homomorphic Encryptions of Sums of Groups. AAECC 2007, LNCS 4851, Springer- Verlag Berlin Heidelberg, pp. 357 - 366.
  • 7Naoki Ogural, Go Yamamoto, Tetsutaro Kobayashi, and Shigenori Uehiyama. An Improvement of Key Generation Algorithm for Gentry~ Homomorphic Encryption Scheme. IWSEC 2010, LNCS 6434, pp. 70 - 83, 2010.
  • 8Nigel P. Smart, Frederik Vercauteren. Fully Homomorphie Encryption with Relatively mall Key and Ciphertext Si- zes[J] PKC 2010, LNCS 6056, pp. 420 -443, 2010.
  • 9Peeter Laud, Long Ngo. Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. ProvSec 2008, LNCS 5324, Springer-Verlag Berlin Heidelberg. pp. 298-312.

同被引文献20

  • 1蔡伟鸿,彭思喜,李岱素.基于机器指纹的版权控制系统的设计与实现[J].汕头大学学报(自然科学版),2005,20(2):49-55. 被引量:1
  • 2MEMON N D, WONG P W. A buyer-seller watermarking protocol [ J]. IEEE Transactions on Image Processing, 2001, 10(4) : 643 - 649.
  • 3ZHANG J, KOU W, FAN K. Secure buyer-seller water marking protocol[ J]. IEE Proceedings on Information Security, 2006, 153 (1):15-18.
  • 4HAJI M K N, ESLAMI Z. An efficient buyer-seller watermarking protocol based on proxy signatures [ C]// Proceedings of IEEE the 8th International ISC Conference on Information Security and Cryp- tology. Piscataway, NJ: IEEE Press, 2011 : 73 - 77.
  • 5HU D F, LI Q L. A secure and practical buyer-seller watermarking protocol [ C]// Proceedings of 2009 IEEE International Conference on Multimedia Information Networking and Security. Piscataway, NJ: IEEE Press, 105-108.
  • 6ZHAO W L, VARADHARAJAN V, MU Y. A secure mental poker protocol over the Intemet [ C] //ACSW Frontiers 2003: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers. New York: ACM Press, 2003, 21:105 -109.
  • 7XIAO M B, ZHANG J. A general platform for e-book transactions with digital rights management [ C]/! Proceedings of the 3rd Inter- national Conference on e-Business and Information System Security. Wuhan: Is. n. ], 2011:218 -221.
  • 8肖芸,肖明波.基于特征图像的数字版权保护系统[J/OL].计算机工程与应用.http://www.cnki.net/kcms/detail/11.2127.TP.20120925.1001.040.html.
  • 9胡玉平,张军.用于盗版追踪的数字水印协议研究[J].计算机科学,2010,37(1):91-94. 被引量:2
  • 10Pei-yih TING,Chia-huei HSEU.A secure threshold Paillier proxy signature scheme[J].Journal of Zhejiang University-Science C(Computers and Electronics),2010,11(3):206-213. 被引量:2

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部