期刊文献+

一种全同态加密的安全内积计算方案 被引量:1

A Secure Computation Scheme of Inner Product Based on Fully Homomorphic Encryption
下载PDF
导出
摘要 在云计算环境下密文top-k检索的众多方法中,该文聚焦于同态加密方法,该公钥加密方法具有不解密就能对密文进行操作的优点。在密文top-k查询中,内积相似性是度量索引向量和查询向量的相似性的最常用的一个指标。该文提出一个安全计算两向量内积相似性的方案,该方案使用基于环上错误学习问题的批处理和打包的同态加密来保护隐私。与其他方法相比,该方案具有通信代价低和计算代价低的优点。 Among many approaches to solve the problem of top-k retrieval over encrypted cloud data, we focus on an approach with homomorphic encryption, which is public key encryption supporting some operations on encrypted data. In top-k retrieval of encrypted data, the inner product is often used as a metric to compute the similarity between the file feature vector and the query vector. In this paper, we propose an efficient scheme to compute the inner product on encrypted data using the homomorphic encryption based on the learning with errors over ring (RLWE) problem, in which batch and packing techniques are adopted to achieve lower computation and communication cost.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2016年第5期808-811,共4页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金面上项目(61472065 61370203)
关键词 中国剩余定理 全同态加密 环上错误学习问题 单指令多数据流 Chinese remainder theorem fully homomorphic encryption learning with errors over ring single instruction multiple data
  • 相关文献

参考文献12

  • 1WITTEN H, MOFFAT A, BELL T C. Managing gigabytes: Compressing and indexing documents and images[M]. San Francisco: Morgan Kaufmarm Publishing, 1999.
  • 2GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing- STOC'09. IS.1.]: ACM Press, 2009: 169-178.
  • 3SMART N P, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[C]//Public Key Cryptography-PKC 2010. Berlin: Springer, 2010: 420-443.
  • 4STEHLE D, STE1NFELD R. Faster fully homomorphic encryption[C]//Advances in Cryptology-ASIACRYPT 2010. Berlin: Springer, 2010: 377-394..
  • 5GU Chun-sheng. Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's fully homomorphic encryption[J]. International Journal of Security & Its Applications, 2012, 6(2): 176-184.
  • 6CORON J S, MANDAL A, NACCACHE D, et al. Fully homomorphic encryption over the integers with shorter public keys[C]//Advances in Cryptology-CRYPTO 2011. Berlin: Springer, 2011: 487-504.
  • 7GENTRY C, HALEVI S. Implementing Gentry's fully-homomorphic encryption scheme[C]//Advances in Cryptology-EUROCRYPT 2011. Berlin: Springer, 2011: 129-148.
  • 8YU J, LU P, ZHU Y, et al. Towards secure multi-keyword top-k retrieval over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(4): 239-250.
  • 9DING J, TAO C. A new algorithm for solving the general approximate common divisors problem and cryptanalysis of the fhe based on the gacd problem[DB/OL]. [2014-04-07]. http://eprint.iacr.org/2014/042.
  • 10YASUDA M, SHIMOYAMA T, KOGURE J, et al. Packed homomorphic encryption based on ideal lattices and its application to biometrics[J]. Security Engineering and Intelligence Informatics, 2013(8128): 55-74.

同被引文献1

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部