期刊文献+

一种基于智能合约的全同态加密方法 被引量:4

A full homomorphic encryption method based on smart contract
下载PDF
导出
摘要 大数据的发展使得人们越来越注重数据的价值,传统数据交易中数据不加密或采用对称方式加密。这使得数据保护、用户隐私与使用效率不可兼得。文章设计了一种基于DGHV适应智能合约的同态加密方法,使得密文可以直接进行计算,从而保护交易双方的隐私与安全。该合约可以实现同态布尔逻辑值计算、同态数值比较计算、同态长整数计算。之后给出了合同使用场景。经证明,该方法可以有效的保护数据的安全,并且可以高效的交易布尔型或整型数据。 The development of big data makes people pay more attention to the value of data.Data in traditional data transactions is not encrypted or in symmetric encryption way.This makes data protection,user privacy,and efficiency incompatible.This paper designs a homomorphic encryption method based on DGHV using on smart contract,so that the cipher text can be directly calculated,thereby protecting the privacy and security of both parties to the transaction.The contract can implement homomorphic Boolean logic value calculation,homomorphic value comparison calculation,and homomorphic long integer calculation.The contract usage scenario is given after this article.It has been proved that this method can effectively protect the security of data,and can efficiently deal with Boolean or integer data.
作者 仝秦玮 李洁 王洁 胡心森 胡凯 Tong Qinwei;Li Jie;Wang Jie;Hu Xinsen;Hu Kai(School of Computer Science and Engineering,Beihang University,Beijing 100191)
出处 《网络空间安全》 2020年第9期32-38,共7页 Cyberspace Security
基金 国家自然基金项目(项目编号:61672074,61672075) 教育部中国移动基金(项目编号:MCM20180104) 国家重点研发计划(项目编号:2018YFB1402702)。
关键词 区块链 智能合约 全同态加密 DGHV block chain smart contrast full homomorphic encryption DGHV
  • 相关文献

参考文献6

二级参考文献37

  • 1杨秀月.提高统计数据质量的措施[J].统计与决策,2005,21(01S):48-49. 被引量:20
  • 2孟艳红,王育欣,倪天予.数据加密系统的设计与实现[J].沈阳工业大学学报,2007,29(3):340-343. 被引量:7
  • 3RIVEST R, SHAMIR A, ADLEMAN L. A method for obtaining di- gital signatures and public-key cryptosystems [ J ]. Communications of the ACM,1978,21 (2) :120-126.
  • 4RIVEST R, SHAMIR A, DERTOUZOS M, On data banks and pri-va- cy homomorphisms [ J ]. Foundations of Secure Computation, 1978,7 ( 1 ) : 169-177.
  • 5BONEH D, GENTRY. A fully homomorphic encryption scheme [ D ]. Stanford : Stanford University,2009.
  • 6GENTRY. Fully homomorphie eneryption using ideal lattices [ C ]// Proc of the 41st Annual ACM Symposium on Theory of Computing. New York : ACM Press,2009 : 169-178.
  • 7Van DIJK, GENTR Y, HALEV I, et al. Fully homomorphic encryp- tion over the integers[ C ]//Proc of the 29th Annual International Conference on Theory and Applications of Cryptograhic Techniques. Berlin: Springer-erlag,2010:24-43.
  • 8GENTRY C. Computing arbitrary function of encryped data[ J ]. Com- munications of the ACM,2010,53(3) :97-105.
  • 9SMART N P, VERCAUTEREN F. Fully homomorphie encryption with relatively small key and ciphertext sizes[ C]//Proc of the 13th Inter- national Conference on Practice and Theory in Public Key Cryptogra- phy. Berlin : Springer-Verlag, 2010:420-443.
  • 10STEHLE D, STEINFELD R. Faster fully homomorphic eneryption [ C]//Proc of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2010 : 377 - 394.

共引文献147

同被引文献43

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部