期刊文献+

多密钥全同态加密研究 被引量:7

Overview on Multi-key Fully Homomorphic Encryption
下载PDF
导出
摘要 多密钥全同态加密支持对不同用户(密钥)的密文数据进行分析处理,处理后的结果可由所有参与计算的用户联合解密,其相对于传统的(单密钥)全同态加密,更加适用于云环境下多用户数据的隐私保护和处理.此外,由于格密码自身具有的抗量子攻击特性,基于格的多密钥全同态加密成为近年来相关密码学者的研究热点.自2012年López-Alt等人提出多密钥全同态加密方案LTV12至今,多密钥全同态加密在传统的(单密钥)全同态加密的基础上蓬勃发展.本文从MKFHE的研究现状、MKFHE方案的典型构造、利用MKFHE来构造云环境下的安全多方计算(Multi-Party Computing,MPC)、当前MKFHE存在的问题以及未来发展趋势等方面,对近年来多密钥全同态加密的发展进行分析与研究. Multi-key fully homomorphic encryption(MKFHE)can perform arbitrary operations on encrypted data under different public keys(users),and the final ciphertext can be jointly decrypted by all involved users.Comparing to traditional(single-key)FHE,MKFHE is more suitable to protect the privacy and secure processing of data in cloud computing environment.In addition,as latticebased cryptography is important alternative for post-quantum cryptography,lattice-based MKFHE has become a hotspot in recent years.Since López-Alt et al.proposed the first MKFHE scheme LTV12,MKFHE has continuous development on the basis of traditional(single-key)FHE.This paper presents a comprehensive overview and research on MKFHE following four aspects:the research status of MKFHE,the typical construction of MKFHE scheme,the typical construction of MPC protocol by MKFHE in cloud environment,the existing problems of MKFHE and the future development trend.
作者 李宁波 周潭平 车小亮 杨晓元 韩益亮 LI Ning-Bo;ZHOU Tan-Ping;CHE Xiao-Liang;YANG Xiao-Yuan;HAN Yi-Liang(College of Cryptography Engineering,Engineering University of People’s Armed Police,Xi’an 710086,China;Key Laboratory of Network&Information Security under the People’s Armed Police,Xi’an 710086,China)
出处 《密码学报》 CSCD 2020年第6期713-734,共22页 Journal of Cryptologic Research
基金 国家重点研发计划(2017YFB0802000) 国家自然科学基金(U1636114) 陕西省自然科学基金(2018JM6028)。
关键词 云计算 隐私保护 多密钥全同态加密 cloud computing privacy protection multi-key fully homomorphic encryption(MKFHE)
  • 相关文献

参考文献5

二级参考文献44

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1149

同被引文献22

引证文献7

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部