期刊文献+

全同态加密函数库调试分析

Debug and Analysis on Fully Homomorphic Cryptography
下载PDF
导出
摘要 本文选取了HElib库、FHE-CODE库和FHE-master基于三种不同算法的全同态加密程序,一方面,通过对程序本身的调试运行,不断更改噪声、运行时间、所占存储空间等运行参数,对程序性能进行动态比较分析.提高安全参数可以实现较高精度的加密,安全参数越高,则其对应的密文长度越长、所占存储空间越大,所以增加密文长度、重加密密文的长度等可以提高算法的安全级别.同时,减小模数、适当减小安全参数,可以减小噪声比并提高运行效率.另一方面,分析了三种软件对应的三种全同态算法:Gentry提出的理想格算法、DGHV算法和BGV算法,从安全性、有效性、实现程序以及相互联系对三种方案进行对比研究.其中,HElib库操作较为复杂,运行时间较长,但安全性较高,FHE-CODE代码的逻辑相对比较清晰,运行效率较高,FHE-master库利用文件读取操作实现了对于密文的检索功能,针对不同密钥读写操作效率参差不齐.本文一方面验证算法在理论研究的相关性质,另一方面从程序实现方面分析算法的相关属性,为全同态加密研究提供实践基础. The studies on three FHE programs, HElib, FHE-CODE and FHE-master, which are based respectively on three different encryption algorithms, are conducted in this paper. Through debugging and parameter-modification, this paper analyzes noise, runtime and storage space, in order to verify the theoretical and practical properties of related algorithms. They can achieve high precision encryption by increasing security parameter. The longer security parameter, the longer the length of the cipher text, but the storage space occupied will be larger. As a result, increasing the length of the cipher text or encrypted cipher text can improve the security level of the algorithm. Meanwhile, reducing the modulus or reducing security parameters can reduce the noise and increase the efficiency. In addition, we analyze corresponding three kinds of algorithms: Gentry's algorithm, DGHV and BGV. We compare the three schemes from the aspects of security, efficiency, program implementation and their relations. It is concluded that HElib is more complex and secure, and the running time is longer. The logic of FHE-CODE is relatively clear, and it is more efficient. FHE-master achieves the retrieval of the cipher text by file read operation. By means of comparison, this paper is intended to provide advice for the studies of the FHE-encryption algorithms.
出处 《密码学报》 CSCD 2017年第1期16-28,共13页 Journal of Cryptologic Research
基金 密码科学技术国家重点实验室开放课题(MMKFKT201514) 洛阳外国语学院科研基金(2015XYQ004)
关键词 全同态加密算法 代码库调试 比较研究 FHE-encryption algorithms code library debugging comparison study
  • 相关文献

参考文献5

二级参考文献56

  • 1吴光远,何丕廉,曹桂宏,聂颂.基于向量空间模型的词共现研究及其在文本分类中的应用[J].计算机应用,2003,23(z1):138-140. 被引量:23
  • 2Rivest R L, Adleman L, Dertouzos M L.On data banks and privacy homomorphisms[Z].Foundations of Secure Computation, 1978.
  • 3Gentry C.Fully homomorphic encryption using ideal lattices[C]//STOC' 09,2009 : 169-178.
  • 4Gentry C.A fully homomorphic encryption scheme[D/OL]. Stanford University , 2009.http : //crypto.stanford.edu/craig.
  • 5van Dijk M, Gentry C, Halevi S, et al.Fully homomorphic encryption over the integers[C]//Volume 6110 of LNCS : Proc of Eurocrypt, 2010 : 24-43.
  • 6Smart N P, Vercauteren F.Fully homomorphic encryption with relatively small key and ciphertext sizes[C]// Volume 6056 of Lecture Notes in Computer Science: Public Key Cryptography-PKC' 10, Springer, 2010.
  • 7Stehle D, Steinfeld R.Faster fully homomorphic encryption, Cryptology ePrint Archive, Report 2010/299[EB/OL]. (2010).http://eprint.iacr.org/.
  • 8Howgrave-Graham N.Approximate integer common divisors[C]//Volume 2146 of Lecture Notes in Computer Science: CaLC' 01.[S.l.] : Springer, 2001 : 51-66.
  • 9Rivest R, Adleman L, Dertouzos M. On Data Banks and Privacy Homomorphisms[M]. [S. 1.]: Academic Press, 1978: 169-177.
  • 10Lipton B. Searching for Elements in Black Box Fields and Applications[C]//Proc. of Cryptology-Crypto'96. [S. 1.]: Springer- Verlag, 1996: 283-297.

共引文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部