A Fully Homomorphic Encryption Scheme With a Smaller Public Key

被引:0
|
作者
Zhang, Shaomin [1 ]
Li, Kaiqiang [1 ]
Wang, Baoyi [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Baoding, Peoples R China
基金
中国国家自然科学基金;
关键词
Fully homomorphic encryption; Public key dimension; Two forms; Parameter offset technology;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to improve the efficiency of the homomorphic encryption scheme, an improved homomorphic encryption scheme based on integer is proposed. On the basis of the DGHV scheme, the size of the public key is first reduced to (0) over tilde(lambda(4)) by using the public key element quadratic technique and the parameter offset technique. Then, by changing the modulo 2(k) operation to modulo operation, the improved scheme can encrypt the data of k bits at one time, which has smaller public key size and higher efficiency than the original DGHV scheme. Finally, the correctness and security of the scheme are proved by the theory, and the efficiency analysis of the scheme is given.
引用
收藏
页码:762 / 767
页数:6
相关论文
共 50 条
  • [1] A new fully homomorphic encryption over the integers using smaller public key
    Ramaiah, Yeluripati Govindha
    Kumari, Gunta Vijaya
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 303 - 331
  • [2] A Fully Homomorphic Encryption Scheme with Better Key Size
    Chen Zhigang
    Wang Jian
    Zhang ZengNian
    Song Xinxia
    CHINA COMMUNICATIONS, 2014, 11 (09) : 82 - 92
  • [3] A key recovery attack on Fully Homomorphic Encryption scheme
    Guang, Yan
    Zhu, Yue-Fei
    Gu, Chun-Xiang
    Zheng, Yong-Hui
    Tang, Quan-You
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (12): : 2999 - 3004
  • [4] A Public Key Compression Scheme for Fully Homomorphic Encryption Based on Quadratic Parameters With Correction
    Chen, Liquan
    Lim, Ming
    Fan, Zijuan
    IEEE ACCESS, 2017, 5 : 17692 - 17700
  • [5] Public key and levelled attributes access policy oriented fully homomorphic encryption scheme
    Biksham, V.
    Vasumathi, D.
    INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS, 2020, 12 (01) : 51 - 63
  • [6] Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong
    Zhou, Liguo
    Zhan, Yu
    Liu, Chengdong
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [7] Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
    Tsaban, Boaz
    Lifshitz, Noam
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 75 - 78
  • [8] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [9] KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION
    Habri, Hakim
    Chillali, Abdelhakim
    Boua, Abdelkarim
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2022, 54 : 35 - 50
  • [10] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    International Journal of Network Security, 2019, 21 (01) : 91 - 99