Properties of SV-Style Homomorphic Encryption and Their Application

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Several special properties of Smart and Vercauteren’s encryption scheme are put forward.They are all based on the special parameter,which is a recommended modulus polynomial.These properties not only show that the secret key is deduced from an N-dimensional vector into its any entry,but also produce the triplet(grade-i reduced plaintext space,grade-i reduced ciphertext space,grade-i reduced secret key) for each i,where grade-i reduced secret key can decrypt grade-i reduced ciphertexts and can be efficiently computed from grade-i delegated key.At the same time,sequentially grade-(i + 1)delegated key can be efficiently computed from grade-i delegated key.This work also discusses a sequential computation in opposite direction,i.e.,computing grade-i delegated key from grade-(i + 1) delegated key.But the sequential computation in the opposite direction is difficult except at most the first steps of such sequential computation.Based on the properties given,we then propose a simple hierarchical encryption scheme with relatively small key and ciphertext sizes. Several special properties of Smart and Vercauteren’s encryption scheme are put forward. They are all based on the special parameter, which is a recommended modulus polynomial. These properties not only show that the secret key is deduced from an N-dimensional vector into its any entry. , but also produce the triplet (grade-i reduced plaintext space, grade-i reduced ciphertext space, grade-i reduced secret key) for each i, where grade-i reduced secret key can decrypt grade-i reduced ciphertexts and can efficiently computed from grade-i delegated key. At the same time, sequentially grade- (i + 1) delegated key can be efficiently computed from grade-i delegated key. This work also discusses a sequential computation in opposite direction, ie, i delegated key from grade- (i + 1) delegated key.But the sequential computation in the opposite direction is difficult except at most the first steps of such sequential computation. Based on the properties given, we then propose a simple hierarchic al encryption scheme with relatively small key and ciphertext sizes.
其他文献
期刊
中国城市住房保障制度的产生和演变与中国城镇住房制度改革变迁密不可分。基于诺思制度变迁理论,本文从中国城镇住房制度的变迁入手,系统分析了中国城市住房保障制度产生和演
The thesis mainly discusses the character of the heroine in Charlotte Brontes famous novel Jane Eyre. There are three major parts-introduction,analysis which
2003年12月18日,新华网上登载了一条消息:南京市汉中门某楼盘更换了一个新名称,叫上层建筑.此消息经多家媒体转载,立时引起广泛议论.人们不明白,一个哲学名词如何就成了楼盘
本文通过对荣华二采区10
为扎实推进黑龙江边疆文化大省建设,全面呈现黑龙江当代文学创作的实绩,展示龙江作家的文学风采,在黑龙江省委宣传部等部门的支持下,由省重点文科基地哈尔滨师范大学审美文化
在中国,蝴蝶是吉祥的象征,亦是珠宝设计师眼里的灵感来源,赵心绮(Cindy Chao)、陈世英(Wallace Chan)、胡茵菲(Anna Hu)都擅于用蝴蝶的意象设计珠宝。追根溯源,是因为他们都有一个跟蝴蝶相关的“东方蝶梦”,经由他们的巧手设计,越来越多的蝴蝶都飞过了沧海。  西方人称蝴蝶为森林中的精灵,认为它们是清婉灵动的仙子,喻示着美好。在中国,蝴蝶亦是吉祥的象征,讲究的中国人又叫它“福叠
摘要:随着我国经济的不断发展,加大了对公路交通运输方式的建设力度。保证公路工程施工的质量,能够有效的保证人们出行的安全和道路的运输安全,所以公路施工质量以及施工安全等都是目前在公路中需要重视的。所以加强对公路工程项目管理方法,才能有效的控制施工中的各种问题。项目的精细化管理方法在此时脱颖而出,保证了公路工程施工的顺利开展,并且有效的加强了工程施工的质量,控制了施工成本等。因此本文针对公路工程项目中
就在北京中鸿天的当家人潘石屹还在为其他开发商拷贝现代城楼盘案名耿耿于怀的时候,不曾想是螳螂捕蝉,黄雀在后,2004年1月,浙江现代联合控股集团欲状告中鸿天名下的北京现代