Journal of Computer Applications ›› 2020, Vol. 40 ›› Issue (7): 1959-1964.DOI: 10.11772/j.issn.1001-9081.2020010051
• Cyber security • Previous Articles Next Articles
CHE Xiaoliang1,2, ZHOU Haonan1, ZHOU Tanping1,2, LI Ningbo2, YANG Xiaoyuan1,2
Received:
2020-01-17
Revised:
2020-03-12
Online:
2020-07-10
Published:
2020-07-24
Supported by:
车小亮1,2, 周昊楠1, 周潭平1,2, 李宁波2, 杨晓元1,2
通讯作者:
车小亮
作者简介:
车小亮(1987-),男,安徽亳州人,博士研究生,主要研究方向:同态密码、信息安全;周昊楠(1992-),男,黑龙江牡丹江人,硕士研究生,主要研究方向:同态密码、信息安全;周潭平(1989-),男,江西鹰潭人,讲师,博士,主要研究方向:同态密码、信息安全;李宁波(1992-),男,河南三门峡人,博士研究生,主要研究方向:同态密码、信息安全;杨晓元(1959-),男,湖南湘潭人,教授,博士生导师,硕士,主要研究方向:密码学、信息安全。
基金资助:
CLC Number:
CHE Xiaoliang, ZHOU Haonan, ZHOU Tanping, LI Ningbo, YANG Xiaoyuan. Decryption structure of multi-key homomorphic encryption scheme based on NTRU[J]. Journal of Computer Applications, 2020, 40(7): 1959-1964.
车小亮, 周昊楠, 周潭平, 李宁波, 杨晓元. 基于NTRU的多密钥同态加密方案解密结构[J]. 计算机应用, 2020, 40(7): 1959-1964.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2020010051
[1] GOLDREICH O,MICALI S,WIGDERSON A. How to play any mental game or a completeness theorem for protocols with honest majority[C]//Proceedings of the 19th Annual ACM Symposium on Theory of Computing. New York:ACM,1987:218-229. [2] BEN-OR M,GOLDWASSER S,WIGDERSON A. Completeness theorems for non-cryptographic fault-tolerant distributed computation[C]//Proceedings of the 20th Annual ACM Symposium on Theory of Computing. New York:ACM,1988:1-10. [3] LÓPEZ-ALT A,TROMER E,VAIKUNTANATHAN V. On-the-fly multiparty computation on the cloud via multi-key fully homomorphic encryption[C]//Proceedings of the 44th Annual ACM Symposium on Theory of Computing. New York:ACM,2012:1219-1234. [4] LYUBASHEVSKY V,PEIKERT C,REGEV O. On ideal lattices and learning with errors over rings[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 6110. Berlin:Springer,2010:1-23. [5] STEHLÉ D,STEINFELD R. Making NTRU as secure as worst-case problems over ideal lattices[C]//Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 6632. Berlin:Springer,2011:27-47. [6] ALBRECHT M,BAI S,DUCAS L. A subfield lattice attack on overstretched NTRU assumptions[C]//Proceedings of the 36th Annual Cryptology Conference,LNCS 9814. Berlin:Springer,2016:153-178. [7] CHEON J H,JEONG J,LEE C. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without an encoding of zero[J]. LMS Journal of Computation and Mathematics,2016, 19(A):255-266. [8] YU Y,XU G,WANG X. Provably secure NTRU instances over prime cyclotomic rings[C]//Proceedings of the 20th IACR International Workshop on Public Key Cryptography,LNCS 10174. Berlin:Springer,2017:409-434. [9] YU Y,XU G,WANG X. Provably secure NTRUEncrypt over more general cyclotomic rings[EB/OL]. (2017-04-05)[2019-04-05]. https://eprint.iacr.org/2017/304.pdf. [10] BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V. (Leveled) fully homomorphic encryption without bootstrapping[C]//Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. New York:ACM,2012:309-325. [11] DORÖZ Y,HU Y,SUNAR B. Homomorphic AES evaluation using the modified LTV scheme[J]. Designs Codes and Cryptography,2016,80(2):333-358. [12] BOS J W,LAUTER K,LOFTUS J,et al. Improved security for a ring-based fully homomorphic encryption scheme[C]//Proceedings of the 14th IMA International Conference on Cryptography and Coding,LNCS 8308. Cham:Springer,2013:45-64. [13] 陈智罡. 基于格的全同态加密研究与设计[D]. 南京:南京航空航天大学,2015:47-59.(CHEN Z G. Research and design of fully homomorphic encryption based on lattice[D]. Nanjing:Nanjing University of Aeronautics and Astronautics,2015:47-59.) [14] 李子臣, 张卷美, 杨亚涛, 等. 基于NTRU的全同态加密方案[J]. 电子学报,2018,46(4):938-944.(LI Z C,ZHANG J M, YANG Y T,et al. A fully homomorphic encryption scheme based on NTRU[J]. Acta Electronica Sinica,2018,46(4):938-944.) [15] MICCIANCIO D,REGEV O. Worst-case to average-case reductions based on Gaussian measures[J]. SIAM Journal on Computing,2004,37(1):267-302. [16] GENTRY C,SAHAI A,WATERS B. Homomorphic encryption from learning with errors:conceptually-simpler,asymptoticallyfaster,attribute-based[C]//Proceedings of the 33rd Annual Cryptology Conference,LNCS 8042. Berlin:Springer,2013:75-92. [17] BRAKERSKI Z. Fully homomorphic encryption without modulus switching from classical GapSVP[C]//Proceedings of the 32nd Annual Cryptology Conference, LNCS 7417. Berlin:Springer, 2012:868-886. [18] FAN J,VERCAUTEREN F. Somewhat practical fully homomorphic encryption[EB/OL]. (2012-04-05)[2019-04-05]. http://eprint.iacr.org/2012/144.pdf. |
[1] | . Key Rcovery Attack of Blow-CAST-Fish Based on Differential Tables [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | . Deep robust watermarking algorithm based on multiscale knowledge learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[3] | . Adaptively secure outsourced attribute-based encryption with keyword search [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[5] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[6] | . Efficient robust zero watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moments [J]. Journal of Computer Applications, 0, (): 0-0. |
[7] | XU Liyun, YAN Tao, QIAN Yuhua. Audio encryption algorithm in fractional domain based on cascaded chaotic system [J]. Journal of Computer Applications, 2021, 41(9): 2623-2630. |
[8] | CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian. Differential privacy high-dimensional data publishing method via clustering analysis [J]. Journal of Computer Applications, 2021, 41(9): 2578-2585. |
[9] | ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang. Detection method of domains generated by dictionary-based domain generation algorithm [J]. Journal of Computer Applications, 2021, 41(9): 2609-2614. |
[10] | GE Jihong, SHEN Tao. Energy data access control method based on blockchain [J]. Journal of Computer Applications, 2021, 41(9): 2615-2622. |
[11] | ZHANG Shipeng, LI Yongzhong, DU Xiangtong. Intrusion detection model based on semi-supervised learning and three-way decision [J]. Journal of Computer Applications, 2021, 41(9): 2602-2608. |
[12] | . Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . Nonlinear scrambling diffusion synchronization image encryption based on dynamic network [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | CHEN Weiwei, CAO Li, GU Xiang. E-forensics model for internet of vehicles based on blockchain [J]. Journal of Computer Applications, 2021, 41(7): 1989-1995. |
[15] | QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao. Blockchain storage expansion model based on Chinese remainder theorem [J]. Journal of Computer Applications, 2021, 41(7): 1977-1982. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||