Journal of Computer Applications ›› 2020, Vol. 40 ›› Issue (7): 1959-1964.DOI: 10.11772/j.issn.1001-9081.2020010051
• Cyber security • Previous Articles Next Articles
CHE Xiaoliang1,2, ZHOU Haonan1, ZHOU Tanping1,2, LI Ningbo2, YANG Xiaoyuan1,2
Received:
2020-01-17
Revised:
2020-03-12
Online:
2020-07-24
Published:
2020-07-10
Supported by:
车小亮1,2, 周昊楠1, 周潭平1,2, 李宁波2, 杨晓元1,2
通讯作者:
车小亮
作者简介:
车小亮(1987-),男,安徽亳州人,博士研究生,主要研究方向:同态密码、信息安全;周昊楠(1992-),男,黑龙江牡丹江人,硕士研究生,主要研究方向:同态密码、信息安全;周潭平(1989-),男,江西鹰潭人,讲师,博士,主要研究方向:同态密码、信息安全;李宁波(1992-),男,河南三门峡人,博士研究生,主要研究方向:同态密码、信息安全;杨晓元(1959-),男,湖南湘潭人,教授,博士生导师,硕士,主要研究方向:密码学、信息安全。
基金资助:
CLC Number:
CHE Xiaoliang, ZHOU Haonan, ZHOU Tanping, LI Ningbo, YANG Xiaoyuan. Decryption structure of multi-key homomorphic encryption scheme based on NTRU[J]. Journal of Computer Applications, 2020, 40(7): 1959-1964.
车小亮, 周昊楠, 周潭平, 李宁波, 杨晓元. 基于NTRU的多密钥同态加密方案解密结构[J]. 计算机应用, 2020, 40(7): 1959-1964.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2020010051
[1] GOLDREICH O,MICALI S,WIGDERSON A. How to play any mental game or a completeness theorem for protocols with honest majority[C]//Proceedings of the 19th Annual ACM Symposium on Theory of Computing. New York:ACM,1987:218-229. [2] BEN-OR M,GOLDWASSER S,WIGDERSON A. Completeness theorems for non-cryptographic fault-tolerant distributed computation[C]//Proceedings of the 20th Annual ACM Symposium on Theory of Computing. New York:ACM,1988:1-10. [3] LÓPEZ-ALT A,TROMER E,VAIKUNTANATHAN V. On-the-fly multiparty computation on the cloud via multi-key fully homomorphic encryption[C]//Proceedings of the 44th Annual ACM Symposium on Theory of Computing. New York:ACM,2012:1219-1234. [4] LYUBASHEVSKY V,PEIKERT C,REGEV O. On ideal lattices and learning with errors over rings[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 6110. Berlin:Springer,2010:1-23. [5] STEHLÉ D,STEINFELD R. Making NTRU as secure as worst-case problems over ideal lattices[C]//Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 6632. Berlin:Springer,2011:27-47. [6] ALBRECHT M,BAI S,DUCAS L. A subfield lattice attack on overstretched NTRU assumptions[C]//Proceedings of the 36th Annual Cryptology Conference,LNCS 9814. Berlin:Springer,2016:153-178. [7] CHEON J H,JEONG J,LEE C. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without an encoding of zero[J]. LMS Journal of Computation and Mathematics,2016, 19(A):255-266. [8] YU Y,XU G,WANG X. Provably secure NTRU instances over prime cyclotomic rings[C]//Proceedings of the 20th IACR International Workshop on Public Key Cryptography,LNCS 10174. Berlin:Springer,2017:409-434. [9] YU Y,XU G,WANG X. Provably secure NTRUEncrypt over more general cyclotomic rings[EB/OL]. (2017-04-05)[2019-04-05]. https://eprint.iacr.org/2017/304.pdf. [10] BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V. (Leveled) fully homomorphic encryption without bootstrapping[C]//Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. New York:ACM,2012:309-325. [11] DORÖZ Y,HU Y,SUNAR B. Homomorphic AES evaluation using the modified LTV scheme[J]. Designs Codes and Cryptography,2016,80(2):333-358. [12] BOS J W,LAUTER K,LOFTUS J,et al. Improved security for a ring-based fully homomorphic encryption scheme[C]//Proceedings of the 14th IMA International Conference on Cryptography and Coding,LNCS 8308. Cham:Springer,2013:45-64. [13] 陈智罡. 基于格的全同态加密研究与设计[D]. 南京:南京航空航天大学,2015:47-59.(CHEN Z G. Research and design of fully homomorphic encryption based on lattice[D]. Nanjing:Nanjing University of Aeronautics and Astronautics,2015:47-59.) [14] 李子臣, 张卷美, 杨亚涛, 等. 基于NTRU的全同态加密方案[J]. 电子学报,2018,46(4):938-944.(LI Z C,ZHANG J M, YANG Y T,et al. A fully homomorphic encryption scheme based on NTRU[J]. Acta Electronica Sinica,2018,46(4):938-944.) [15] MICCIANCIO D,REGEV O. Worst-case to average-case reductions based on Gaussian measures[J]. SIAM Journal on Computing,2004,37(1):267-302. [16] GENTRY C,SAHAI A,WATERS B. Homomorphic encryption from learning with errors:conceptually-simpler,asymptoticallyfaster,attribute-based[C]//Proceedings of the 33rd Annual Cryptology Conference,LNCS 8042. Berlin:Springer,2013:75-92. [17] BRAKERSKI Z. Fully homomorphic encryption without modulus switching from classical GapSVP[C]//Proceedings of the 32nd Annual Cryptology Conference, LNCS 7417. Berlin:Springer, 2012:868-886. [18] FAN J,VERCAUTEREN F. Somewhat practical fully homomorphic encryption[EB/OL]. (2012-04-05)[2019-04-05]. http://eprint.iacr.org/2012/144.pdf. |
[1] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
[2] | Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE. Differential and linear characteristic analysis of full-round Shadow algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3839-3843. |
[3] | Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN. Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3717-3722. |
[4] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[5] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[6] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[7] | Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity management scheme based on identity-based proxy re-encryption [J]. Journal of Computer Applications, 2024, 44(12): 3723-3730. |
[8] |
DENG Yilin, YU Fajiang.
Pseudo-random number generator based on LSTM and separable self-attention mechanism#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[9] | . Correlation power analysis of advanced encryption standard algorithm based on uniform manifold approximation and projection [J]. Journal of Computer Applications, 0, (): 0-0. |
[10] | . Dynamic searchable encryption scheme based on puncture pseudorandom function [J]. Journal of Computer Applications, 0, (): 0-0. |
[11] | . fedPF: Federated learning for personalization and fairness [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | . Review of research on conflict-based cache side-channel attacks and eviction sets [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . Secure and efficient frequency estimation method based on shuffled differential privacy [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | . Blockchain-based model for notarization of simulation testing data in autonomous driving [J]. Journal of Computer Applications, 0, (): 0-0. |
[15] | . Fine-grained result verifiable searchable encryption scheme with designated tester in cloud [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||