首页 | 本学科首页   官方微博 | 高级检索  
     检索      

A Method of Homomorphic Encryption
作者姓名:XIANG Guang-li~    CHEN Xin-meng~  ZHU Ping~  MA Jie~  .
作者单位:XIANG Guang-li~ 1,2,CHEN Xin-meng~2,ZHU Ping~3,MA Jie~ 2 1. Department of Computer,Hubei Institute of Education,Wuhan 430060,Hubei,China; 2. School of Computer,Wuhan University,Wuhan 430072,Hubei,China; 3. School of Information,Zhongnan University of Economics and Law,Wuhan 430060,Hubei,China
基金项目:Supported by the National Natural Science Foun-dation of China (90104005)
摘    要:0 IntroductionWittahliz tahtieo nde,vtehloepi mmepnotrt oanfc ien foofr tmhaet isoenciuzraittiyo nan adnsdec driegciy-of informationis increasingly recognized. Ordinary encryptioncan’t compute the ciphertext data, however , homomorphicencryption scheme can doit andfurthermore encrypt operationvalue automatically. Therefore, homomorphic encryptionscheme can be widely used in multi-party computation,elec-tronic voting,and mobile cryptography1-3].Inthis paper ,theinterrelated technology of homo…

收稿时间:26 April 2005

A Method of Homomorphic Encryption
XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184.
Authors:XIANG Guang-li  CHEN Xin-meng  ZHU Ping  MA Jie
Institution:(1) Department of Computer, Hubei Institute of Education, 430060 Wuhan, Hubei, China;(2) School of Computer, Wuhan University, 430072 Wuhan, Hubei, China;(3) School of Information, Zhongnan University of Economics and Law, 430060 Wuhan, Hubei, China
Abstract:The existing homomorphic encryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined—Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets. Foundation item: Supported by the National Natural Science Foundation of China (90104005). Biography: XIANG Guang-li (1973-), male, Ph. D. candidate, research direction: parallel and distributed computing, mobile agent, information security.
Keywords:security  private homomorphism  similar modul  homomorphic encryption scheme
本文献已被 CNKI 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号