首页 | 本学科首页   官方微博 | 高级检索  
     

A Method of Homomorphic Encryption
引用本文:XIANG Guang-li~ 1,2,CHEN Xin-meng~2,ZHU Ping~3,MA Jie~ 2 1. Department of Computer,Hubei Institute of Education,Wuhan 430060,Hubei,China, 2. School of Computer,Wuhan University,Wuhan 430072,Hubei,China, 3. School of Information,Zhongnan University of Economics and Law,Wuhan 430060,Hubei,China. A Method of Homomorphic Encryption[J]. 武汉大学学报:自然科学英文版, 2006, 11(1): 181-184. DOI: 10.1007/BF02831727
作者姓名:XIANG Guang-li~ 1  2  CHEN Xin-meng~2  ZHU Ping~3  MA Jie~ 2 1. Department of Computer  Hubei Institute of Education  Wuhan 430060  Hubei  China   2. School of Computer  Wuhan University  Wuhan 430072  Hubei  China   3. School of Information  Zhongnan University of Economics and Law  Wuhan 430060  Hubei  China
作者单位:XIANG Guang-li~ 1,2,CHEN Xin-meng~2,ZHU Ping~3,MA Jie~ 2 1. Department of Computer,Hubei Institute of Education,Wuhan 430060,Hubei,China; 2. School of Computer,Wuhan University,Wuhan 430072,Hubei,China; 3. School of Information,Zhongnan University of Economics and Law,Wuhan 430060,Hubei,China
基金项目:Supported by the National Natural Science Foun-dation of China (90104005)
摘    要:0 IntroductionWittahliz tahtieo nde,vtehloepi mmepnotrt oanfc ien foofr tmhaet isoenciuzraittiyo nan adnsdec driegciy-of informationis increasingly recognized. Ordinary encryptioncan’t compute the ciphertext data, however , homomorphicencryption scheme can doit andfurthermore encrypt operationvalue automatically. Therefore, homomorphic encryptionscheme can be widely used in multi-party computation,elec-tronic voting,and mobile cryptography[1-3].Inthis paper ,theinterrelated technology of homo…

收稿时间:2005-04-26

A Method of Homomorphic Encryption
XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie. A Method of Homomorphic Encryption[J]. Wuhan University Journal of Natural Sciences, 2006, 11(1): 181-184. DOI: 10.1007/BF02831727
Authors:XIANG Guang-li  CHEN Xin-meng  ZHU Ping  MA Jie
Affiliation:(1) Department of Computer, Hubei Institute of Education, 430060 Wuhan, Hubei, China;(2) School of Computer, Wuhan University, 430072 Wuhan, Hubei, China;(3) School of Information, Zhongnan University of Economics and Law, 430060 Wuhan, Hubei, China
Abstract:The existing homomorphic encryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined—Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets. Foundation item: Supported by the National Natural Science Foundation of China (90104005). Biography: XIANG Guang-li (1973-), male, Ph. D. candidate, research direction: parallel and distributed computing, mobile agent, information security.
Keywords:security  private homomorphism  similar modul  homomorphic encryption scheme
本文献已被 CNKI 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号