基于NTRU的全同态加密方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Fully Homomorphic Encryption Scheme Based on NTRU
  • 作者:李子臣 ; 张卷美 ; 杨亚涛 ; 张峰娟
  • 英文作者:LI Zi-chen;ZHANG Juan-mei;YANG Ya-tao;ZHANG Feng-juan;Beijing Institute of Graphic Communication;Beijing Electronic Science & Technology Institute;School of Telecommunications Engineering,Xidian University;
  • 关键词:全同态加密 ; 公钥密码体制NTRU ; 高斯抽样算法 ; 可证明安全
  • 英文关键词:fully homomorphic encryption;;number theory research unit;;Gaussian abstraction algorithm;;provable security
  • 中文刊名:DZXU
  • 英文刊名:Acta Electronica Sinica
  • 机构:北京印刷学院;北京电子科技学院;西安电子科技大学通信工程学院;
  • 出版日期:2018-04-15
  • 出版单位:电子学报
  • 年:2018
  • 期:v.46;No.422
  • 基金:国家自然科学基金(No.61370188);; “十三五”国家密码发展基金(No.MMJJ20170110)
  • 语种:中文;
  • 页:DZXU201804023
  • 页数:7
  • CN:04
  • ISSN:11-2087/TN
  • 分类号:173-179
摘要
本文提出一种基于公钥密码体制(Number Theory Research Unit,NTRU)选择明文攻击(Chosen Plaintext Attack,CPA)可证明安全的全同态加密方案.首先,对NTRU的密钥生成算法进行改进,通过格上的高斯抽象算法生成密钥对,避免了有效的格攻击,同时,没有改变密钥的分布.然后,基于改进的NTRU加密算法,利用Flattening技术,构造了一个全同态加密体制,并在标准模型下证明方案是选择明文攻击不可区分性IND-CPA安全的.
        A fully homomorphic encrgption scheme was presented based on number theory research unit( NTRU),which is provable security about indistinguishable chosen plaintext attack( IND-CPA). Firstly, to avoid the effective lattice attacks,we modified the key generation algorithm of NTRU by Gaussian abstraction algorithm of lattices, and the distribution of the key is not changed. Then,we proposed a new homomorphic encryption scheme based on the improved NTRU encryption algorithm by using the Flattening technique. Its IND-CPA security was proved strictly under the standard model.
引文
[1]RIVEST R L,ADLEMAN L,DERTOUZOS M L.On data banks and privacy homomorphisms[A].Foundations of Secure Computation[C].USA:Academia Press,1978.169-179.
    [2]GAMAL T E.A public key cryptosystem and a signature scheme based on discrete logarithms[A].Proceedings of CRYPTO 84 on Advances in Cryptology[C].New York:Springer-Verlag,1985.10-18.
    [3]GOLDWASSER S,MICALI S.Probabilistic encryption&how to play mental poker keeping secret all partial information[A].Proceedings of Fourteenth ACM Symposium on Theory of Computing[C].New York:ACM,1982.365-377.
    [4]PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[J].Lecture Notes in Computer Science,1999,547(1):223-238.
    [5]RIVEST R,SHAMIR A,ADLEMAN L M.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,26(2):96-99.
    [6]GENTRY C.A Fully Homomorphic Encryption Scheme[D].USA:Stanford University,2009.
    [7]DIJK M V,GENTRY C,HALEVI S,et al.Fully homomorphic encryption over the integers[J].Lecture Notes in Computer Science,2009,(4):24-43.
    [8]BRAKERSKI Z,VAIKUNTANATHAN V.Efficient fully homomorphic encryption from(standard)LWE[A].Proceedings of Foundations of Computer Science[C].USA:IEEE,2010.97-106.
    [9]MANDAL A,TIBOUCHI M.Fully homomorphic encryption over the integers w ith shorter public keys[A].Proceedings of Conference on Advances in Cryptology[C].New York:Springer-Verlag,2011.487-504.
    [10]CORON J,NACCACHE D,TIBOUCHI M.Public key compression and modulus sw itching for fully homomorphic encryption over the integers[A].Proceedings of International Conference on Theory and Applications of Cryptographic Techniques[C].New York:Springer-Verlag,2012.446-464.
    [11]YAGISAWA M.Fully homomorphic encryption without bootstrapping[J].ACM Transactions on Computation Theory,2015,6(3):1-36.
    [12]HALEVI S,SHOUP V.HElib,Homomorphic Encryption Library[OL].http://shaih.github.io/HElib/,2012.
    [13]李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803.LI Shun-dong,WANG Dao-shun.Efficient secure multiparty computation based on homomorphic encryption[J].Acta Electronica Sinica,2013,41(4):798-803.(in Chinese)
    [14]辛丹,顾纯祥,郑永辉,光焱,康元基.利用RLWE构造基于身份的全同态加密体制[J].电子学报,2016,44(12):442887-2893.XIN Dan,GU Chun-xiang,ZHENG Yong-hui,GUANG Yan,KANG Yuan-ji.Identity-based fully homomorphic encryption from ring learning w ith errors problem[J].Acta Electronica Sinica,2016,44(12):2887-2893.(in Chinese)
    [15]CHEN H,YUPU H,LIAN Z.Double batch for RLWEbased leveled fully homomorphic encryption[J].Chinese Journal of Electronics,2015,24(3):661-666.
    [16]HOFFSTEIN J,PIPHER J,SILVERMAN J H.NTRU:a ring-based public key cryptosystem[A].Proceedings of the 3rd International Symposium on Algorithmic Number Theory[C].Berlin:Springer,1998.267-288.
    [17]杨铭,曹云飞.NTRU的应用前景分析及展望[J].信息安全与通信保密,2007,(8):36-38.YANG M ing,CAO Yun-fei.Application prospect and analysis of NTRU[J].Information Security and Communications Privacy,2007,(8):36-38.(in Chinese)
    [18]TROMER E,VAIKUNTANATHAN V.On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption[A].Proceedings of Forty-Fourth ACM Symposium on Theory of Computing[C].New York,ACM,2012.1219-1234.
    [19]GENTRY C,SAHAI A,WATERS B.Homomorphic Encryption from Learning w ith Errors:Conceptually-Simpler,Asymptotically-Faster,Attribute-Based[M].Berlin:Springer,2013.75-92.
    [20]GENTRY C,PEIKERT C,VAIKUNTANATHAN V.Trapdoors for hard lattices and new cryptographic constructions[A].Proceedings of DBLP[C].Germany:DBLP,2008.197-206.
    [21]LYUBASHEVSHY V,PEIKERT C,REGEV O.On ideal lattice and learning w ith errors over rings[A].Proceedings of Eurocrypt 2010[C].New York:Springer-Verlag,2010.1-23.
    [22]张建航,贺健,胡予濮.基于R-LWE问题的新型NTRU加密方案[J].电子科技,2012,25(5):76-78.ZHANG Jian-hang,HE Jian,HU Yu-pu.A novel NTRU encryption scheme based on R-LWE problem[J].Electronic Science and Technology,2012,25(5):76-78.(in Chinese)
    [23]STEINFELD R.Making NTRU as secure as worst-case problems over ideal lattices[A].Proceedings of International Conference on Theory and Applications of Cryptographic Techniques:Advances in Cryptology[C].New York:Springer-Verlag,2011.27-47.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700