|
- 2016
一种全同态加密的安全内积计算方案
|
Abstract:
在云计算环境下密文top-k检索的众多方法中,该文聚焦于同态加密方法,该公钥加密方法具有不解密就能对密文进行操作的优点。在密文top-k查询中,内积相似性是度量索引向量和查询向量的相似性的最常用的一个指标。该文提出一个安全计算两向量内积相似性的方案,该方案使用基于环上错误学习问题的批处理和打包的同态加密来保护隐私。与其他方法相比,该方案具有通信代价低和计算代价低的优点。
[1] | DING J, TAO C. A new algorithm for solving the general approximate common divisors problem and cryptanalysis of the fhe based on the gacd problem[DB/OL].[2014-04-07]. http://eprint.iacr.org/2014/042. |
[2] | WITTEN H, MOFFAT A,BELL T C. Managing gigabytes:Compressing and indexing documents and images[M]. San Francisco:Morgan Kaufmann Publishing, 1999. |
[3] | GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing-STOC'09.[S.l.]:ACM Press, 2009:169-178. |
[4] | SMART N P, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[C]//Public Key Cryptography-PKC 2010. Berlin:Springer, 2010:420-443. |
[5] | GU Chun-sheng. Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's fully homomorphic encryption[J]. International Journal of Security & Its Applications, 2012, 6(2):176-184. |
[6] | GENTRY C, HALEVI S. Implementing Gentry's fully-homomorphic encryption scheme[C]//Advances in Cryptology-EUROCRYPT 2011. Berlin:Springer, 2011:129-148. |
[7] | YU J, LU P, ZHU Y, et al. Towards secure multi-keyword top-k retrieval over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(4):239-250. |
[8] | CORON J S, MANDAL A, NACCACHE D, et al. Fully homomorphic encryption over the integers with shorter public keys[C]//Advances in Cryptology-CRYPTO 2011. Berlin:Springer, 2011:487-504. |
[9] | YASUDA M, SHIMOYAMA T, KOGURE J, et al. Packed homomorphic encryption based on ideal lattices and its application to biometrics[J]. Security Engineering and Intelligence Informatics, 2013(8128):55-74. |
[10] | NAEHRIG M, LAUTER K, VAIKUNTANATHAN V. Can homomorphic encryption be practical?[C]//Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. Rome:ACM Press, 2011:113-124. |
[11] | SMART N P, VERCAUTEREN F. Fully homomorphic SIMD operations[J]. Designs, Codes and Cryptography, 2014, 71(1):57-81. |
[12] | STEHLE D, STEINFELD R. Faster fully homomorphic encryption[C]//Advances in Cryptology-ASIACRYPT 2010. Berlin:Springer, 2010:377-394. |