西安电子科技大学学报

• 研究论文 • 上一篇    下一篇

利用身份的全同态加密函数库设计方法

韩鹍1,2;张海林1;辛丹2;吴波2;康元基2   

  1. (1. 西安电子科技大学 通信工程学院,陕西 西安 710071;
    2. 西安通信学院 信息安全系,陕西 西安 710106)
  • 收稿日期:2016-11-06 出版日期:2017-08-20 发布日期:2017-09-29
  • 作者简介:韩鹍(1980-),男,副教授,硕士, E-mail: hankundsp@163.com
  • 基金资助:

    国家自然科学基金资助项目(61401331);国家重点研发计划政府间专项资助项目(2016YFE0123000)

Design method of an identity-based fully homomorphic encryption library

HAN Kun1,2;ZHANG Hailin1;XIN Dan2;WU Bo2;KANG Yuanji2   

  1. (1. School of Telecommunications Engineering, Xidian Univ., Xi'an 710071, China;
    2. Dept. of Information Security, Xi 'an Communication Institute, Xi 'an 710106, China)
  • Received:2016-11-06 Online:2017-08-20 Published:2017-09-29

摘要:

针对当前全同态加密体制公钥尺寸过大、加解密效率低的问题,研究了基于身份的全同态加密体制并设计了相应的全同态加密函数库.首先,基于简单加密算术库中的基础定义和运算,实现了基于身份的全同态加密函数库; 然后,给出了整数和字符串转化为明文多项式的编码方式,分析了使用基于身份的全同态加密函数库时的参数选择方法; 最后,为用户设计了体制参数的自动生成工具,以满足效率和安全性需求.实验证明,基于身份的全同态加密体制具有密文运算效率高且无须公钥证书的优点,设计的函数库为基于身份的全同态加密体制的实际应用奠定了基础.

关键词: 全同态加密, 利用身份加密, 函数库设计, 云计算, 加密

Abstract:

To avoid the weaknesses of the present fully homomorphic encryption algorithms which have a large public key and low calculation efficiency, the identity-based homomorphic encryption scheme is studied and the corresponding function library is designed. First, the IHEL(Identity-based Homomorphic Encryption Library) is constructed based on the basic definitions and operations of the SEAL (Simple Encrypted Arithmetic Library). Then, the encoding method for the integer and string into the plaintext polynomial is given and the parameters selection is analyzed. Last, an automatic parameter generation tool for the users is designed to meet the needs of safety and efficiency. The identity-based homomorphic encryption scheme has high calculation efficiency and does not need a public key certificate. The corresponding function library IHEL lays a foundation for the practical application of the identity-based homomorphic encryption scheme.

Key words: fully homomorphic encryption, identity-based encryption, function library design, cloud computing, encryption