MA39664B1 - A practical method of fully homomorphic and verifiable encryption. - Google Patents
A practical method of fully homomorphic and verifiable encryption.Info
- Publication number
- MA39664B1 MA39664B1 MA39664A MA39664A MA39664B1 MA 39664 B1 MA39664 B1 MA 39664B1 MA 39664 A MA39664 A MA 39664A MA 39664 A MA39664 A MA 39664A MA 39664 B1 MA39664 B1 MA 39664B1
- Authority
- MA
- Morocco
- Prior art keywords
- ring
- cryptosystem
- lipschitz
- cryptograms
- modulo
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 2
- 238000004364 calculation method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
La présente invention concerne un cryptosystème entièrement homomorphe efficace basé sur une nouvelle transformée homomorphe et probabiliste entre l’anneau z/2z (anneau des entiers résidus modulo 2) et l’anneau des entiers de lipschitz modulaire. Notre cryptosystème est apte à traiter des messages clairs sous forme de bits en entrée et fournir des cryptogrammes sous forme de matrices de quaternions de lipschitz modulo un grand nombre entier naturel pair $ d’une manière non déterministe. La sécurité dudit cryptosystème est basée sur la difficulté de résoudre un système d’équations polynomiales multi variées dans un anneau non commutatif. Ce cryptosystème permet de réduire davantage le temps de calcul des multiplications chez les algorithmes de cryptage entièrement homomorphe (eh), comme il permet de minimiser la taille d’une clé secrète et de réduire l’expansion des cryptogrammes.The present invention relates to an efficient homomorphic cryptosystem based on a new homomorphous and probabilistic transform between the z / 2z ring (ring of integer modulo 2 residues) and the ring of modular Lipschitz integers. Our cryptosystem is able to process clear messages in the form of input bits and provide cryptograms in the form of quaternion matrices of Lipschitz modulo a large natural integer even $ in a non-deterministic way. The security of said cryptosystem is based on the difficulty of solving a system of multivariate polynomial equations in a noncommutative ring. This cryptosystem makes it possible to further reduce the calculation time of the multiplications in fully homomorphic (eh) encryption algorithms, as it makes it possible to minimize the size of a secret key and to reduce the expansion of cryptograms.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MA39664A MA39664B1 (en) | 2016-12-30 | 2016-12-30 | A practical method of fully homomorphic and verifiable encryption. |
| PCT/MA2018/050005 WO2018124869A1 (en) | 2016-12-30 | 2018-02-28 | Quaternion-based, efficient fully-homomorphic cryptosystem |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MA39664A MA39664B1 (en) | 2016-12-30 | 2016-12-30 | A practical method of fully homomorphic and verifiable encryption. |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MA39664B1 true MA39664B1 (en) | 2018-09-28 |
Family
ID=61972184
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MA39664A MA39664B1 (en) | 2016-12-30 | 2016-12-30 | A practical method of fully homomorphic and verifiable encryption. |
Country Status (2)
| Country | Link |
|---|---|
| MA (1) | MA39664B1 (en) |
| WO (1) | WO2018124869A1 (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11032061B2 (en) * | 2018-04-27 | 2021-06-08 | Microsoft Technology Licensing, Llc | Enabling constant plaintext space in bootstrapping in fully homomorphic encryption |
| CN109164702B (en) * | 2018-07-26 | 2021-09-14 | 西北工业大学 | Self-adaptive multivariable generalized supercoiling method |
| CN110418028B (en) * | 2019-06-21 | 2021-03-30 | 首都师范大学 | Image encryption method and device based on cascade transformation |
| CN110991620A (en) * | 2019-12-11 | 2020-04-10 | 上海交通大学 | A Novel Neural Network Module with Privacy Protection |
| FR3105684B1 (en) * | 2019-12-20 | 2022-12-23 | Idemia France | CRYPTOGRAPHIC PROCESSING METHOD, ELECTRONIC DEVICE AND ASSOCIATED COMPUTER PROGRAM |
| CN111064558B (en) * | 2020-01-09 | 2023-04-07 | 浙江理工大学 | Homomorphic encryption matrix continuous multiplication secure outsourcing method based on cloud computing |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8630422B2 (en) | 2009-11-10 | 2014-01-14 | International Business Machines Corporation | Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus |
| CN104509024B (en) | 2012-07-26 | 2018-02-27 | Nds有限公司 | Method and system for homomorphically randomizing inputs |
-
2016
- 2016-12-30 MA MA39664A patent/MA39664B1/en unknown
-
2018
- 2018-02-28 WO PCT/MA2018/050005 patent/WO2018124869A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018124869A1 (en) | 2018-07-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MA39664B1 (en) | A practical method of fully homomorphic and verifiable encryption. | |
| JP6488847B2 (en) | Relational encryption | |
| US12034838B2 (en) | Method and device to protect a cryptographic exponent | |
| CN103810664B (en) | A kind of information concealing method and device | |
| WO2016206504A1 (en) | Data encryption method, decryption method and apparatus | |
| WO2017004790A1 (en) | Cryptographic decoding method of image coding system based on double random phase and device utilizing same | |
| Shen et al. | Group public key encryption supporting equality test without bilinear pairings | |
| EP2742644A1 (en) | Encryption and decryption method | |
| MA39511A1 (en) | An efficient homomorphic cryptosysteme based on quaternions. | |
| Abd El-Latif et al. | Information hiding using artificial DNA sequences based on Gaussian kernel function | |
| Dolmeta et al. | Hardware architecture for CRYSTALS-Kyber post-quantum cryptographic SHA-3 primitives | |
| CN115834163A (en) | Method, device, equipment and storage medium for generating secret key of encrypted data | |
| Man et al. | Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras | |
| Sharma et al. | Data encryption using advanced encryption standard with key generation by elliptic curve diffie-hellman | |
| Rajakumar et al. | A novel scheme for encryption and decryption of 3D point and mesh cloud data in cloud computing | |
| Hazzazi et al. | Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF (2 n). | |
| Alshekly et al. | A Novel parallel gray image cryptosystem based on Hyperchaotic System and Learning with Error Post Quantum Cryptography | |
| JP6000188B2 (en) | KEY EXCHANGE DEVICE, KEY EXCHANGE SYSTEM, KEY EXCHANGE METHOD, AND PROGRAM | |
| Gaffar et al. | Image encryption using gingerbreadman map and rc4a stream cipher | |
| Petukhova et al. | RSA cryptosystem for dedekind rings | |
| Saraswathi et al. | A novel stream cipher using pesudo random binary sequence generator for medical image encryption | |
| Liu et al. | A color image encryption algorithm based on DNA computation and Chen system | |
| Rabah | Review of methods for integer factorization applied to cryptography | |
| JP4796602B2 (en) | Method and apparatus for secure communication between cryptographic systems using RTC | |
| Biswas et al. | A novel image encryption technique using one dimensional chaotic map and circular shift technique |