[go: up one dir, main page]

MA39664B1 - A practical method of fully homomorphic and verifiable encryption. - Google Patents

A practical method of fully homomorphic and verifiable encryption.

Info

Publication number
MA39664B1
MA39664B1 MA39664A MA39664A MA39664B1 MA 39664 B1 MA39664 B1 MA 39664B1 MA 39664 A MA39664 A MA 39664A MA 39664 A MA39664 A MA 39664A MA 39664 B1 MA39664 B1 MA 39664B1
Authority
MA
Morocco
Prior art keywords
ring
cryptosystem
lipschitz
cryptograms
modulo
Prior art date
Application number
MA39664A
Other languages
French (fr)
Inventor
EL Kettani Mohamed Dafir ECH-CHERIF
YAHYAOUI Ahmed EL
Original Assignee
Univ Mohammed V Rabat
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Mohammed V Rabat filed Critical Univ Mohammed V Rabat
Priority to MA39664A priority Critical patent/MA39664B1/en
Priority to PCT/MA2018/050005 priority patent/WO2018124869A1/en
Publication of MA39664B1 publication Critical patent/MA39664B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un cryptosystème entièrement homomorphe efficace basé sur une nouvelle transformée homomorphe et probabiliste entre l’anneau z/2z (anneau des entiers résidus modulo 2) et l’anneau des entiers de lipschitz modulaire. Notre cryptosystème est apte à traiter des messages clairs sous forme de bits en entrée et fournir des cryptogrammes sous forme de matrices de quaternions de lipschitz modulo un grand nombre entier naturel pair $ d’une manière non déterministe. La sécurité dudit cryptosystème est basée sur la difficulté de résoudre un système d’équations polynomiales multi variées dans un anneau non commutatif. Ce cryptosystème permet de réduire davantage le temps de calcul des multiplications chez les algorithmes de cryptage entièrement homomorphe (eh), comme il permet de minimiser la taille d’une clé secrète et de réduire l’expansion des cryptogrammes.The present invention relates to an efficient homomorphic cryptosystem based on a new homomorphous and probabilistic transform between the z / 2z ring (ring of integer modulo 2 residues) and the ring of modular Lipschitz integers. Our cryptosystem is able to process clear messages in the form of input bits and provide cryptograms in the form of quaternion matrices of Lipschitz modulo a large natural integer even $ in a non-deterministic way. The security of said cryptosystem is based on the difficulty of solving a system of multivariate polynomial equations in a noncommutative ring. This cryptosystem makes it possible to further reduce the calculation time of the multiplications in fully homomorphic (eh) encryption algorithms, as it makes it possible to minimize the size of a secret key and to reduce the expansion of cryptograms.

MA39664A 2016-12-30 2016-12-30 A practical method of fully homomorphic and verifiable encryption. MA39664B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MA39664A MA39664B1 (en) 2016-12-30 2016-12-30 A practical method of fully homomorphic and verifiable encryption.
PCT/MA2018/050005 WO2018124869A1 (en) 2016-12-30 2018-02-28 Quaternion-based, efficient fully-homomorphic cryptosystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MA39664A MA39664B1 (en) 2016-12-30 2016-12-30 A practical method of fully homomorphic and verifiable encryption.

Publications (1)

Publication Number Publication Date
MA39664B1 true MA39664B1 (en) 2018-09-28

Family

ID=61972184

Family Applications (1)

Application Number Title Priority Date Filing Date
MA39664A MA39664B1 (en) 2016-12-30 2016-12-30 A practical method of fully homomorphic and verifiable encryption.

Country Status (2)

Country Link
MA (1) MA39664B1 (en)
WO (1) WO2018124869A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11032061B2 (en) * 2018-04-27 2021-06-08 Microsoft Technology Licensing, Llc Enabling constant plaintext space in bootstrapping in fully homomorphic encryption
CN109164702B (en) * 2018-07-26 2021-09-14 西北工业大学 Self-adaptive multivariable generalized supercoiling method
CN110418028B (en) * 2019-06-21 2021-03-30 首都师范大学 Image encryption method and device based on cascade transformation
CN110991620A (en) * 2019-12-11 2020-04-10 上海交通大学 A Novel Neural Network Module with Privacy Protection
FR3105684B1 (en) * 2019-12-20 2022-12-23 Idemia France CRYPTOGRAPHIC PROCESSING METHOD, ELECTRONIC DEVICE AND ASSOCIATED COMPUTER PROGRAM
CN111064558B (en) * 2020-01-09 2023-04-07 浙江理工大学 Homomorphic encryption matrix continuous multiplication secure outsourcing method based on cloud computing

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8630422B2 (en) 2009-11-10 2014-01-14 International Business Machines Corporation Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus
CN104509024B (en) 2012-07-26 2018-02-27 Nds有限公司 Method and system for homomorphically randomizing inputs

Also Published As

Publication number Publication date
WO2018124869A1 (en) 2018-07-05

Similar Documents

Publication Publication Date Title
MA39664B1 (en) A practical method of fully homomorphic and verifiable encryption.
JP6488847B2 (en) Relational encryption
US12034838B2 (en) Method and device to protect a cryptographic exponent
CN103810664B (en) A kind of information concealing method and device
WO2016206504A1 (en) Data encryption method, decryption method and apparatus
WO2017004790A1 (en) Cryptographic decoding method of image coding system based on double random phase and device utilizing same
Shen et al. Group public key encryption supporting equality test without bilinear pairings
EP2742644A1 (en) Encryption and decryption method
MA39511A1 (en) An efficient homomorphic cryptosysteme based on quaternions.
Abd El-Latif et al. Information hiding using artificial DNA sequences based on Gaussian kernel function
Dolmeta et al. Hardware architecture for CRYSTALS-Kyber post-quantum cryptographic SHA-3 primitives
CN115834163A (en) Method, device, equipment and storage medium for generating secret key of encrypted data
Man et al. Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Sharma et al. Data encryption using advanced encryption standard with key generation by elliptic curve diffie-hellman
Rajakumar et al. A novel scheme for encryption and decryption of 3D point and mesh cloud data in cloud computing
Hazzazi et al. Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF (2 n).
Alshekly et al. A Novel parallel gray image cryptosystem based on Hyperchaotic System and Learning with Error Post Quantum Cryptography
JP6000188B2 (en) KEY EXCHANGE DEVICE, KEY EXCHANGE SYSTEM, KEY EXCHANGE METHOD, AND PROGRAM
Gaffar et al. Image encryption using gingerbreadman map and rc4a stream cipher
Petukhova et al. RSA cryptosystem for dedekind rings
Saraswathi et al. A novel stream cipher using pesudo random binary sequence generator for medical image encryption
Liu et al. A color image encryption algorithm based on DNA computation and Chen system
Rabah Review of methods for integer factorization applied to cryptography
JP4796602B2 (en) Method and apparatus for secure communication between cryptographic systems using RTC
Biswas et al. A novel image encryption technique using one dimensional chaotic map and circular shift technique