计算机科学 ›› 2025, Vol. 52 ›› Issue (11): 408-414.doi: 10.11896/jsjkx.241100188
谢振杰1,2, 刘奕明3, 尹小康1, 刘胜利1, 张永光4,5
XIE Zhenjie1,2, LIU Yiming3, YIN Xiaokang1, LIU Shengli1, ZHANG Yongguang4,5
摘要: 在云计算环境下,传统加密方案在保护数据机密性的同时,也使密文丧失了可计算性。同态加密解决了这一矛盾,已被广泛应用于数据聚合、安全多方计算、联邦学习等隐私计算领域。因此,以基于标识密码体制的国密算法SM9加密算法为基础,构造了具有加法同态性质的标识加密方案,细致推导了方案的正确性和加法同态性,从q-BCAA1和DDH困难问题出发证明了方案具有IND-CPA安全性,并对改进的消息恢复算法进行了详细描述。测试结果表明,提出的加法同态加密方案的加密效率相较于同类方案提升了42%,解密效率提升了20%~62%。
中图分类号:
| [1]GARG S,GUPTA D.Efficient round optimal blind signatures [C]//Proceedings of the EUROCRYPT 2014.2014:477-495. [2]CHILLOTTI I,GAMA N,GEORGIEVA M,et al.TFHE:Fast fully homomorphic encryption over the torus[J].Journal of Cryptology,2020,33(1):34-91. [3]JOYE M,PAILLIER P.Blind rotation in fully homomorphic encryption with extended keys [C]//Proc eedings of the 2022 Cyber Security,Cryptology,and Machine Learning.2022:1-18. [4]XIANG B W,ZHANG J,DENG Y,et al.Fast blind rotation for bootstrapping FHEs [C]//Proceedings of the 2023 Annual International Cryptology Conference.2023:3-36. [5]CHEN H,CHILLOTTI I,SONG Y Z.Improved bootstrapping for approximate homomorphic encryption [C]//Proceedings of the EUROCRYPT 2019.2019:34-54. [6]KANG H,LEE J,LEE Y,et al.Bootstrapping on SEAL[EB/OL].https://eprint.iacr.org/2020/1594.pdf. [7]HAN K,KI D.Better bootstrapping for approximate homomorphic encryption [C]//Proceedings of the 2020 Cryptographers Track at the RSA Conference.2020:364-390. [8]JUNG W,KIMW,AHN J H,et al.Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs[EB/OL].https://eprint.iacr.org/2021/508.pdf. [9]BAI L F,ZHU Y F,LI Y J,et al.Research progress of fully homomorphic encryption[J].Journal of Computer Research and Development,2024,61(5):3069-3087. [10]DAI Y R,ZHANG J,XIANG B W,et al.Overview on the research status and development route of fully homomorphic encryption technology[J].Journal of Electronics & Information Technology,2024,46(5):1774-1789. [11]BIAN S,MAO R,ZHU R Q,et al.A survey on software-hardware acceleration for fully homomorphic encryption[J].Journal of Electronics & Information Technology,2024,46(5):1790-1805. [12]XU K X,WANG L P.Research progress on multi-party fully homomorphic encryption[J].Journal of Cryptologic Research,2024,11(4):719-739. [13]PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes [C]//Proceedings of the EUROCRYPT 1999.1999:223-238. [14]CHEN Y,MA X C,TANG C,et al.PGC:Decentralized confidential payment system with auditability [C]//Proceedings of the 2020 European Symposium on Research in Computer Security.2020:591-610. [15]CRAMER R,GENNARO R,SCHOENMAKERS B.A secure and optimally efficient multi-authority election scheme[J].European Transactions on Telecommunications,1997,8(5):481-490. [16]BONEH D,GOH E J,NISSIM K.Evaluating 2-DNF formulas on ciphertexts [C]//Proceedings of the 2nd Theory of Crypto-graphy Conference.2005:325-341. [17]GUAN Z T,SI G L,ZHANG X S,et al.Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities[J].IEEE Communications Ma-gazine,2018,56(7):82-88. [18]MOHAMMADALI A,HAGHIGHI M S.A privacy-preserving homomorphic scheme with multiple dimensions and fault tolerance for metering data aggregation in smart grid[J].IEEE Transactions on Smart Grid,2021,12(6):5212-5220. [19]YANG Q,LIU Y,CHEN T J,et al.Federated machine lear-ning:Concept and applications[J].ACM Transactions on Intelligent Systems and Technology,2019,10(2):1-19. [20]GB/T 38635.1-2020,Identity-based cryptographic algorithms SM9-Part 1:General[S].Beijing:China Standard Press,2020. [21]GB/T 38635.2-2020,Identity-based cryptographic algorithms SM9-Part 2:Algorithms[S].Beijing:China Standard Press,2020. [22]TANG F,LING G W,SHAN J Y.Additive homomorphic encryption schemes based on SM2 and SM9[J].Journal of Cryptologic Research,2022,9(3):535-549. [23]TANG F,LING G W,CAI C C,et al.Solving small exponential ECDLP in EC-based additively homomorphic encryption and applications[J].IEEE Transactions on Information Forensics and Security,2023,18:3517-3530. [24]QIN T H,WANG Z B,LIU Y,et al.Homomorphic encryption scheme based on commercial cryptography SM9[J].Journal of Information Securyity Research,2024,10(6):513-518. [25]WANG M D,HE W G,LI J,et al.Optimal design of R-ate pair in SM9 algorithm[J].Communications Technology,2020,53(9):2241-2244. [26]BASDDSA.hggm-Domestic cryptographic algorithm SM2/SM3/SM4/SM9/ZUC-Complete source code for Python implementation[EB/OL].(2024-07-11) [2024-08-15].https://gitee.com/basddsa/hggm. |
|
||