Computer Science ›› 2022, Vol. 49 ›› Issue (5): 341-346.doi: 10.11896/jsjkx.210300089
• Information Security • Previous Articles Next Articles
QIN Xiao-yue, HUANG Ru-wei, YANG Bo
CLC Number:
[1]LI R Q,JIA C F.A multi key homomorphic encryption scheme based on NTRU[J].Acta Cryptologica Sinica,2020,7 (5):683-697. [2]GENTRY C.Fully Homomorphic Encryption Using Ideal Lattices[J].Proceedings of the Annual Acm Symposium on Theory of Computing,2009,9(4):169-178. [3]BRAKERSKI Z.Fully homomorphic encryption without modulus switching from classical GapSVP[C]//Advances in Crypto-logy-CRYPTO,2012.Springer Berlin Heidelberg,2012:868-886. [4]GENTRY C,SAHAI A,WATERS B.Homomorphic encryption from learning with errors:Concept ually-simpler,Asymptotically faster,attribute based[C]//Advances in Cryptology(CRYPTO 2013).Berlin,Heidelberg:Springer,2013:75-92. [5]DORÖZ Y,SUNAR B.Flattening NTRU for Evaluation KeyFree Homomorphic Encryption[J].Journal of Mathematical Cryptology,2020,14(1):66-83. [6]LI Z C,ZHANG J M,YANG Y T,et al.A Fully homomorphic Encryption Scheme Based on NTRU[J].ACTA Electronica Si-nica,2018,46(4):938-944. [7]KHEDR A,GULAK G.SecureMed:Secure Medical Computa-tion Using GPU-Accelerated Homomorphic Encryption Scheme[J].IEEE J Biomed Health Inform,2018,22(2):597-606. [8]ALBRECHT M,BAI S,DUCAS L.A subfifield lattice attack on overstretched NTRU assumptions[C]//Proceedings of Annual Cryptology Conference.Cham:Springer,2016:153-178. [9]CHEONJ H,JEONG J,LEE C.An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without an encoding of zero[J].LMS Journal of Computation and Mathematics,2016,19(A):255-266. [10]SMART N P,VERCAUTEREN F.Fully homomorphic SIMD operations[J].Designs,Codes& Cryptography,2014,71:57-81. [11]MIGLIORE V,BONNORON G,FONTAINE C.Practical Pa-rameters for Somewhat Homomorphic Encryption (SHE) Schemes on Binary Circuits[J].IEEE Transactions on Computers,2018,67:1550-1560. [12]DORÖZ Y,HU Y,SUANR B.Homomorphic AES evaluationusing the modified LTV scheme[J].Designs,Codes and Cryptography,2016,80(2):333-358. [13]LŎPEZ-ALT A,TROMER E,VAIKUNTANATHAN V.On-the fly rnultiparty computation on the cloud via multikey fully homornorphic encryption[C]//Proceedings of the 44th Annual ACM Symposium on Theory of Comnputing.ACM,2012:1219-1234. [14]YU Y,XU G,WANG X.Provably Secure NTRU Instances over Prime Cyclotomic Rings[C]//IACR International Workshop on Public Key Cryptography.2017. [15]STEHLÉ D,STEINFELD R.Making NTRU as secure asworst-case problems over ideal lattices[C]//Springer-Verlag.2011. [16]QIN X Y,HUANG R W.Research on the homomorphic encryption of NTRU system[J/OL].Computer Application Research:1-8.[2021-02-22].https://doi.org/10.19734/j.issn.1001-3695.2020.07.0213. [17]RUDOLF L,HARALD N,COHN F M.Finite fields[M].Cambridge University Press,1997. [18]CHEN Y L.Cyclotomic polynomials over finite fields[J].Journal of Hubei Normal University (Natural Science Edition),2012,32 (2):1-5. [19]LYUBASHEVSKY V,PEIKERT C,REGEV O.On ideal lat-tices and learning with errors over rings[C]//Advances in Cryptology-EUROCRYPT 2010,29th Annual International Confe-rence on the Theory and Applications of Cryptographic Techniques.French Riviera:ACM,2010. [20]CHE X L,ZHOU H N,ZHOU T P,et al.Decryption structure of multi key homomorphic encryption scheme based on public key cryptosystem[J/OL].Computer Application:1-7.[2021-04-28].http://kns.cnki.net/kcms/detail/51.1307.TP.20200604.1434.002.html. [21]ZHOU H N,LI N B,CHE X L,et al.Multi key holomorphic scheme based on prime power order cyclotomic polynomial ring[J].Information Network Security,2020,20 (5):83-87. [22]CHEON J H,KIM J,LEE M S,et al.CRT-based fully homomorphic encryption over the integers[J].Information Sciences,2015,310:149-162. [23]ADRIANA L A,ERAN T,VINOD V.On-the-fly multipartycomputation on the cloud via multikey fully homomorphic encryption[C]//Proceedings of the 44th symposium on Theory of Computing.ACM,2012:1219-1234. [24]HOFFSTEIN J, SILVERMAN J.Optimizations for NTRU[J].Proceedings Public Key Cryptography & Computational Number Theory,2000. [25]LYUBASHEVSKY V,PEIKERT C,REGEV O.A toolkit for ring-LWE cryptography[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Heidelberg:Springer,2013:35-54. |
[1] | LI Meng-tian, HU Bin. RLWE-based Fully Homomorphic Encryption Scheme with Batch Technique [J]. Computer Science, 2019, 46(3): 209-216. |
[2] | SHI Jing-qi, YANG Geng, SUN Yan-jun, BAI Shuang-jie and MIN Zhao-e. Efficient Parallel Algorithm of Fully Homomorphic Encryption Supporting Operation of Floating-point Number [J]. Computer Science, 2018, 45(5): 116-122. |
[3] | MAO He-feng, HU Bin. Homomorphic Evaluation of Lightweight Block Cipher over Integers [J]. Computer Science, 2018, 45(11): 169-175. |
|