Efficient homomorphic encryption scheme for bilinear forms
    1.
    发明授权
    Efficient homomorphic encryption scheme for bilinear forms 有权
    双线性形式的高效同态加密方案

    公开(公告)号:US08861716B2

    公开(公告)日:2014-10-14

    申请号:US12749944

    申请日:2010-03-30

    IPC分类号: H04K1/00

    摘要: In one exemplary embodiment, a computer readable storage medium tangibly embodying a program of instructions executable by a machine for performing operations including: receiving information B to be encrypted as a ciphertext C in accordance with an encryption scheme having an encrypt function; and encrypting B in accordance with the encrypt function to obtain C, the scheme utilizes at least one public key A, where B, C, and A are matrices, the encrypt function receives as inputs A and B and outputs C as C→AS+pX+B (mod q), S is a random matrix, X is an error matrix, p is in integer, q is an odd prime number. In other exemplary embodiments, the encryption scheme includes a decrypt function that receives as inputs at least one private key T (a matrix) and C and outputs B as B=T−1·(TCTt mod q)·(Tt)−1 mod p.

    摘要翻译: 在一个示例性实施例中,一种有形地体现由机器执行的用于执行操作的指令程序的计算机可读存储介质,包括:根据具有加密功能的加密方案,接收要加密的信息B作为密文C; 并按照加密函数对B进行加密以获得C,该方案利用至少一个公钥A,其中B,C和A是矩阵,加密函数接收作为输入A和B,并将C作为C→AS + pX + B(mod q),S是随机矩阵,X是误差矩阵,p是整数,q是奇素数。 在其他示例性实施例中,加密方案包括解密功能,其接收至少一个私钥T(矩阵)和C的输入,并将B输出为B = T-1·(TCTt mod q)·(Tt)-1 mod p。

    Efficient Homomorphic Encryption Scheme For Bilinear Forms
    2.
    发明申请
    Efficient Homomorphic Encryption Scheme For Bilinear Forms 有权
    双线性形式的有效同态加密方案

    公开(公告)号:US20110243320A1

    公开(公告)日:2011-10-06

    申请号:US12749944

    申请日:2010-03-30

    IPC分类号: H04L9/30

    摘要: In one exemplary embodiment, a computer readable storage medium tangibly embodying a program of instructions executable by a machine for performing operations including: receiving information B to be encrypted as a ciphertext C in accordance with an encryption scheme having an encrypt function; and encrypting B in accordance with the encrypt function to obtain C, the scheme utilizes at least one public key A, where B, C, and A are matrices, the encrypt function receives as inputs A and B and outputs C as C→AS+pX+B (mod q), S is a random matrix, X is an error matrix, p is in integer, q is an odd prime number. In other exemplary embodiments, the encryption scheme includes a decrypt function that receives as inputs at least one private key T (a matrix) and C and outputs B as B=T−1·(TCTt mod q)·(Tt)−1 mod p.

    摘要翻译: 在一个示例性实施例中,一种有形地体现由机器执行的用于执行操作的指令程序的计算机可读存储介质,包括:根据具有加密功能的加密方案,接收要加密的信息B作为密文C; 并按照加密函数对B进行加密以获得C,该方案利用至少一个公钥A,其中B,C和A是矩阵,加密函数接收作为输入A和B,并将C作为C→AS + pX + B(mod q),S是随机矩阵,X是误差矩阵,p是整数,q是奇素数。 在其他示例性实施例中,加密方案包括解密功能,其接收至少一个私钥T(矩阵)和C的输入,并将B输出为B = T-1·(TCTt mod q)·(Tt)-1 mod p。

    Fast evaluation of many polynomials with small coefficients on the same point
    3.
    发明授权
    Fast evaluation of many polynomials with small coefficients on the same point 有权
    对同一点上具有小系数的许多多项式进行快速评估

    公开(公告)号:US08903083B2

    公开(公告)日:2014-12-02

    申请号:US13205755

    申请日:2011-08-09

    摘要: In one exemplary embodiment of the invention, a method for evaluating at point r one or more polynomials p1(x), . . . , pl(x) of maximum degree up to n−1, where the polynomial pi(x) has a degree of ti−1, the method including: partitioning each polynomial pi(x) into a bottom half pibot(x) with bottom terms of lowest si coefficients and a top half pitop(x) with top terms of remaining ti−si coefficients; recursively partitioning the bottom half pibot(x) and the top half pitop(x) of each polynomial pi(x) obtaining further terms having a lower degree than previous terms, performed until at least one condition is met yielding a plurality of partitioned terms; evaluating the bottom half pibot(x) and the top half pitop(x) at the point r for each polynomial pi(x) by evaluating the partitioned terms at the point r and iteratively combining the evaluated partitioned terms; and evaluating each polynomial pi(x) at the point r by setting pi(r)=rsipitop(r)+pibot(r).

    摘要翻译: 在本发明的一个示例性实施例中,一种用于在点r处评估一个或多个多项式p1(x),...的方法。 。 。 ,其中多项式pi(x)具有度ti-1,该方法包括:将每个多项式pi(x)分成具有底部的底部半带(x) 最低si系数的项和具有剩余ti-si系数的顶级项的上半部pitop(x); 递归地划分每个多项式pi(x)的下半部分匹配(x)和上半部pitop(x),获得具有比先前项更低的程度的其他项,直到满足至少一个条件产生多个分割项; 通过在点r处评估分割项并迭代地组合评估的分割项来评估每个多项式pi(x)的点r处的下半部分(P)(x)和上半部分pitop(x) 并通过设置pi(r)= rsipitop(r)+ pibot(r)来评估点r处的每个多项式pi(x)。

    Fast computation of a single coefficient in an inverse polynomial
    4.
    发明授权
    Fast computation of a single coefficient in an inverse polynomial 失效
    反演多项式中单个系数的快速计算

    公开(公告)号:US08532289B2

    公开(公告)日:2013-09-10

    申请号:US13205795

    申请日:2011-08-09

    IPC分类号: H04L29/06

    摘要: In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including: receiving the first polynomial v(x) modulo the second polynomial fn(x), where the second polynomial is of a form fn(x)=xn±1, where n=2k and k is an integer greater than 0; computing lowest two coefficients of a third polynomial g(z) that is a function of the first polynomial and the second polynomial, where g ⁡ ( z ) ⁢ = def ⁢ ∏ i = 0 n - 1 ⁢ ⁢ ( v ⁡ ( ρ i ) - z ) , where ρ0, ρ1, . . . , ρn−1 are roots of the second polynomial fn(x) over a field; outputting the lowest coefficient of g(z) as the resultant; and outputting the second lowest coefficient of g(z) divided by n as the free term of the scaled inverse of the first polynomial v(x) modulo the second polynomial fn(x).

    摘要翻译: 在本发明的一个示例性实施例中,一种用于计算第二多项式v(x)的第二多项式v(x)的缩放逆的结果和自由项的方法,所述第一多项式v(x)模数为第二多项式fn(x),包括:接收第一多项式v(x) 第二多项式fn(x),其中第二多项式具有形式fn(x)= xn±1,其中n = 2k,k是大于0的整数; 计算作为第一多项式和第二多项式的函数的第三多项式g(z)的最低两个系数,其中g⁡(z)=defΠi= 0 n-1ü(v⁡(rho )-z),其中rho0,rho1,... 。 。 ,rhon-1是场上第二个多项式fn(x)的根; 输出最小的g(z)系数作为结果; 并且将第二最低系数g(z)除以n作为第二多项式fn(x)的第一多项式v(x)的缩放逆的自由项。

    Fast Evaluation Of Many Polynomials With Small Coefficients On The Same Point
    5.
    发明申请
    Fast Evaluation Of Many Polynomials With Small Coefficients On The Same Point 有权
    许多具有小系数的多项式在同一点上的快速评估

    公开(公告)号:US20120039463A1

    公开(公告)日:2012-02-16

    申请号:US13205755

    申请日:2011-08-09

    IPC分类号: H04L9/28

    摘要: In one exemplary embodiment of the invention, a method for evaluating at point r one or more polynomials p1(x), . . . , pl(x) of maximum degree up to n−1, where the polynomial pi(x) has a degree of ti−1, the method including: partitioning each polynomial pi(x) into a bottom half pibot(x) with bottom terms of lowest si coefficients and a top half pitop(x) with top terms of remaining ti−si coefficients; recursively partitioning the bottom half pibot(x) and the top half pitop(x) of each polynomial pi(x) obtaining further terms having a lower degree than previous terms, performed until at least one condition is met yielding a plurality of partitioned terms; evaluating the bottom half pibot(x) and the top half pitop(x) at the point r for each polynomial pi(x) by evaluating the partitioned terms at the point r and iteratively combining the evaluated partitioned terms; and evaluating each polynomial pi(x) at the point r by setting pi(r)=rsipitop(r)+pibot(r).

    摘要翻译: 在本发明的一个示例性实施例中,一种用于在点r处评估一个或多个多项式p1(x),...的方法。 。 。 ,其中多项式pi(x)具有度ti-1,该方法包括:将每个多项式pi(x)分割成具有底部的底部半条纹(x) 最低si系数的项和具有剩余ti-si系数的顶级项的上半部pitop(x); 递归地划分每个多项式pi(x)的下半部分匹配(x)和上半部pitop(x),获得具有比先前项更低的程度的其他项,直到满足至少一个条件产生多个分割项; 通过在点r处评估分割项并迭代地组合评估的分割项来评估每个多项式pi(x)的点r处的下半部分(P)(x)和上半部分pitop(x) 并通过设置pi(r)= rsipitop(r)+ pibot(r)来评估点r处的每个多项式pi(x)。

    Efficient Implementation Of Fully Homomorphic Encryption
    6.
    发明申请
    Efficient Implementation Of Fully Homomorphic Encryption 有权
    有效实现完全同态加密

    公开(公告)号:US20120039473A1

    公开(公告)日:2012-02-16

    申请号:US13205813

    申请日:2011-08-09

    IPC分类号: H04L9/00

    摘要: In one exemplary embodiment of the invention, a method for homomorphic decryption, including: providing a ciphertext with element c, there exists a big set B having N elements zi so B={z1,z2, . . . , zN}, there exists a small set S having n elements sj so S={s1, s2, . . . , sn}, the small set is a subset of the big set, summing up the elements of the small set yields the private key, there exists a bit vector {right arrow over (σ)} having N bits σi so {right arrow over (σ)}=σ1, σ2, . . . , σN, σi=1 if zi ∈ S else σi=0, there exists an encrypted vector {right arrow over (d)} having N ciphertexts di so d=d1, d2, . . . , dN, di is an encryption of σi; post-processing c by multiplying it by all zi to obtain an intermediate vector {right arrow over (y)}=y1, y2, . . . , yN with yi computed yi=c×zi; homomorphically multiplying yi by di obtaining a ciphertext vector {right arrow over (x)} having N ciphertexts xi so z=x1, x2, . . . , xN, where xi is an encryption of the product yi·σi; and homomorphically summing all xi to obtain a resulting ciphertext that is an encryption of the at least one bit, where the big set is partitioned into n parts with each part having a plurality of different elements from the big set, where the elements of the small set are one element from each part.

    摘要翻译: 在本发明的一个示例性实施例中,一种用于同态解密的方法,包括:提供具有元素c的密文,存在具有N个元素zi的大集合B,因此B = {z1,z2,..., 。 。 ,zN},存在具有n个元素sj的小集合S,因此S = {s1,s2,...。 。 。 ,sn},小集是大集合的一个子集,对小集合的元素求和得到私钥,存在一个位向量{right arrow over(&sgr;)},具有N位&sgr; i so { 右箭头(&sgr;)} =&sgr; 1,&sgr; 2,。 。 。 ,&sgr; N,&sgr; i = 1如果zi∈S else&sgr; i = 0,则存在加密向量{(d)}的右箭头,其具有N个密文,所以d = d1,d2。 。 。 ,dN,di是&sgr的加密; i; 通过将所有zi乘以后处理c以获得中间向量{(y)}的右箭头} = y1,y2,...。 。 。 ,yi与yi计算yi = c×zi; 通过di获得一个密文向量{(x)}的右箭头(x(x)}),以n个密文xi为单位乘以yi,所以z = x1,x2,...。 。 。 ,xN,其中xi是产品的加密yi·&sgr; i; 并且对所有xi进行同态求和以获得作为至少一个比特的加密的结果密文,其中大集合被分割成n个部分,每个部分具有来自大集合的多个不同的元素,其中小的元素 set是每个部分的一个元素。

    Efficient implementation of fully homomorphic encryption
    7.
    发明授权
    Efficient implementation of fully homomorphic encryption 有权
    高效实现完全同态加密

    公开(公告)号:US08565435B2

    公开(公告)日:2013-10-22

    申请号:US13205813

    申请日:2011-08-09

    IPC分类号: H04L9/00 G06F17/30

    摘要: In one exemplary embodiment of the invention, a method for homomorphic decryption, including: providing a ciphertext with element c, there exists a big set B having N elements zi so B={z1,z2, . . . , zN}, there exists a small set S having n elements sj so S={s1, s2, . . . , sn}, the small set is a subset of the big set, summing up the elements of the small set yields the private key, there exists a bit vector {right arrow over (σ)} having N bits σi so {right arrow over (σ)}=σ1, σ2, . . . , σN, σi=1 if zi ε S else σi=0, there exists an encrypted vector {right arrow over (d)} having N ciphertexts di so d=d1, d2, . . . , dN, di is an encryption of σi; post-processing c by multiplying it by all zi to obtain an intermediate vector {right arrow over (y)}=y1, y2, . . . , yN with yi computed yi=c×zi; homomorphically multiplying yi by di obtaining a ciphertext vector {right arrow over (x)} having N ciphertexts xi so {right arrow over (x)}=x1, x2, . . . , xN, where xi is an encryption of the product yi·σi; and homomorphically summing all xi to obtain a resulting ciphertext that is an encryption of the at least one bit, where the big set is partitioned into n parts with each part having a plurality of different elements from the big set, where the elements of the small set are one element from each part.

    摘要翻译: 在本发明的一个示例性实施例中,一种用于同态解密的方法,包括:提供具有元素c的密文,存在具有N个元素zi的大集合B,因此B = {z1,z2,..., 。 。 ,zN},存在具有n个元素sj的小集合S,因此S = {s1,s2,...。 。 。 ,sn},小集是大集合的一个子集,对小集合的元素求和产生私钥,存在一个位向量{右箭头(西格玛)},具有N比特sigmai所以{right arrow over (sigma)} = sigma1,sigma2,... 。 。 ,sigmaN,sigmai = 1,如果zi epsilon S else sigmai = 0,则存在具有N个密文的加密向量{d(d)}),所以d = d1,d2。 。 。 ,dN,di是sigmai的加密; 通过将所有zi乘以后处理c以获得中间向量{(y)}的右箭头} = y1,y2,...。 。 。 ,yi与yi计算yi = c×zi; 通过di获得一个密文向量{(x)}的右箭头(x(x)}),使xi同样地乘以yi {right} over(x)} = x1,x2,...。 。 。 ,xN,其中xi是产品yi·sigmai的加密; 并且对所有xi进行同态求和以获得作为至少一个比特的加密的结果密文,其中大集合被分割成n个部分,每个部分具有来自大集合的多个不同的元素,其中小的元素 set是每个部分的一个元素。

    Fast Computation Of A Single Coefficient In An Inverse Polynomial
    8.
    发明申请
    Fast Computation Of A Single Coefficient In An Inverse Polynomial 失效
    反向多项式中单系数的快速计算

    公开(公告)号:US20120039465A1

    公开(公告)日:2012-02-16

    申请号:US13205795

    申请日:2011-08-09

    IPC分类号: H04L9/00

    摘要: In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including: receiving the first polynomial v(x) modulo the second polynomial fn(x), where the second polynomial is of a form fn(x)=xn±1, where n=2k and k is an integer greater than 0; computing lowest two coefficients of a third polynomial g(z) that is a function of the first polynomial and the second polynomial, where g(z)Πi=0n−1(v(ρi)−z), where ρ0, ρ1, . . . , ρn−1 are roots of the second polynomial fn(x) over a field; outputting the lowest coefficient of g(z) as the resultant; and outputting the second lowest coefficient of g(z) divided by n as the free teen of the scaled inverse of the first polynomial v(x) modulo the second polynomial fn(x).

    摘要翻译: 在本发明的一个示例性实施例中,一种用于计算第二多项式v(x)的第二多项式v(x)的缩放逆的结果和自由项的方法,所述第一多项式v(x)模数为第二多项式fn(x),包括:接收第一多项式v(x) 第二多项式fn(x),其中第二多项式具有形式fn(x)= xn±1,其中n = 2k,k是大于0的整数; 计算作为第一多项式和第二多项式的函数的第三多项式g(z)的最低两个系数,其中g(z)&Pgr; i = 0n-1(v(&rgr; i)-z),其中&rgr ; 0,&rgr; 1,。 。 。 ,&rgr; n-1是场上第二个多项式fn(x)的根; 输出最小的g(z)系数作为结果; 并且将第二最低系数g(z)除以n作为第二多项式fn(x)的第一多项式v(x)的缩放逆的自由少数。

    Novel Hash Function With Provable Resistance To Differential Attacks
    10.
    发明申请
    Novel Hash Function With Provable Resistance To Differential Attacks 有权
    新颖的哈希功能可以抵御差别攻击

    公开(公告)号:US20100104095A1

    公开(公告)日:2010-04-29

    申请号:US12259588

    申请日:2008-10-28

    IPC分类号: H04L9/06

    摘要: A system and method for coding data to help resist differential attacks. Data in m columns may be initialized to an initialized value. One new column of data may be mixed with a new input word and input to an advanced mixer. The advanced mixer may include linear mixing having indexed bytes and performing of exclusive-OR operation and transposing. An output of the advanced mixer may be a new m column state. A value of m could be 0 through 30. The value of m may have a preferred range of 27 through 36. Systems to implement the foregoing method are also described.

    摘要翻译: 用于编码数据以帮助抵御差别攻击的系统和方法。 m列中的数据可以初始化为初始化值。 一个新的数据列可以与新的输入字混合并输入到高级混音器。 高级混合器可以包括具有索引字节的线性混合和执行异或运算和转置。 高级混合器的输出可以是新的m列状态。 m的值可以是0到30.M的值可以具有27至36的优选范围。还描述了实现上述方法的系统。