[1]王旭阳,胡爱群,方昊.基于LWE的单层同态云计算方案[J].东南大学学报(自然科学版),2016,46(5):945-949.[doi:10.3969/j.issn.1001-0505.2016.05.008]
 Wang Xuyang,Hu Aiqun,Fang Hao.Single-layer homographic cloud computing scheme based on LWE[J].Journal of Southeast University (Natural Science Edition),2016,46(5):945-949.[doi:10.3969/j.issn.1001-0505.2016.05.008]
点击复制

基于LWE的单层同态云计算方案()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
46
期数:
2016年第5期
页码:
945-949
栏目:
计算机科学与工程
出版日期:
2016-09-20

文章信息/Info

Title:
Single-layer homographic cloud computing scheme based on LWE
作者:
王旭阳胡爱群方昊
东南大学信息科学与工程学院, 南京 210096
Author(s):
Wang Xuyang Hu Aiqun Fang Hao
School of Information Science and Engineering, Southeast University, Nanjing 210096, China
关键词:
云计算 格密码 错误学习 同态 远程操作
Keywords:
cloud computing lattice-based cryptography learning with errors(LWE) homographic remote operation
分类号:
TP309.7
DOI:
10.3969/j.issn.1001-0505.2016.05.008
摘要:
为了实现安全的远程操作,通过分析研究一次或单层的同态运算,构造了一个基于错误学习(LWE)的单层同态云计算方案(sLHCC).首先,根据解密者是否知道LWE问题中所使用的随机向量,构造了2个不同的单层同态加密方案sLHE1和sLHE2,并得到了相应的sLHCC方案.该方案在保持LWE问题困难性的基础上,实现了云端单次的同态加和乘运算.根据合理的操作约定和同态结果,用户可以在不泄露操作需求(密文)的情况下,执行远程操作和控制.结果表明,与其他同态加密方案相比,sLHCC的公钥尺寸从传统的矩阵降为向量,从而减小了密文尺寸和云端的存储需求.
Abstract:
To achieve safe remote operation, a single-layer homographic cloud computing scheme(sLHCC)based on learning with errors(LWE)is constructed by analyzing one-time-layer or single-layer homomorphic operation. First, according to whether the decryption accesses the random vector in LWE problem or not, two different single-layer homographic encryption schemes, named sLHE1 and sLHE2, are proposed, and the corresponding sLHCC schemes are put forward. The sLHCC schemes can realize one-time homomorphic addition and one-time homomorphic multiplication in cloud with maintaining the difficulty of LWE problem. According to the reasonable operation agreement and homomorphism results, users can execute the remote operation and control without leaking operation requirements(ciphertexts). The results show that compared with other homomorphic encryption schemes, the size of the public key of the sLHCC schemes reduces from matrix to vector, inducing the decrease of the ciphertext size and the demands of the cloud storage.

参考文献/References:

[1] Aguilar-Melchor C, Fau S, Fontaine C, et al. Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain[J]. IEEE Signal Process Mag, 2013, 30(2): 108-117. DOI:10.1109/msp.2012.2230219.
[2] Ajtai M. Generating hard instances of lattice problems[C]//Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. New York: ACM, 1996: 99-108. DOI:10.1145/237814.237838.
[3] Wang X Y, Hu A Q. Complexity analysis of lattice hard problems[J]. Journal of Cryptologic Research, 2015, 2(1): 1-16.
[4] Micciancio D, Regev O. Lattice-based cryptography[M]//Post-quantum cryptography. Berlin: Springer, 2009: 147-191. DOI:10.1007/978-3-540-88702-7_5.
[5] Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from(standard)LWE[J]. SIAM Journal on Computing, 2014, 43(2): 831-871.
[6] Boneh D, Gentry C, Halevi S, et al. Private database queries using somewhat homomorphic encryption[M]//Applied Cryptography and Network Security. Berlin: Springer, 2013: 102-118. DOI:10.1007/978-3-642-38980-1_7.
[7] Van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers[C]//Advances in cryptologyEUROCRYPT 2010. Berlin: Springer, 2010: 24-43.
[8] Brakerski Z, Gentry C, Vaikuntanathan V.(Leveled)fully homomorphic encryption without bootstrapping[C]//Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. New York: ACM, 2012: 309-325.
[9] Brakerski Z. Fully homomorphic encryption without modulus switching from classical GapSVP[C]//Advances in CryptologyCRYPTO 2012. Berlin: Springer, 2012: 868-886. DOI:10.1007/978-3-642-32009-5_50.
[10] Gentry C, Sahai A, Waters B.Homomorphic encryption from learning with errors: Conceptually-simpler,asymptotically-faster,attribute-based[C]//Advances in CryptologyCRYPTO 2013. Berlin: Springer, 2013: 75-92. DOI:10.1007/978-3-642-40041-4_5.
[11] Micciancio D, Peikert C. Hardness of SIS and LWE with small parameters[C]//Advances in CryptologyCRYPTO 2013. Berlin: Springer, 2013: 21-39. DOI:10.1007/978-3-642-40041-4-2.
[12] Brakerski Z, Langlois A, Peikert C, et al. Classical hardness of learning with errors[C]//Proceedings of the 45th Annual ACM Symposium on Theory of Computing. New York: ACM, 2013: 575-584. DOI:10.1145/2488608.2488680.
[13] Aharonov D, Regev O. Lattice problems in NP ∩ coNP[J]. Journal of the ACM, 2005, 52(5): 749-765. DOI:10.1145/1089023.1089025.
[14] Peikert C. Limits on the hardness of lattice problems in lpp norms[J]. Computational Complexity, 2008, 17(2): 300-351. DOI:10.1007/s00037-008-0251-3.
[15] Regev O. The learning with errors problem[C]//Proceedings of IEEE Conference on Computational Complexity. Berlin: Springer, 2010: 191-204.

相似文献/References:

[1]徐小龙,熊婧夷,程春玲.基于云端计算架构的恶意代码联合防御机制[J].东南大学学报(自然科学版),2011,41(2):220.[doi:10.3969/j.issn.1001-0505.2011.02.002]
 Xu Xiaolong,Xiong Jingyi,Cheng Chunling.Joint defense mechanism of malicious code based on cloud and client computing architecture[J].Journal of Southeast University (Natural Science Edition),2011,41(5):220.[doi:10.3969/j.issn.1001-0505.2011.02.002]
[2]周振吉,吴礼发,洪征,等.云计算环境下的虚拟机可信度量模型[J].东南大学学报(自然科学版),2014,44(1):45.[doi:10.3969/j.issn.1001-0505.2014.01.009]
 Zhou Zhenji,Wu Lifa,Hong Zheng,et al.Trustworthiness measurement model of virtual machine for cloud computing[J].Journal of Southeast University (Natural Science Edition),2014,44(5):45.[doi:10.3969/j.issn.1001-0505.2014.01.009]
[3]周振吉,吴礼发,洪征,等.云计算环境下基于信任的虚拟机可信证明模型[J].东南大学学报(自然科学版),2015,45(1):31.[doi:10.3969/j.issn.1001-0505.2015.01.006]
 Zhou Zhenji,Wu Lifa,Hong Zheng,et al.Trust based trustworthiness attestation model of virtual machines for cloud computing[J].Journal of Southeast University (Natural Science Edition),2015,45(5):31.[doi:10.3969/j.issn.1001-0505.2015.01.006]

备注/Memo

备注/Memo:
收稿日期: 2016-01-21.
作者简介: 王旭阳(1985—),男,博士生;胡爱群(联系人),男,博士,教授,博士生导师,aqhu@seu.edu.cn.
基金项目: 国家重点基础研究发展计划(973计划)资助项目(2013CB338003).
引用本文: 王旭阳,胡爱群,方昊.基于LWE的单层同态云计算方案[J].东南大学学报(自然科学版),2016,46(5):945-949. DOI:10.3969/j.issn.1001-0505.2016.05.008.
更新日期/Last Update: 2016-09-20