News Homomorphic encryption

News Homomorphic encryption

ID:41210476

大小:39.50 KB

页数:3页

时间:2019-08-18

News Homomorphic encryption_第1页
News Homomorphic encryption_第2页
News Homomorphic encryption_第3页
资源描述:

《News Homomorphic encryption》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、NewsHomomorphicencryption CraigGentrysubmittedhisthesis"AFullyHomomorphicEncryptionScheme"totheStanfordComputerScienceDepartmentinSeptember2009.ThetalkhegaveonthetopicatSTOC2009(The41stannualACMsymposiumonTheoryofcomputing)backinJunedoesnotseemtohavepe

2、netratedthemainstreammediaatthetime,butraisedaconsiderablestirinonlinenewslettersandlistsassociatedtotheworldofdatasecurity:averyuseful"popularexplanation"byHalFinneyontheCryptographymailinglist(June16),alongwithreportsinVoltageSuperconductor(June24),F

3、orbes.com(June24),eWeek.com(June25)andComputerworld(June25).ThereisalsoausefulreportontheIBMwebsite.ThestoryfinallymadeittoBusinessWeekinaposting("IBM'sEncryptionBreakthroughfortheWeb")byStephenBakeronSeptember30.ThecommonlyusedRSAcodeisonlyhomomorphic

4、withrespecttomultiplication.If(N,k)isyourpublickey,youencodexasxkmodN.Sincexkyk=(xy)k,andsince(amodN)(bmodN)=(abmodN),itfollowsthatthecodeforxyistheproductofthecodesforxandy.Soyoucouldcorrectlymultiplytwoencryptednumberswithouteverknowingwhatthenumbers

5、were.Ifanencryptionisfullyhomomorphic,youcansendyourtaxaccountantanencryptedcopyofallyourfinancialdata,andgetbackanencryptedcopyoftheamountyouowe,withoutrevealinganythingaboutyouractualincomeandexpenses.(ThisexamplefromAndyGreen'sarticleonForbes.com).T

6、hetroublewiththefullyhomomorphicencryptionschemesknownbeforeGentryisthatafterasmallnumberofoperationstheyloseaccuracyandcannotbereliablydecrypted.Gentrymanagedtodeviseaninitialencryption(alatticeencryption,notanRSAcode;insteadoffactorizationitusesadiff

7、erenthardproblem)thatwashomomorphicenoughtoimplementitsowndecryptingalgorithm,plusalittleextra.HalFinney:"IhavetogobacktoGödel'sandTuring'sworktothinkofacomparableexampleexploitingthepowerofself-embedding."Onceyouhavea"homomorphicenough"encryptionalgor

8、ithmE,Gentryexplainshowtohomomorphicallyimplementafunctionfofarbitrarycomplexity;thisisillustratedinthe"bootstrapping"diagrambelow.Youchooseenoughdifferent(publickey,privatekey)pairssothatthe"littleextra"sadduptoenoughforyourjob.Youencr

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。