The concept of Homomorphic Encryption
2016-07-04 01:19
357 查看
Homomorphic encryption is one of the hot research topics in the field of encryption. This technique enables the computation to be done in the encrypted data without requiring the encryption key. The basic flow of homomorphic encryption can be expressed as
follows:
1. The user uses KeyGenerator()to create a key pair
(SecretKEY, PublicKey).
2. The user uses Encrypt() and the above
PublicKey to encrypt the original dataDATA, and get
CipherText, i.e.,CipherText =Encrypt(PublicKey,DATA).
3. The third party, like the cloud, executes Evaluate() based on the computation functionf() on the above CiperText
and gets CiperTextResult =
Evaluate(f, CipherText), which equals to Encrypt(PublicKey,f(DATA)).
4. The user uses Decrypt() to decrypt theCiperTextResult and get thePlainResult =
Decrypt(SecretKEY,CiperTextResult).
Combine equations in step 3 and 4, we can get PlainResult =Decrypt(SecretKEY, Encrypt(PublicKey,f(DATA)))
=f(DATA).
follows:
1. The user uses KeyGenerator()to create a key pair
(SecretKEY, PublicKey).
2. The user uses Encrypt() and the above
PublicKey to encrypt the original dataDATA, and get
CipherText, i.e.,CipherText =Encrypt(PublicKey,DATA).
3. The third party, like the cloud, executes Evaluate() based on the computation functionf() on the above CiperText
and gets CiperTextResult =
Evaluate(f, CipherText), which equals to Encrypt(PublicKey,f(DATA)).
4. The user uses Decrypt() to decrypt theCiperTextResult and get thePlainResult =
Decrypt(SecretKEY,CiperTextResult).
Combine equations in step 3 and 4, we can get PlainResult =Decrypt(SecretKEY, Encrypt(PublicKey,f(DATA)))
=f(DATA).
相关文章推荐
- CSS居中之道
- 全球最杰出的14位程序员
- Win10 IoT C#开发 2 - 创建基于XAML的UI程序 及 应用的三种部署方法
- 浅谈C++类(6)--复制构造函数
- go语言实现斐波数列
- CNN for NLP
- 位操作
- leetcode题解日练--2016.7.3
- Chromium网页输入事件捕捉和手势检测过程分析
- iOS-FMDB
- iOS-使用CFStringTransform将汉字转换为拼音
- 工厂模式 详解
- RemObjects 客户端完整执行流程
- spring注解
- 合伙创业股权分配之实战模拟:分配股权都有哪些考量因素?
- java框架之struts2(文件上传)
- php 递归删除目录
- linux下操作gpio寄存器的方法
- web开发过程中的小问题
- 1985年程序员是如何写代码的