白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Homomorphic data decryption method and apparatus for implementing privacy protection

專(zhuān)利號(hào)
US11159305B2
公開(kāi)日期
2021-10-26
申請(qǐng)人
Advanced New Technologies Co., Ltd.(KY Grand Cayman)
發(fā)明人
Shuai Han; Zhangjie Huang; Huanyu Ma; Hao Lei
IPC分類(lèi)
H04L29/06; H04L9/00; H04L9/30; H04L9/06
技術(shù)領(lǐng)域
ciphertext,mod,hn,blockchain,n2,qrn,user,group,encryption,key
地域: George Town

摘要

A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<

說(shuō)明書(shū)

As described above, by selecting a public and private key pair that satisfies a certain condition, data m can be encrypted into corresponding homomorphic ciphertext c according to the implementation described in FIG. 1, and homomorphic ciphertext c can be decrypted into corresponding data m according to the implementation described in FIG. 2. The following describes, with reference to an implementation by using an example, how to select a public and private key pair that satisfies the previous condition.

First, number N is determined. A value of N can be a product of two large prime numbers P and Q, so that it is difficult to obtain values of P and Q. A length P and Q can be 1024 bits. In this case, a length of N=P·Q is 2048 bits, namely, the previous parameter n=2048. Certainly, another length can be used in another implementation. Implementations are not limited in the present specification. When the length of N is large enough, there is a very low probability that the values of P and Q are obtained. Therefore, when a public and private key pair is generated based on the values of P and Q, it can be ensured that it is difficult to obtain values of public and private keys, which features high security. Length n of N can be first determined, then prime numbers P and Q with a length of (n/2) are selected, and it is ensured that P=Q=3 mod 4 and gcd(P?1, Q?1)=2 (in other words, the greatest common divisor of P?1 and Q?1 is 2) are satisfied. In this case, N=P·Q is calculated.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋