白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Homomorphic data decryption method and apparatus for implementing privacy protection

專利號
US11159305B2
公開日期
2021-10-26
申請人
Advanced New Technologies Co., Ltd.(KY Grand Cayman)
發(fā)明人
Shuai Han; Zhangjie Huang; Huanyu Ma; Hao Lei
IPC分類
H04L29/06; H04L9/00; H04L9/30; H04L9/06
技術(shù)領(lǐng)域
ciphertext,mod,hn,blockchain,n2,qrn,user,group,encryption,key
地域: George Town

摘要

A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<

說明書

before encryption, where a value of private key sk is α=a·k, and a is a predetermined non-zero value; and a data output unit, configured to output decrypted data m to the target user.

According to a fifth aspect of the one or more implementations of the present specification, an electronic device is provided, and includes the following: a processor; and a memory, configured to store a processor executable instruction, where the processor executes the executable instruction to implement the method according to the first aspect.

According to a sixth aspect of the one or more implementations of the present specification, a computer readable storage medium is provided, where the computer readable storage medium stores a computer instruction, and the instruction is executed by a processor to implement the steps of the method according to the first aspect.

According to a seventh aspect of the one or more implementations of the present specification, an electronic device is provided, and includes the following: a processor; and a memory, configured to store a processor executable instruction, where the processor executes the executable instruction to implement the method according to the second aspect.

According to an eighth aspect of the one or more implementations of the present specification, a computer readable storage medium is provided, where the computer readable storage medium stores a computer instruction, and the instruction is executed by a processor to implement the steps of the method according to the second aspect.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a flowchart illustrating a homomorphic data encryption method for implementing privacy protection, according to an example implementation;

權(quán)利要求

1
微信群二維碼
意見反饋