Abstract
With the continuous development of computer networks, cloud storage is now the mainstream way for people to store information, but some important information leaks in the process of storage, and information security issues have become the most concerned issue at present. Homomorphic encryption not only has the property of data encryption of traditional encryption algorithm, but also has the result of ciphertext operation equivalent to the corresponding plaintext operation. This paper proposes an improved scheme based on DGHV, it (MDGHV) is mainly implemented from two points: changing the encryption formula c = pq + 2r + m to c = pqr + m, the domain of clear text m is expanded to a custom value, which can be used as a parameter; without acquiring sensitive information, data owners can directly calculate multiple ciphertexts and ensure high efficiency to meet the security requirements of cloud environment. An improved scheme based on DGHV, which expands the plaintext domain and enable search encryption operation to encrypt larger values, thus improving the efficiency. The security of this algorithm still depends on the similar GCD problem, which can solve some practical security problems in the cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, Phong Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13013-7_25
Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 1–3 (2011)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Annual ACM Symposium on Theory of Computing vol. 9, no. 4, pp. 169–178 (2009)
Namjoshi, J., Gupte, A.: Service oriented architecture for cloud based travel reservation software as a service. In: Proceedings of the 2009 IEEE International Conference on Cloud Computing, Bangalore, India, 21–25 September 2009, Los Alamitos, CA, USA, pp. 147–150. IEEE Computer Society (2009)
Fellows, M., Koblitz, N.: Combinatorial cryptosystems galore. In Finites: Theory, Applications and Algorithms, Contemporary Mathematics, Las Vegas, vol. 168, pp. 51–61 (1993)
Xu, P., Liu, C., Xue, S.: Full homomorphic encryption algorithm based on integer polynomial ring. Comput. Eng. 38(24), 1–4 (2012)
Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M.: Fully homomorphic encryption over the integers with shorter public keys. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 487–504. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_28
Ni-gang, S., Haoran, Z., Weixin, W.: A fully homomorphic encryption scheme for integers with n bits. Comput. Appl. Res. 04, 55–68 (2018)
Xiong, W., Wei, Y., Wang, H.: An improved scheme of full homomorphic encryption based on integer. Comput. Appl. Res. (03), 67–78 (2016)
Acknowledgements
This work is supported by the National Science Foundation of China under Grant No. 61862007, Guangxi Natural Science Foundation under Grant No. 2018GXNSFAA138147. Postgraduate research and innovation project of Guangxi University for nationalities No. gxun-chxzs2017114, and Teaching Reform Project of Guangxi University for Nationalities under Grant No. 2016XJGY33 and No. 2016XJGY34.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, L., Ge, L., Hu, Y., He, Z., Zhao, Z., Wei, H. (2019). Research on Full Homomorphic Encryption Algorithm for Integer in Cloud Environment. In: Huang, DS., Huang, ZK., Hussain, A. (eds) Intelligent Computing Methodologies. ICIC 2019. Lecture Notes in Computer Science(), vol 11645. Springer, Cham. https://doi.org/10.1007/978-3-030-26766-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-26766-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-26765-0
Online ISBN: 978-3-030-26766-7
eBook Packages: Computer ScienceComputer Science (R0)