Abstract
The existing homomorphic encryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined—Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets.
Similar content being viewed by others
References
Diffie W, Hellman M. New Direction in Cryptography.IEEE Trans, 1976,22(6):644–654.
Okamoto T, Pointcheval D. The Gap-problems: A New Class of Problems for the Security of Cryptographic Schemes.Proc of PKC01 (LNCS vol. 1992). Berlin: Springer-Verlag, 2001. 213–229.
Haber S. Multi-PartyCryptographic Computation: Techniques and applications. New York: Computer Science Department, Columbia University, 1998.
Rivest R L, Adleman L, Dertouzos M L. On Data Banks and Privacy Homomorphism.Foundations of Secure Computation. New York: Academic Press, 1978. 169–179.
Domingo-Ferrer J, Herrera-Joancomarti J. A New Privacy Homomorphism and Applications.Information Processing Letters, 1996,60(5):277–282.
Brickell E, Yacobi Y. On Privacy Homomorphisms.Advances in Cryptology—EUROCRYPT '87. Berlin: springer-verlag, 1987.
Sander T, Tschudin C. On Software Protection via Function Hiding.Information Hiding, Portland, USA, April 1998.
Sander T, Tschudin C. Protecting Mobile Agents Against Malicious Hosts.Mobile Agent Security. Heidelberg: Springer-Verlag, 1998.
Sander T, Tschudin C. Towards Mobile Cryptography.Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1998.
Lee H, Alves-Foss J, Harrison S. The Use of Encrypted Functions for Mobile Agent Security.Proceedings of the 37 th Hawaii International Conference on System Sciences—2004. Hawaii, USA, January 2004.
Author information
Authors and Affiliations
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (90104005).
Biography: XIANG Guang-li (1973-), male, Ph. D. candidate, research direction: parallel and distributed computing, mobile agent, information security.
Rights and permissions
About this article
Cite this article
Guang-li, X., Xin-meng, C., Ping, Z. et al. A method of homomorphic encryption. Wuhan Univ. J. Nat. Sci. 11, 181–184 (2006). https://doi.org/10.1007/BF02831727
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831727