Paillier cryptosystem enhancement for Homomorphic Encryption technique

被引:5
作者
Mohammed, Saja J. [1 ]
Taha, Dujan B. [2 ]
机构
[1] Univ Mosul, Coll Comp Sci & Math, Dept Comp Sci, Mosul, Iraq
[2] Univ Mosul, Coll Comp Sci & Math, Dept Software, Mosul, Iraq
关键词
Cryptography; Homomorphic Encryption; Partial Homomorphic Encryption; Paillier cryptosystem; Chinese Reminder Theorem;
D O I
10.1007/s11042-023-16301-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic Encryption (HE) is one of the most popular technologies which assists for keeping the confidentiality and privacy of user data on cloud storage. It can apply a mathematical computation to the ciphertext and return the result as if the operation was performed on the corresponding plaintext. Many of algorithms are known as a class of this interested technology, one of them is Paillier cryptosystem. This paper offers two solutions (MPEA-A and MPEA-B) for Paillier's cryptosystem bottleneck problem which causes delay in Paillier decrypting procedures. MPEA-A and MPEA-B algorithms are based on the Chinese Reminder Theorem CRT with appended principles to achieve the desired goal. Practical implementations are applied to the proposed algorithms, The results show that the two algorithms succeeded in reducing the decryption time with various ratios. The practical implementation proved that MPEA-A can be useful for encrypting with a medium Paillier key size, whereas MPEA-B is preferred for encrypting in a large key size value.
引用
收藏
页码:22567 / 22579
页数:13
相关论文
共 19 条
[1]   Homomorphic encryption systems statement: Trends and challenges [J].
Alaya, Bechir ;
Laouamer, Lamri ;
Msilini, Nihel .
COMPUTER SCIENCE REVIEW, 2020, 36
[2]  
Aldossary S, 2016, INT J ADV COMPUT SC, V7, P485
[3]  
Bambrik I, 2020, SN Computer Science, V1, DOI [10.1007/s42979-020-00273-1, 10.1007/s42979-020-00273-1, DOI 10.1007/S42979-020-00273-1]
[4]  
Chol KG, 2018, CRYPTOLOGY EPRINT AR, P1
[5]  
Ding C., 1996, CHINESE REMAINDER TH
[6]   Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing [J].
El Makkaoui, Khalid ;
Ezzati, Abdellah ;
Beni-Hssane, Abderrahim ;
Ouhmad, Slimane .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (06) :2205-2214
[7]   Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study [J].
Gill, Sajid Habib ;
Razzaq, Mirza Abdur ;
Ahmad, Muneer ;
Almansour, Fahad M. ;
Ul Haq, Ikram ;
Jhanjhi, N. Z. ;
Alam, Malik Zaib ;
Masud, Mehedi .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01) :117-128
[8]   MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY [J].
HELLMAN, ME .
SCIENTIFIC AMERICAN, 1979, 241 (02) :146-&
[9]   A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem [J].
Jia, Xingxing ;
Wang, Daoshun ;
Nie, Daxin ;
Luo, Xiangyang ;
Sun, Jonathan Zheng .
INFORMATION SCIENCES, 2019, 473 :13-30
[10]  
Kaaniche N, 2015, THESIS ET MARIE CURI