FIELD: computer technology.
SUBSTANCE: invention relates to the field of computer technology and can be used in information processing and data protection systems. A secret key, a re-encryption key are generated, data encryption is performed. In this case, the formation of the secret key K(X) occurs by generating a matrix polynomial of degree N, and when encrypting data, a matrix M with an eigenvector is formed with an eigenvalue equal to the plaintext, with being the vector of length N. In this case, the data encryption method additionally contains a stage at which the function is calculated from the encrypted data to obtain the result in encrypted form.
EFFECT: increase in the security of information in an untrusted environment.
2 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROTECTING INFORMATION IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION | 2017 |
|
RU2691874C2 |
SYSTEM FOR HOMOMORPHIC DATA ENCRYPTION BASED ON A SYSTEM OF RESIDUAL CLASSES | 2021 |
|
RU2780150C1 |
CHECKABLE SECRET RESHUFFLES AND UTILIZATION OF SAME DURING ELECTRONIC VOTING PROCESS | 2002 |
|
RU2271574C2 |
METHOD AND DEVICE FOR MULTIDIMENSIONAL IMITATION RESISTANCE TRANSMISSION OF INFORMATION OVER COMMUNICATION CHANNELS | 2018 |
|
RU2686024C1 |
METHOD AND DEVICE FOR SPOOFING RESISTANT INFORMATION THROUGH COMMUNICATION CHANNELS | 2017 |
|
RU2669144C1 |
METHOD FOR ASYMMETRIC MESSAGE ENCRYPTION BASED ON MODIFIED BACKPACK TASK | 2019 |
|
RU2727025C1 |
AUTHENTICATED CODING METHOD | 2018 |
|
RU2694336C1 |
VOTERS VOTES QUANTITY COLLECTED BY ELECTRONIC VOTING DETERMINING SYSTEM AND METHOD | 2017 |
|
RU2652443C1 |
WEBER FUNCTION CYCLE-BASED QUANTUM ATTACK-SECURE ENCRYPTION METHOD | 2013 |
|
RU2541938C1 |
DISTRIBUTION OF IMAGES USING COMPOSITE RE-ENCRYPTED IMAGES | 2021 |
|
RU2828473C1 |
Authors
Dates
2021-12-28—Published
2021-03-30—Filed