文章目录
一、预备知识
1、二次剩余
同余理论中,一个整数 x 对另一个整数 p 的二次剩余指 : 当 x 2 = d ( m o d p ) . x^2 = d(mod p)\,. x2=d(modp).成立,则称d 是模 p 的二次剩余;否则称非二次剩余
2、雅可比符号
雅可比符号是勒让德符号的推广,但是根据雅可比符号的值不能判断同余式是否有解。
3、曼哈顿距离
图中红线代表曼哈顿距离,绿色代表欧氏距离,也就是直线距离,而蓝色和黄色代表等价的曼哈顿距离。曼哈顿距离——两点在南北方向上的距离加上在东西方向上的距离,即
d
(
i
,
j
)
=
∣
x
i
−
x
j
∣
+
∣
y
i
−
y
j
∣
d(i,j)=|xi-xj|+|yi-yj|
d(i,j)=∣xi−xj∣+∣yi−yj∣
二、加密算法
1、Paillier同态加密算法
\rule{14.3cm}{0.05em}
密钥生成 选取两个大素数
p
,
q
p, q
p,q, 计算
N
=
p
q
,
λ
=
l
c
m
(
p
−
1
,
q
−
1
)
.
N = pq, λ = lcm(p − 1, q − 1).
N=pq,λ=lcm(p−1,q−1). 定义函数
L
(
x
)
=
x
−
1
N
L(x) =\frac{x−1}{N}
L(x)=Nx−1, 随机选择一个生成元
g
∈
Z
∗
N
g ∈ Z∗N
g∈Z∗N, 使得
g
c
d
(
L
(
g
λ
m
o
d
N
2
)
,
N
)
=
1
gcd(L(g^λmod N^2), N ) = 1
gcd(L(gλmodN2),N)=1. 则加密方案的公钥为
(
g
,
N
)
(g, N )
(g,N), 私钥为 λ.
加密过程 对于明文 m < N, 选取随机数 r < N, 计算得密文
c
=
g
m
r
N
m
o
d
N
2
c = g^mr^N mod N^2
c=gmrNmodN2
解密过程 对密文 c, 计算得明文
m
=
D
(
c
)
m = D(c)
m=D(c)
m
=
L
(
c
λ
m
o
d
N
2
)
L
(
g
λ
m
o
d
N
2
)
m
o
d
N
m =\frac{L(c^λmod N^2)}{L(g^λ mod N^2)} mod N
m=L(gλmodN2)L(cλmodN2)modN
加法同态性: 由于下面性质成立:
E
(
m
1
)
×
E
(
m
2
)
=
g
m
1
r
N
1
g
m
2
r
N
2
m
o
d
N
2
=
g
m
1
+
m
2
(
r
1
r
2
)
N
m
o
d
N
2
=
E
(
(
m
1
+
m
2
)
m
o
d
N
)
E(m_1) × E(m_2) = g^{m_1}r^{N_1}g^{m_2}r^{N_2}mod N^2= g^{m_1+m_2}(r_1r_2)^Nmod N^2= E((m_1 + m_2) mod N )
E(m1)×E(m2)=gm1rN1gm2rN2modN2=gm1+m2(r1r2)NmodN2=E((m1+m2)modN)
2、Goldwasser-Micali 公钥加密系统
\rule{14.3cm}{0.05em}
密钥产生:
- 大素数 p , q p,q p,q,求出 N = p ∗ q N=p*q N=p∗q
- 任取R,满足 J ( R p ) = J ( R q ) = − 1 J(\frac{R}{p})=J(\frac{R}{q})=-1 J(pR)=J(qR)=−1
- P K ( R , N ) , S K ( p , q ) PK(R, N), SK(p, q) PK(R,N),SK(p,q)
加密:
- B B B 将明文转化为二进制数字 M = ( m 1 , m 2 , m 3 … m k ) ∈ 0 , 1 M=(m_1,m_2,m_3… m_k) ∈{0,1} M=(m1,m2,m3…mk)∈0,1
- 对于每一个
m
i
m_i
mi,都对应选取一个
x
i
∈
{
1
,
N
−
1
}
x_i ∈\lbrace1,N_{-1}\rbrace
xi∈{1,N−1}
若 m i = 1 , c i = R 1 ∗ r 2 m o d N m_i=1, c_i=R^1*r^2modN mi=1,ci=R1∗r2modN
若 m i = 0 , c i = R 0 ∗ r 2 m o d N m_i=0, c_i=R^0*r^2modN mi=0,ci=R0∗r2modN - C = { c 1 , c 2 , c 3 … c k } C =\lbrace c_1,c_2,c_3…c_k\rbrace C={c1,c2,c3…ck} 将这个 C C C发给 A A A
解密:
计
算
J
(
c
p
)
和
J
(
c
q
)
m
i
=
{
0
若
都
=
1
1
若
都
=
−
1
计算J(\frac{c}{p}) 和 J(\frac{c}{q}) \;\;\; m_i=\left\{ \begin{aligned} 0 & & 若都=1 \\ 1 & & 若都=-1 \\ \end{aligned} \right.
计算J(pc)和J(qc)mi={01若都=1若都=−1
可参考上一篇博客:Goldwasser-Micali公钥加密系统
\rule[-10pt]{14.3cm}{0.05em}
三、基于Goldwasser-Micali 公钥加密系统的曼哈顿距离的保密计算
编码方式1 假设全集为 U = {−3, −2, · · · , 4, 5}, 对于点 P(5, 3), 根据编码方法 1, 将横坐标 5 编码为A1 = (1, 1, 1, 1, 1, 1, 1, 1, 1). 将纵坐标 3 编码为 A2= (1, 1, 1, 1, 1, 1, 1, 0, 0),
P(5, 3), A(P ) = (1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0)
Q(−3, −2), A(Q) = (1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0)
计算原理 1: 在下面计算中, 假设全集为
U
=
u
1
,
⋅
⋅
⋅
,
u
n
,
U = {u_1, · · · , u_n},
U=u1,⋅⋅⋅,un, Alice 和 Bob 分别拥有点
P
(
x
1
,
y
1
)
P (x_1, y_1)
P(x1,y1) 和
Q
(
x
2
,
y
2
)
Q(x_2, y_2)
Q(x2,y2), 满足
x
1
,
y
1
,
x
2
,
y
2
∈
U
x_1, y_1, x_2, y_2 ∈ U
x1,y1,x2,y2∈U, 在全集 U 之下, 点 P (或 Q) 按照编码方式 1 对应的向量记为
A
=
(
a
11
,
⋅
⋅
⋅
,
a
1
n
,
a
21
,
⋅
⋅
⋅
,
a
2
n
)
(
或
B
=
(
b
11
,
⋅
⋅
⋅
,
b
1
n
,
b
21
,
⋅
⋅
⋅
,
b
2
n
)
)
A = (a_{11}, · · · , a_{1n}, a_{21}, · · · , a_{2n})(或B = (b_{11}, · · · , b_{1n}, b_{21}, · · · , b_{2n}))
A=(a11,⋅⋅⋅,a1n,a21,⋅⋅⋅,a2n)(或B=(b11,⋅⋅⋅,b1n,b21,⋅⋅⋅,b2n))关于两点 P 和 Q 之间的曼哈顿距离, 有下面的结论.
命题 1 点 P 和 Q 间的曼哈顿距离可由下式计算:
∣
x
1
−
x
2
∣
+
∣
y
1
−
y
2
∣
=
∑
i
=
1
2
∑
j
=
1
n
(
a
i
j
⊕
b
i
j
)
\mid x_1 - x_2\mid + \mid y_1 - y_2\mid = \sum\limits_{i=1}^2\sum\limits_{j=1}^n(a_{ij} \oplus b_{ij})
∣x1−x2∣+∣y1−y2∣=i=1∑2j=1∑n(aij⊕bij)
\rule{14.3cm}{0.05em}
协议 1 半诚实模型下安全计算两点间的曼哈顿距离
\rule{14.3cm}{0.1em}
输入 Alice 输入私密点
P
(
x
1
,
y
1
)
P(x_1, y_1)
P(x1,y1), Bob 输入私密点
Q
(
x
2
,
y
2
)
Q(x_2, y_2)
Q(x2,y2).
输出
f
1
(
P
,
Q
)
=
f
2
(
P
,
Q
)
=
∣
x
1
−
x
2
∣
+
∣
y
1
−
y
2
∣
f_1(P, Q) = f_2(P, Q)=\mid x_1 - x_2\mid + \mid y_1 - y_2\mid
f1(P,Q)=f2(P,Q)=∣x1−x2∣+∣y1−y2∣
准备工作 Alice 根据编码方法 1 构造 P 对应的向量
A
=
(
a
11
,
⋅
⋅
⋅
,
a
1
n
,
a
21
,
⋅
⋅
⋅
,
a
2
n
)
;
A = (a_{11}, · · · , a_{1n}, a_{21}, · · · , a_{2n});
A=(a11,⋅⋅⋅,a1n,a21,⋅⋅⋅,a2n); Bob 根据编码方法 1 得到 Q 对应的向量
B
=
(
b
11
,
⋅
⋅
⋅
,
a
1
n
,
b
21
,
⋅
⋅
⋅
,
b
2
n
)
.
B = (b_{11}, · · · , a_{1n}, b_{21}, · · · , b_{2n}).
B=(b11,⋅⋅⋅,a1n,b21,⋅⋅⋅,b2n). Alice 运行 Goldwasser-Micali 加密方案, 生成公钥/私钥对
p
k
/
s
k
pk/sk
pk/sk, 将公钥 pk 发送给 Bob.
(1) Alice 用公钥加密向量 A (分别对每个分量加密), 得到 E ( A ) = ( E ( a 11 ) , ⋅ ⋅ ⋅ , E ( a 1 n ) , E ( a 21 ) , ⋅ ⋅ ⋅ , E ( a 2 n ) ) E(A) = (E(a_{11}), · · · , E(a_{1n}), E(a_{21}), · · · , E(a_{2n})) E(A)=(E(a11),⋅⋅⋅,E(a1n),E(a21),⋅⋅⋅,E(a2n))并将 E ( A ) E(A) E(A)发送给 Bob.
(2) Bob 加密向量 B 的每个分量, 并计算 R = ( E ( a 11 ) E ( b 11 ) , ⋅ ⋅ ⋅ , E ( a 1 n ) E ( b 1 n ) , E ( a 21 ) E ( b 21 ) , ⋅ ⋅ ⋅ , E ( a 2 n ) E ( b 2 n ) ) R = (E(a11)E(b11), · · · , E(a_{1n})E(b_{1n}), E(a_{21})E(b_{21}), · · · , E(a_{2n})E(b_{2n})) R=(E(a11)E(b11),⋅⋅⋅,E(a1n)E(b1n),E(a21)E(b21),⋅⋅⋅,E(a2n)E(b2n))再将 R 的 n 个分量进行随机置换, 得到新的向量, 记为 R`, 并将 R` 发送给 Alice.
(3) Alice 解密 ˆR (分别对每个分量解密), 得到 D ( ˆ R ) = ( d 11 , ⋅ ⋅ ⋅ , d 2 n ) D(ˆR) = (d_{11}, · · · , d_{2n}) D(ˆR)=(d11,⋅⋅⋅,d2n)计算 y = d 11 + ⋅ ⋅ ⋅ + d 2 n y = d_{11}+ · · · + d_{2n} y=d11+⋅⋅⋅+d2n, 并将 y 发给 Bob.
(4) Alice 和 Bob 输出 y.
\rule{14.3cm}{0.1em}
四、增强的曼哈顿距离协议
编码方式2假设全集为 U = {−3, −2, · · · , 4, 5}, 对于点 P(−3, −2), 应用编码方式 2, 将 x1= −3 编码为V1 = (0, 1, 1, 1, 1, 1, 1, 1, 1), 将 y1= −2 编码为 V2= (0, 0, 1, 1, 1, 1, 1, 1, 1), 并得到 P (−3, −2) 应用编码方法 2 对应的向量 V § = (0, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 1, 1, 1, 1, 1, 1, 1).
计算原理 2: 在下面计算中, 总假设全集为 U = {u_1, · · · , u_n}, Alice 和 Bob 分别拥有点P (x_1, y_1), Q(x_2, y_2), 满足 x_1, y_1, x_2, y_2 ∈ U, 在全集 U 之下, 对点 P (或 Q) 先按照编码方式 1 (或编码方式 2) 进行编码, 再按照编码方式 2 (或编码方式 1) 进行编码, 对应的向量记为 A = ( a 11 , ⋅ ⋅ ⋅ , a 1 n , ⋅ ⋅ ⋅ , a 41 , ⋅ ⋅ ⋅ , a 4 n ) A = (a_{11}, · · · , a_{1n}, · · · , a_{41}, · · · , a_{4n}) A=(a11,⋅⋅⋅,a1n,⋅⋅⋅,a41,⋅⋅⋅,a4n)(或 V = ( v 11 , ⋅ ⋅ ⋅ , v 1 n , ⋅ ⋅ ⋅ , v 41 , ⋅ ⋅ ⋅ , v 4 n ) ) V = (v_{11}, · · · , v_{1n}, · · · , v_{41}, · · · , v_{4n})) V=(v11,⋅⋅⋅,v1n,⋅⋅⋅,v41,⋅⋅⋅,v4n))关于两点 P 和 Q 间的曼哈顿距离, 下面结论成立.
解读上面计算原理2:
对Q(-3, -2)编码:
编码方式1: A ( Q ) = ( x 1 , y 1 ) = ( 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 1 , 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 ) A(Q) = (x1, y1)= (1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0) A(Q)=(x1,y1)=(1,0,0,0,0,0,0,0,0,1,1,0,0,0,0,0,0,0)
编码方式1: V ( Q ) = ( x 1 ‘ , y 1 ‘ ) = ( 0 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 0 , 0 , 1 , 1 , 1 , 1 , 1 , 1 , 1 ) V(Q) = (x_1`, y_1`)= (0, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 1, 1, 1, 1, 1, 1, 1) V(Q)=(x1‘,y1‘)=(0,1,1,1,1,1,1,1,1,0,0,1,1,1,1,1,1,1)
结合在一起: C 1 ( x 1 , x 1 ‘ , y 1 , y 1 ‘ ) = ( 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , ∣ 0 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , ∣ 1 , 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 ∣ , 0 , 0 , 1 , 1 , 1 , 1 , 1 , 1 , 1 ) C_1 (x_1, x_1`, y_1, y_1`)= (1, 0, 0, 0, 0, 0, 0, 0, 0,| 0, 1, 1, 1, 1, 1, 1, 1, 1,|1, 1, 0, 0, 0, 0, 0, 0, 0|,0, 0, 1, 1, 1, 1, 1, 1, 1) C1(x1,x1‘,y1,y1‘)=(1,0,0,0,0,0,0,0,0,∣0,1,1,1,1,1,1,1,1,∣1,1,0,0,0,0,0,0,0∣,0,0,1,1,1,1,1,1,1)
根据上面所述的计算原理, 并结合应用 Paillier 加密方案和数字承诺思想可设计构造防欺骗场景下计算两点间曼哈顿距离的安全计算
\rule{14.3cm}{0.05em}
协议2 防欺骗场景下安全计算两点间的曼哈顿距离输入 Alice
\rule{14.3cm}{0.1em}
输入 Alice私密点
P
(
x
1
,
y
1
)
P(x_1, y_1)
P(x1,y1), Bob 输入私密点
Q
(
x
2
,
y
2
)
Q(x_2, y_2)
Q(x2,y2).
输出
f
1
(
P
,
Q
)
=
f
2
(
P
,
Q
)
=
∣
x
1
−
x
2
∣
+
∣
y
1
−
y
2
∣
.
f_1(P, Q) = f_2(P, Q) = |x_1 − x_2| + |y_1 − y_2|.
f1(P,Q)=f2(P,Q)=∣x1−x2∣+∣y1−y2∣.
准备工作 Alice 和 Bob 根据上例分别按照编码方法 1 以及编码方法 2 对点 P 和 Q 进行编码, 得到 4n 维向量
A
(
P
)
=
(
a
1
,
⋅
⋅
⋅
,
a
4
n
)
A(P)= (a_1, · · · , a_{4n})
A(P)=(a1,⋅⋅⋅,a4n) 以及
V
(
Q
)
=
(
v
1
,
⋅
⋅
⋅
,
v
4
n
)
V (Q) = (v_1, · · · , v_{4n})
V(Q)=(v1,⋅⋅⋅,v4n), 双方再商定一个哈希函数. 在下面, 将Paillier 加密及解密算法分别记为 E` 以及 D`.
(1) Alice 加密向量 A(P)(逐分量加密), 得到
R
‘
=
(
E
‘
(
a
1
)
,
⋅
⋅
⋅
,
E
‘
(
a
4
n
)
)
R` = (E`(a1), · · · ,E`(a4n))
R‘=(E‘(a1),⋅⋅⋅,E‘(a4n))并将 R` 发送给 Bob.
(2) Bob 选择随机数 s, 计算 v=hash(s), 利用 Paillier 加密算法加密得到 E`(s), 进一步计算
T
=
(
∏
i
=
1
4
n
(
E
‘
(
a
i
)
)
v
i
)
E
‘
(
s
)
T = ( \prod \limits_{i=1}^{4n}(E`(a_i))^{vi})E`(s)
T=(i=1∏4n(E‘(ai))vi)E‘(s)
Bob 将 v 以及 T 发送给 Alice.
(3) Alice 解密 T 得到 t` = D`(T), 并将 t` 发送给 Bob.
(4) Bob 计算 d = t` − s, 并将 d 发给 Alice.
(5) Alice 验证 hash(t`− d) = v 是否成立. 若成立, 则输出 d; 否则, 不接受 d.
解读协议2
因为Paillier同态加密: c = g m r N m o d N 2 c = g^mr^N mod N^2 c=gmrNmodN21 、 ( E ‘ ( a i ) ) v i ) = g a i v i ( r ) N v i m o d N 2 = E ‘ ( a i v i ) 1、(E`(a_i))^{vi})=g^{a_iv_i}(r)^{Nv_i}mod N^2=E`(a_iv_i) 1、(E‘(ai))vi)=gaivi(r)NvimodN2=E‘(aivi)
2 、 ∏ i = 1 4 n ( E ‘ ( a i ) ) v i = ∑ i = 1 4 n ( a i v i ) 2、\prod \limits_{i=1}^{4n}(E`(a_i))^{vi}= \sum \limits_{i=1}^{4n}(a_iv_i) 2、i=1∏4n(E‘(ai))vi=i=1∑4n(aivi)
3 、 T = ( ∏ i = 1 4 n ( E ‘ ( a i ) ) v i ) E ‘ ( s ) = ∑ i = 1 4 n ( a i v i ) + s 3、T = ( \prod \limits_{i=1}^{4n}(E`(a_i))^{vi})E`(s)=\sum \limits_{i=1}^{4n}(a_iv_i) + s 3、T=(i=1∏4n(E‘(ai))vi)E‘(s)=i=1∑4n(aivi)+s由 Paillier 加密算法的加法同态性, 协议第 (3) 步 Alice 解密可得到 t ‘ = ∑ i = 1 4 n a i u i + s , t` = \sum \limits_{i=1}^{4n} a_iu_i + s, t‘=i=1∑4naiui+s,再由 Bob 在第 (4) 步中计算可知, d = t ‘ − s = ∑ i = 1 4 n a i v i d = t` − s=\sum \limits_{i=1}^{4n}a_iv_i d=t‘−s=i=1∑4naivi
这里使用s的目的,就是给Alice一个验证的步骤,以验证Bob是否欺骗自己
\rule{14.3cm}{0.1em}
五、仿真实验
1、Paillier同态加密算法
from paillierlib import paillier
from gmpy2 import mpz
key_pair = paillier.keygen()# Optional param.: bit size (default = 2048)
m1 = mpz(50)
m2 = mpz(21)
c1 = paillier.encrypt(m1, key_pair.public_key)
c2 = paillier.encrypt(m2, key_pair.public_key)
print(paillier.decrypt(c1 + c2, key_pair.private_key))# => 71
print(paillier.decrypt(c1 - c2, key_pair.private_key))# => 29
print(paillier.decrypt(c1 + c1 + c2, key_pair.private_key))# => 121
# Multiplication (ciphertext with plaintext)
m3 = mpz(2)
print(paillier.decrypt(c1 * m3, key_pair.private_key))# => 100
2、GM加密系统代码模拟与同态性质验证
这里因为还不是特别了解这个加密算法,在参数选择上比较随意,知识仿真实验一下。
# GM(Goldwasser - Micali)概率公钥加密算法,
# 其基于二次剩余难以复合困难性问题
import math
import random
class Alice:
p = 0
q = 0
N = 0
R = 0
M = []
def __init__(self, p, q, R):
self.p = p
self.q = q
self.N = p * q
self.R = R
# 解密
def Dc(self, eM):
self.M = []
for i,em in enumerate(eM):
temp = '0'
c = int(math.sqrt(em % self.N))
# a = int(math.sqrt(em % self.q))
# 判断加密后的数组元素a, (a mod p) and (a mod q)是否是二次剩余
if c ** 2 == em:
temp = '0'
# if c ** 2 != em and a ** 2 != em:
else:
temp = '1'
self.M.append(temp)
return self.M
class Bob:
M = ''
PK = {
"R" : 0,
"N" : 0
}
C = []
def __init__(self, R, N):
self.PK['R'] = R
self.PK['N'] = N
# 加密
def Ec(self, M):
C = []
for i,m in enumerate(M):
c = 0
# 产生一个随机数,要满足randomnum是mod N的二次剩余
randomnum = random.randint(1,20000)
if m == '1':
c = (self.PK['R'] * (randomnum ** 2) ) % self.PK["N"]
else:
c = (randomnum ** 2) % self.PK["N"]
C.append(c)
return C
# 验证同态性质
def testTong(a, b):
result = []
for i in range(len(a)):
result.append(a[i] * b[i])
return result
if __name__ == '__main__':
p, q, R = 232312311797, 971179711797, 17
a = "1011011000111110000110" #
b = "0011011000101110000111" #
alice = Alice(p, q, R)
bob = Bob(R, p * q)
aa = bob.Ec(a)
alice.Dc(aa)
bb = bob.Ec(b)
print("aa: "+ str(aa))
print("bb: "+ str(bb))
print("Dc(aa): "+ str(alice.Dc(aa)))
print("Dc(bb): "+ str(alice.Dc(bb)))
#验证加密后的数据是否具有异或同态性质
temp = testTong(aa, bb)
print("temp: "+ str(temp))
print("Dc(temp): "+ str(alice.Dc(temp)))
结果:
aa: [2018287872, 81703521, 3249220625, 6064861248, 270898681, 169433033, 5980388112, 180284329, 3873024, 251001, 1537158377, 3446735057, 498293732, 305186873, 3109735625, 98565184, 132342016, 265103524, 20976400, 2332702532, 966733577, 279057025]
bb: [211033729, 15912121, 313599425, 1603820273, 316412944, 9948825, 1455506153, 294225409, 327392836, 41757444, 135094937, 289748484, 1749312512, 668106137, 3614294537, 200307409, 2515396, 26471025, 167598916, 708778433, 694362977, 1091811332]
Dc(aa): [‘1’, ‘0’, ‘1’, ‘1’, ‘0’, ‘1’, ‘1’, ‘0’, ‘0’, ‘0’, ‘1’, ‘1’, ‘1’, ‘1’, ‘1’, ‘0’, ‘0’, ‘0’, ‘0’, ‘1’, ‘1’, ‘0’]
Dc(bb): [‘0’, ‘0’, ‘1’, ‘1’, ‘0’, ‘1’, ‘1’, ‘0’, ‘0’, ‘0’, ‘1’, ‘0’, ‘1’, ‘1’, ‘1’, ‘0’, ‘0’, ‘0’, ‘0’, ‘1’, ‘1’, ‘1’]
temp: [425926815823634688, 1300076312278041, 1018953719698140625, 9726947422474480704, 85715849180926864, 1685659594536225, 8704491694344053136, 53044230436315561, 1268000311256064, 10481160201444, 207662314099837249, 998686257515403588, 871671460038774784, 203897222783139601, 11239500480951780625, 19743336624648256, 332892577678336, 7017562011392100, 3515621901582400, 1653369245286092356, 671264004491578729, 304677622169207300]
Dc(temp): [‘1’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘1’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘0’, ‘1’]
六、参考文献
[1] 方乐笛,李顺东,窦家维.曼哈顿距离的保密计算[J].密码学报,2019,6(04):512-525.
[2] https://blog.csdn.net/qq_26816591/article/details/82957481
本人才疏学浅,如有纰漏,欢迎指正,谢谢!