| CPC H04L 9/008 (2013.01) [H04L 9/0618 (2013.01)] | 9 Claims |

|
1. A confidential computing-based method for customizedly balancing between security and performance of homomorphic encryption, comprising:
receiving a computing task, a security custom parameter and a performance custom parameter, and encrypted computing data; customizing one of security and performance by a user based on corresponding one of the security custom parameter and the performance custom parameter;
when security customization is performed by the user, dividing computing data into a plurality of security levels according to the security custom parameter, and according to the security levels of data involved in computing, executing partial corresponding computing task outside a trusted execution environment, and executing partial computing task in the trusted execution environment;
when performance customization is performed by the user, dynamically allocating resources according to the performance custom parameter, executing partial computing task in the trusted execution environment, and partial computing task outside the trusted execution environment with a performance requirement customized by the user being satisfied; and
returning a computing result to a request side;
the performance custom parameter comprises a performance threshold, and resources are allocated dynamically through following ways:
acquiring a plurality of computing operators of a current computing task;
acquiring a predetermined performance parameter table of the current computing task, wherein the predetermined performance parameter table comprises homomorphic encryption (HE) computation time, trusted execution environment (TEE) computation time and computation time difference of each computing operator; and
dynamically allocating resources according to the predetermined performance parameter table to generate a plurality of pre-allocation schemes, and determining an optimal allocation scheme according to a performance enhancement factor P of each pre-allocation scheme;
![]() wherein Mi≤m denotes the computing task, m denotes a number of a plurality of subtasks contained in the computing task; THE(Mi≤m) denotes time consumption of homomorphic encryption computing for the computing task, and T(Mi≤m) denotes time capable of saved by a corresponding pre-allocation scheme.
|