Multi-key Fully Homomorphic Encryption without CRS from RLWE

被引:6
作者
Luo, Fucai [1 ]
Wang, Haiyan [2 ]
Al-Kuwari, Saif [3 ]
Han, Weihong [2 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou, Peoples R China
[2] Peng Cheng Lab, Dept New Networks, Shenzhen, Peoples R China
[3] Hamad Bin Khalifa Univ, Coll Sci & Engn, Doha, Qatar
关键词
FHE; Cloud computing; Multi-key FHE; Secure multiparty computation; CRS; IDENTITY;
D O I
10.1016/j.csi.2023.103742
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fully Homomorphic Encryption (FHE) is a powerful encryption system in cloud computing that allows homo-morphic computations on encrypted data without decrypting them. Multi-key fully homomorphic encryption (MFHE), as an extension to FHE, allows homomorphic computations on ciphertexts encrypted under different keys. However, most MFHE schemes require a Common Random/Reference String (CRS), while the few that do not are based on the Learning With Errors (LWE) problem, which means that they can only deal with single bit plaintext. Consequently, MFHE schemes based on the Ring Learning With Errors (RLWE) problem are more desirable, as they can handle polynomial plaintext. Requiring the CRS seems to weaken the semantic definition of MFHE, where all users generate their own keys independently. In this paper, we study the RLWE-based MFHE in the CRS model and propose the first RLWE-based MFHE without a CRS. To this end, we remove the CRS by designing a relinearization algorithm without a CRS. Like previous MFHE schemes, our RLWE-based MFHE without CRS has a simple 1-round threshold decryption, which implies a 3-round secure MPC protocol in the plain model from the RLWE assumption.
引用
收藏
页数:9
相关论文
共 40 条
[1]   A Subfield Lattice Attack on Overstretched NTRU Assumptions Cryptanalysis of Some FHE and Graded Encoding Schemes [J].
Albrecht, Martin ;
Bai, Shi ;
Ducas, Leo .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :153-178
[2]  
Alperin-Sheriff J, 2014, LECT NOTES COMPUT SC, V8616, P297, DOI 10.1007/978-3-662-44371-2_17
[3]   Multi-key Fully-Homomorphic Encryption in the Plain Model [J].
Ananth, Prabhanjan ;
Jain, Abhishek ;
Jin, Zhengzhong ;
Malavolta, Giulio .
THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 :28-57
[4]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[5]   Multiparty Reusable Non-interactive Secure Computation from LWE [J].
Benhamouda, Fabrice ;
Jain, Aayush ;
Komargodski, Ilan ;
Lin, Huijia .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 :724-753
[6]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[7]   Four Round Secure Computation Without Setup [J].
Brakerski, Zvika ;
Halevi, Shai ;
Polychroniadou, Antigoni .
THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 :645-677
[8]   Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts [J].
Brakerski, Zvika ;
Perlman, Renen .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :190-213
[9]  
Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575
[10]   Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J].
Brakerski, Zvika .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :868-886