Multi-key Fully Homomorphic Encryption from Additive Homomorphism

被引:1
作者
Xu, Wenju [1 ]
Wang, Baocang [1 ,2 ]
Hu, Yupu [1 ]
Duan, Pu [3 ]
Zhang, Benyu [3 ]
Liu, Momeng [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Cryptog Res Ctr, Xian 710071, Peoples R China
[3] Ant Grp, Hangzhou 310000, Peoples R China
[4] Xian Polytech Univ, Sch Comp Sci, Shaanxi Key Lab Clothing Intelligence, Xian 710048, Peoples R China
基金
中国国家自然科学基金;
关键词
Fully Homomorphic Encryption; Multi Keys; Additively Homomorphic Encryption; Encryption Switching Protocol; Instantiation; CRYPTOSYSTEM;
D O I
10.1093/comjnl/bxab154
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fully homomorphic encryption (FHE) allows direct computations over the encrypted data without access to the decryption. Hence multi-key FHE is well suitable for secure multiparty computation. Recently, Brakerski et al. (TCC 2019 and EUROCRYPT 2020) utilized additively homomorphic encryption to construct FHE schemes with different properties. Motivated by their work, we are attempting to construct multi-key FHE schemes via additively homomorphic encryption. In this paper, we propose a general framework of constructing multi-key FHE, combining the additively homomorphic encryption with specific multiparty computation protocols constructed from encryption switching protocol. Concretely, every involved party encrypts his plaintexts with an additively homomorphic encryption under his own public key. Then the ciphertexts are evaluated by suitable multiparty computation protocols performed by two cooperative servers without collusion. Furthermore, an instantiation with an ElGamal variant scheme is presented. Performance comparisons show that our multi-key FHE from additively homomorphic encryption is more efficient and practical.
引用
收藏
页码:197 / 207
页数:11
相关论文
共 31 条
  • [1] Multi-key Fully-Homomorphic Encryption in the Plain Model
    Ananth, Prabhanjan
    Jain, Abhishek
    Jin, Zhengzhong
    Malavolta, Giulio
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 : 28 - 57
  • [2] More Efficient Commitments from Structured Lattice Assumptions
    Baum, Carsten
    Damgard, Ivan
    Lyubashevsky, Vadim
    Oechsner, Sabine
    Peikert, Chris
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 368 - 385
  • [3] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [4] Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
  • [5] Candidate iO from Homomorphic Encryption Schemes
    Brakerski, Zvika
    Doettling, Nico
    Garg, Sanjam
    Malavolta, Giulio
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 79 - 109
  • [6] Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
    Brakerski, Zvika
    Doettling, Nico
    Garg, Sanjam
    Malavolta, Giulio
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2019, PT II, 2019, 11892 : 407 - 437
  • [7] Efficient Fully Homomorphic Encryption from (Standard) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 97 - 106
  • [8] Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
  • [9] Castagnos Guilhem, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P487, DOI 10.1007/978-3-319-16715-2_26
  • [10] Encryption Switching Protocols Revisited: Switching Modulo p
    Castagnos, Guilhem
    Imbert, Laurent
    Laguillaumie, Fabien
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 255 - 287