Bootstrappable Identity-Based Fully Homomorphic Encryption

被引:0
作者
Clear, Michael [1 ]
McGoldrick, Ciaran [1 ]
机构
[1] Trinity Coll Dublin, Sch Comp Sci & Stat, Dublin, Ireland
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2014 | 2014年 / 8813卷
关键词
KEY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been an open problem for a number of years to construct an identity-based fully homomorphic encryption (IBFHE) scheme (first mentioned by Naccache at CHES/CRYPTO 2010). At CRYPTO 2013, Gentry, Sahai and Waters largely settled the problem by presenting leveled IBFHE constructions based on the Learning With Errors problem. However their constructions are not bootstrappable, and as a result, are not "pure" IBFHE schemes. The major challenge with boot-strapping in the identity-based setting is that it must be possible to noninteractively derive from the public parameters an "encryption" of the secret key for an arbitrary identity. All presently-known leveled IBFHE schemes only allow bootstrapping if such an "encryption" of the secret key is supplied out-of-band. In this work, we present a "pure" IBFHE scheme from indistinguishability obfuscation, and extend the result to the attribute-based setting. Our attribute-based scheme is the first to support homomorphic evaluation on ciphertexts with different attributes. Finally, we characterize presently-known leveled IBFHE schemes with a view to developing a "compiler" from a leveled IBFHE scheme to a bootstrappable IBFHE scheme, and sufficient conditions are identified.
引用
收藏
页码:1 / +
页数:4
相关论文
共 26 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[3]  
[Anonymous], IACR CRYPTOLOGY EPRI
[4]  
[Anonymous], 2011, 2011344 CRYPT EPRINT
[5]  
[Anonymous], 2014491 CRYPT EPRINT
[6]  
[Anonymous], 2010, COMMUNICATION
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Boneh D., 2004, IACR CRYPTOLOGY EPRI, V2004, P172
[10]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15