CRT-based fully homomorphic encryption over the integers

被引:27
|
作者
Cheon, Jung Hee [1 ]
Kim, Jinsu [1 ]
Lee, Moon Sung [1 ]
Yun, Aaram [2 ]
机构
[1] Seoul Natl Univ, Dept Math Sci, Seoul 151, South Korea
[2] Ulsan Natl Inst Sci & Technol, Sch Elect & Comp Engn, Ulsan, South Korea
基金
新加坡国家研究基金会;
关键词
Privacy homomorphism; Chinese remainder theorem; Homomorphic encryption; Approximate gcd; DGHV; CRYPTANALYSIS; KEY;
D O I
10.1016/j.ins.2015.03.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 1978, Rivest, Adleman and Dertouzos introduced the basic concept of privacy homomorphism that allows computation on encrypted data without decryption. It was an interesting work whose idea precedes the recent development of fully homomorphic encryption, although actual example schemes proposed in the paper are all susceptible to simple known-plaintext attacks. In this paper, we revisit one of their proposals, in particular the third scheme which is based on the Chinese Remainder Theorem and is ring homomorphic. It is known that only a single pair of known plaintext/ciphertext is needed to break this scheme. However, by exploiting the standard technique to insert an error to a message before encryption, we can cope with this problem. We present a secure modification of their proposal by showing that the proposed scheme is fully homomorphic and secure against the chosen plaintext attacks under the approximate GCD assumption and the sparse subset sum assumption when the message space is restricted to Z(2)(k). Interestingly, the proposed scheme can be regarded as a generalization of the DGHV scheme with larger plaintext space. Our scheme has (O) over tilde(lambda(5)) ciphertext expansion overhead while the DGHV has (O) over tilde(lambda(8)) for the security parameter lambda. When restricted to the homomorphic encryption scheme with depth of O(log lambda), the overhead is reduced to (O) over tilde(lambda). Our scheme can be used in applications requiring a large message space Z(Q) for log Q = (O) over tilde(lambda(4))or SIMD style operations on Z(Q)(k) for log Q = O(lambda), k = O(lambda(3)), with (O) over tilde(lambda(5)) ciphertext size as in the DGHV. (C) 2015 Published by Elsevier Inc.
引用
收藏
页码:149 / 162
页数:14
相关论文
共 50 条
  • [21] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [22] Cryptanalysis of a type of CRT-based RSA algorithms
    Qin, Bao-Dong
    Li, Ming
    Kong, Fan-Yu
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (02) : 214 - 221
  • [23] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254
  • [24] Survey on Fully Homomorphic Encryption, Theory, and Applications
    Marcolla, Chiara
    Sucasas, Victor
    Manzano, Marc
    Bassoli, Riccardo
    Fitzek, Frank H. P.
    Aaraj, Najwa
    PROCEEDINGS OF THE IEEE, 2022, 110 (10) : 1572 - 1609
  • [25] Secure Collapsing Method Based on Fully Homomorphic Encryption
    Niyitegeka, David
    Bellafqira, Reda
    Genin, Emmanuelle
    Coatrieux, Gouenou
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 412 - 416
  • [26] LWR-Based Fully Homomorphic Encryption, Revisited
    Luo, Fucai
    Wang, Fuqun
    Wang, Kunpeng
    Li, Jie
    Chen, Kefei
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [27] Bootstrappable Identity-Based Fully Homomorphic Encryption
    Clear, Michael
    McGoldrick, Ciaran
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 1 - +
  • [28] Hybrid Algorithm for Symmetric Based Fully Homomorphic Encryption
    Muhammed, Kamaldeen Jimoh
    Isiaka, Rafiu Mope
    Asaju-Gbolagade, Ayisat Wuraola
    Adewole, Kayode Sakariyah
    Gbolagade, Kazeem Alagbe
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 377 - 390
  • [29] Towards an efficient LWE-based fully homomorphic encryption scheme
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IET INFORMATION SECURITY, 2022, 16 (04) : 235 - 252
  • [30] Security analysis of CRT-based cryptosystems
    Okeya K.
    Takagi T.
    International Journal of Information Security, 2006, 5 (3) : 177 - 185