Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS

被引:13
作者
Kim, Eunkyung [1 ]
Lee, Hyang-Sook [2 ]
Park, Jeongeun [2 ]
机构
[1] Samsung SDS, Secur Res Team, E Tower,Seongchongil 56, Seoul 06765, South Korea
[2] Ewha Womans Univ, Dept Math, Ewhayeodaegil 52, Seoul 03760, South Korea
基金
新加坡国家研究基金会;
关键词
Multikey FHE; LWE assumption; multiparty computation; lattice;
D O I
10.1142/S012905412050001X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multikey fully homomorphic encryption (MFHE) allows homomorphic operations between ciphertexts encrypted under different keys. In applications for secure multiparty computation (MPC) protocols, MFHE can be more advantageous than usual fully homomorphic encryption (FHE) since users do not need to agree with a common public key before the computation when using MFHE. In EUROCRYPT 2016, Mukherjee and Wichs constructed a secure MPC protocol in only two rounds via MFHE which deals with a common random/reference string (CRS) in key generation. After then, Brakerski et al. replaced the role of CRS with the distributed setup for CRS calculation to form a four round secure MPC protocol. Thus, recent improvements in round complexity of MPC protocols have been made using MFHE. In this paper, we go further to obtain round-efficient and secure MPC protocols. The underlying MFHE schemes in previous works still involve the common value, CRS, it seems to weaken the power of using MFHE to allow users to independently generate their own keys. Therefore, we resolve the issue by constructing an MFHE scheme without CRS based on LWE assumption, and then we obtain a secure MPC protocol against semi-malicious security in three rounds. We also define a new security notion "multikey-CPA security" to prove that a multikey ciphertext cannot be decrypted unless all the secret keys are gathered and our scheme is multikey-CPA secure.
引用
收藏
页码:157 / 174
页数:18
相关论文
共 14 条
[1]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[2]  
Asharov Gilad., 2011, Report 2011/613, P613
[3]   Four Round Secure Computation Without Setup [J].
Brakerski, Zvika ;
Halevi, Shai ;
Polychroniadou, Antigoni .
THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 :645-677
[4]   Multi-identity and Multi-key Leveled FHE from Learning with Errors [J].
Clear, Michael ;
McGoldrick, Ciaran .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :630-656
[5]   Two-Round Multiparty Secure Computation from Minimal Assumptions [J].
Garg, Sanjam ;
Srinivasan, Akshayaram .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 :468-499
[6]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[7]  
Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5
[8]  
Goldreich O., P 19 ANN ACM S THEOR
[9]   Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS [J].
Kim, Eunkyung ;
Lee, Hyang-Sook ;
Park, Jeongeun .
INFORMATION SECURITY AND PRIVACY, 2018, 10946 :101-113
[10]  
López-Alt A, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1219