Towards an efficient LWE-based fully homomorphic encryption scheme

被引:6
作者
Dowerah, Uddipana [1 ]
Krishnaswamy, Srinivasan [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Elect & Elect Engn, Gauhati 781039, Assam, India
关键词
cryptography; ryptographic protocols; MULTI-IDENTITY; POLLY CRACKER; KEY; SYSTEMS; CRYPTANALYSIS; SECURITY;
D O I
10.1049/ise2.12052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public-key size. More efficient schemes were later developed based on the hardness of the Ring-LWE (RLWE) problem. While the hardness of the LWE problem is based on the hardness of the approximate shortest vector problem (GapSVP(gamma)) over regular lattices, the hardness of the RLWE problem is based on the hardness of the approximate shortest vector problem over ideal lattices. As of now, it has not been proved that the (GapSVP(gamma)) problem over ideal lattices is as difficult as the corresponding problem over regular lattices. In this work, the authors propose a multi-bit levelled fully homomorphic encryption scheme using multivariate polynomial evaluations whose security depends on the hardness of the LWE problem. In terms of per gate computation cost, this scheme is more efficient than existing LWE-based schemes. Further, for an appropriate choice of parameters, the per computation cost for homomorphic multiplication can be made asymptotically comparable to RLWE-based schemes in a parallel computing environment. For homomorphic multiplication, the scheme uses a polynomial-based technique that does not require relinearization (and key switching).
引用
收藏
页码:235 / 252
页数:18
相关论文
共 85 条
[11]  
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[12]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[13]  
Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575
[14]   EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
SIAM JOURNAL ON COMPUTING, 2014, 43 (02) :831-871
[15]   Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J].
Brakerski, Zvika .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :868-886
[16]  
Brakerski Z, 2013, LECT NOTES COMPUT SC, V7778, P1, DOI 10.1007/978-3-642-36362-7_1
[17]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[18]  
Brakerski Zvika., 2014, ITCS, P1
[19]  
Carpov Sergiu, 2015, P 3 INT WORKSH SEC C, P13, DOI [DOI 10.1145/2732516.2732520, 10.1145/2732516.2732520]
[20]  
Cathebras J., 2018, THESIS U PARIS SACLA