Towards an efficient LWE-based fully homomorphic encryption scheme

被引:6
作者
Dowerah, Uddipana [1 ]
Krishnaswamy, Srinivasan [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Elect & Elect Engn, Gauhati 781039, Assam, India
关键词
cryptography; ryptographic protocols; MULTI-IDENTITY; POLLY CRACKER; KEY; SYSTEMS; CRYPTANALYSIS; SECURITY;
D O I
10.1049/ise2.12052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public-key size. More efficient schemes were later developed based on the hardness of the Ring-LWE (RLWE) problem. While the hardness of the LWE problem is based on the hardness of the approximate shortest vector problem (GapSVP(gamma)) over regular lattices, the hardness of the RLWE problem is based on the hardness of the approximate shortest vector problem over ideal lattices. As of now, it has not been proved that the (GapSVP(gamma)) problem over ideal lattices is as difficult as the corresponding problem over regular lattices. In this work, the authors propose a multi-bit levelled fully homomorphic encryption scheme using multivariate polynomial evaluations whose security depends on the hardness of the LWE problem. In terms of per gate computation cost, this scheme is more efficient than existing LWE-based schemes. Further, for an appropriate choice of parameters, the per computation cost for homomorphic multiplication can be made asymptotically comparable to RLWE-based schemes in a parallel computing environment. For homomorphic multiplication, the scheme uses a polynomial-based technique that does not require relinearization (and key switching).
引用
收藏
页码:235 / 252
页数:18
相关论文
共 85 条
[41]   Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Grobner bases [J].
Faugère, JC ;
Joux, A .
ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 :44-60
[42]  
Fellows M., 1993, CONT MATH VOLUME, V168 of Finite Fields: Theory, Applications, and Algorithms, FQ2, P51
[43]  
Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5
[44]  
Gentry C, 2012, LECT NOTES COMPUT SC, V7293, P1, DOI 10.1007/978-3-642-30057-8_1
[45]  
Gentry C, 2012, LECT NOTES COMPUT SC, V7237, P465, DOI 10.1007/978-3-642-29011-4_28
[46]  
Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
[47]  
Gentry Craig, 2009, THESIS STANFORD U
[48]  
Halevi Shai, 2019, Topics in Cryptology - CT-RSA 2019. The Cryptographers Track at the RSA Conference 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11405), P83, DOI 10.1007/978-3-030-12612-4_5
[49]   Faster Homomorphic Linear Transformations in HElib [J].
Halevi, Shai ;
Shoup, Victor .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :93-120
[50]   Bootstrapping for HElib [J].
Halevi, Shai ;
Shoup, Victor .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :641-670