A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption

被引:50
作者
Cheon, Jung Hee [1 ]
Kim, Jinsu [1 ]
机构
[1] Seoul Natl Univ, Dept Math Sci, Seoul 151742, South Korea
关键词
ElGamal; Goldwasser-Micali; Naccache-Stern; hybrid scheme; homomorphic encryption; fully homomorphic encryption; bootstrapping;
D O I
10.1109/TIFS.2015.2398359
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a hybrid homomorphic encryption that combines public-key encryption (PKE) and somewhat homomorphic encryption (SHE) to reduce the storage requirements of most somewhat or fully homomorphic encryption (FHE) applications. In this model, messages are encrypted with a PKE and computations on encrypted data are carried out using SHE or FHE after homomorphic decryption. To obtain efficient homomorphic decryption, our hybrid scheme combines IND-CPA PKE without complicated message padding with SHE with a large integer message space. Furthermore, if the underlying PKE is multiplicative, the proposed scheme has the advantage that polynomials of arbitrary degree can be evaluated without bootstrapping. We construct this scheme by concatenating the ElGamal and Goldwasser-Micali schemes over a ring Z(N) for a composite integer N whose message space is Z(N)(x). To accelerate the homomorphic evaluation of the PKE decryption, we introduce a method to reduce the degree of the exponentiation circuit at the cost of additional public keys. Using the same technique, we present an efficient partial solution to an open problem which is to evaluate mod q mod p arithmetic homomorphically for large p. As an independent interest, we also obtain a generic method for converting from private-key SHE to public-key SHE. Unlike the method described by Rothblum, we are free to choose the SHE message space.
引用
收藏
页码:1052 / 1063
页数:12
相关论文
共 22 条
  • [1] [Anonymous], 1985, LNCS, DOI [DOI 10.1007/3-540-39568-72, DOI 10.1007/3-540-39568-7_2]
  • [2] Barbulescu R., 2013, QUASIPOLYNOMIAL ALGO
  • [3] Cheon JH, 2013, LECT NOTES COMPUT SC, V7881, P315, DOI 10.1007/978-3-642-38348-9_20
  • [4] Chung KM, 2010, LECT NOTES COMPUT SC, V6223, P483, DOI 10.1007/978-3-642-14623-7_26
  • [5] Coron JS, 2014, LECT NOTES COMPUT SC, V8383, P311, DOI 10.1007/978-3-642-54631-0_18
  • [6] Fan Junfeng, 2012, IACR Cryptol. ePrint Arch., V144
  • [7] Homomorphic Evaluation of the AES Circuit
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 850 - 867
  • [8] Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
    Gentry, Craig
    Halevi, Shai
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 107 - 116
  • [9] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [10] PROBABILISTIC ENCRYPTION
    GOLDWASSER, S
    MICALI, S
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) : 270 - 299