Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts

被引:94
作者
Brakerski, Zvika [1 ]
Perlman, Renen [2 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
[2] Tel Aviv Univ, Tel Aviv, Israel
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I | 2016年 / 9814卷
基金
以色列科学基金会;
关键词
D O I
10.1007/978-3-662-53018-4_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a multi-key fully homomorphic encryption scheme that supports an unbounded number of homomorphic operations for an unbounded number of parties. Namely, it allows to perform arbitrarily many computational steps on inputs encrypted by an a-priori unbounded (polynomial) number of parties. Inputs from new parties can be introduced into the computation dynamically, so the final set of parties needs not be known ahead of time. Furthermore, the length of the ciphertexts, as well as the space complexity of an atomic homomorphic operation, grow only linearly with the current number of parties. Prior works either supported only an a-priori bounded number of parties (Lopez-Alt, Tromer and Vaikuntanthan, STOC '12), or only supported single-hop evaluation where all inputs need to be known before the computation starts (Clear and McGoldrick, Crypto '15, Mukherjee and Wichs, Eurocrypt '16). In all aforementioned works, the ciphertext length grew at least quadratically with the number of parties. Technically, our starting point is the LWE-based approach of previous works. Our result is achieved via a careful use of Gentry's bootstrapping technique, tailored to the specific scheme. Our hardness assumption is that the scheme of Mukherjee and Wichs is circular secure (and thus bootstrappable). A leveled scheme can be achieved under standard LWE.
引用
收藏
页码:190 / 213
页数:24
相关论文
共 23 条
  • [1] More on average case vs approximation complexity
    Alekhnovich, M
    [J]. 44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 298 - 307
  • [2] [Anonymous], IACR CRYPTOLOGY EPRI
  • [3] [Anonymous], BARRINGTONS THEOREM
  • [4] [Anonymous], 1978, FDN SEC COMPUT
  • [5] [Anonymous], 2014, LNCS
  • [7] Blum Avrim, 1993, LNCS, P278, DOI DOI 10.1007/3-540-48329-224
  • [8] Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
  • [9] Efficient Fully Homomorphic Encryption from (Standard) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 97 - 106
  • [10] Brakerski Zvika., 2014, P 5 C INNOVATIONS TH, P1, DOI DOI 10.1145/2554797.2554799