Fully homomorphic encryption based on the ring learning with rounding problem

被引:5
|
作者
Luo, Fucai [1 ,2 ,3 ]
Wang, Fuqun [4 ,5 ]
Wang, Kunpeng [2 ,3 ]
Chen, Kefei [4 ,5 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[4] Hangzhou Normal Univ, Dept Math, Hangzhou, Zhejiang, Peoples R China
[5] Westone Cryptol Res Ctr, Beijing, Peoples R China
关键词
public key cryptography; deterministic variant; LWR instance; homomorphic operations; RLWR-based FHE scheme; RLWR assumption; fully homomorphic encryption schemes; ring learning with rounding problem; RLWR problem; learning with errors; relinearisation method; IND-CPA;
D O I
10.1049/iet-ifs.2018.5427
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all existing well-known fully homomorphic encryption (FHE) schemes, which are based on either the learning with errors (LWE) or the ring LWE problem, require expensive Gaussian noise sampling. In this study, the authors propose an FHE scheme based on the ring learning with rounding (RLWR) problem. The learning with rounding (LWR) problem was proposed as a deterministic variant of LWE, while the RLWR is a variant of LWR. Sampling an LWR instance does not require Gaussian noise sampling process, and neither does an RLWR instance. Thus, our FHE scheme can be instantiated without the need for Gaussian noise sampling. To implement homomorphic operations, we devise a specific relinearisation method. Furthermore, we also prove that our RLWR-based FHE scheme is IND-CPA secure under RLWR assumption.
引用
收藏
页码:639 / 648
页数:10
相关论文
共 50 条
  • [1] Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
    Luo, Fucai
    Wang, Kunpeng
    Lin, Changlu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 101 - 115
  • [2] Fully Homomorphic Encryption Scheme Based on Decomposition Ring
    Arita, Seiko
    Handa, Sari
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 195 - 211
  • [3] Identity-based fully homomorphic encryption from learning with error problem
    Guang, Yan
    Zhu, Yue-Fei
    Fei, Jin-Long
    Gu, Chun-Xiang
    Zheng, Yong-Hui
    Guang, Y., 1600, Editorial Board of Journal on Communications (35): : 111 - 117
  • [4] Statistical learning based fully homomorphic encryption on encrypted data
    Linzhi Jiang
    Chunxiang Xu
    Xiaofang Wang
    Chao Lin
    Soft Computing, 2017, 21 : 7473 - 7483
  • [5] Statistical learning based fully homomorphic encryption on encrypted data
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Lin, Chao
    SOFT COMPUTING, 2017, 21 (24) : 7473 - 7483
  • [6] Private Machine Learning Classification Based on Fully Homomorphic Encryption
    Sun, Xiaoqiang
    Zhang, Peng
    Liu, Joseph K.
    Yu, Jianping
    Xie, Weixin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 352 - 364
  • [7] Fully Homomorphic Encryption for Classification in Machine Learning
    Arita, Seiko
    Nakasato, Shota
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 435 - 438
  • [8] CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
    Boura, Christina
    Gama, Nicolas
    Georgieva, Mariya
    Jetchev, Dimitar
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 316 - 338
  • [9] Deniable Fully Homomorphic Encryption from Learning with Errors
    Agrawal, Shweta
    Goldwasser, Shafi
    Mossel, Saleet
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 641 - 670
  • [10] Fully Homomorphic Encryption Based On the Parallel Computing
    Tan, Delin
    Wang, Huajun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 497 - 522