Fully homomorphic encryption based on the ring learning with rounding problem

被引:5
|
作者
Luo, Fucai [1 ,2 ,3 ]
Wang, Fuqun [4 ,5 ]
Wang, Kunpeng [2 ,3 ]
Chen, Kefei [4 ,5 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[4] Hangzhou Normal Univ, Dept Math, Hangzhou, Zhejiang, Peoples R China
[5] Westone Cryptol Res Ctr, Beijing, Peoples R China
关键词
public key cryptography; deterministic variant; LWR instance; homomorphic operations; RLWR-based FHE scheme; RLWR assumption; fully homomorphic encryption schemes; ring learning with rounding problem; RLWR problem; learning with errors; relinearisation method; IND-CPA;
D O I
10.1049/iet-ifs.2018.5427
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all existing well-known fully homomorphic encryption (FHE) schemes, which are based on either the learning with errors (LWE) or the ring LWE problem, require expensive Gaussian noise sampling. In this study, the authors propose an FHE scheme based on the ring learning with rounding (RLWR) problem. The learning with rounding (LWR) problem was proposed as a deterministic variant of LWE, while the RLWR is a variant of LWR. Sampling an LWR instance does not require Gaussian noise sampling process, and neither does an RLWR instance. Thus, our FHE scheme can be instantiated without the need for Gaussian noise sampling. To implement homomorphic operations, we devise a specific relinearisation method. Furthermore, we also prove that our RLWR-based FHE scheme is IND-CPA secure under RLWR assumption.
引用
收藏
页码:639 / 648
页数:10
相关论文
共 50 条
  • [31] LWR-Based Fully Homomorphic Encryption, Revisited
    Luo, Fucai
    Wang, Fuqun
    Wang, Kunpeng
    Li, Jie
    Chen, Kefei
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [32] Bootstrappable Identity-Based Fully Homomorphic Encryption
    Clear, Michael
    McGoldrick, Ciaran
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 1 - +
  • [33] Hybrid Algorithm for Symmetric Based Fully Homomorphic Encryption
    Muhammed, Kamaldeen Jimoh
    Isiaka, Rafiu Mope
    Asaju-Gbolagade, Ayisat Wuraola
    Adewole, Kayode Sakariyah
    Gbolagade, Kazeem Alagbe
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 377 - 390
  • [34] Hardware Trojan Prevention Based on Fully Homomorphic Encryption
    Xie, Hongfeng
    Li, Huiyun
    Xu, Guoqing
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2015, : 1104 - 1109
  • [35] Privacy Protection of IoT Based on Fully Homomorphic Encryption
    Song, Wei-Tao
    Hu, Bin
    Zhao, Xiu-Feng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [36] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [37] Recent advances of privacy-preserving machine learning based on(Fully) Homomorphic Encryption
    Cheng Hong
    Security and Safety, 2025, 4 (01) : 49 - 55
  • [38] Noiseless homomorphic encryption for complex numbers and fully homomorphic encryption with modular arithmetic
    Chun, Jonghee
    Han, Hee
    Kang, Stefano V.
    Wang, Hyo Keun
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2024,
  • [39] Unlocking the Potential of Fully Homomorphic Encryption
    Gorantala, Shruthi
    Springer, Rob
    Gipson, Bryant
    COMMUNICATIONS OF THE ACM, 2023, 66 (05) : 72 - 81
  • [40] KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION
    Habri, Hakim
    Chillali, Abdelhakim
    Boua, Abdelkarim
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2022, 54 : 35 - 50