Packed Ciphertexts in LWE-Based Homomorphic Encryption

被引:0
|
作者
Brakerski, Zvika [1 ]
Gentry, Craig [2 ]
Halevi, Shai [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] IBM Res, Yorktown Hts, NY USA
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2013 | 2013年 / 7778卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this short note we observe that the Peikert-Vaikuntanathan-Waters (PVW) method of packing many plaintext elements in a single Regev-type ciphertext, can be used for performing SIMD homomorphic operations on packed ciphertext. This provides an alternative to the Smart-Vercauteren (SV) ciphertext-packing technique that relies on polynomial-CRT. While the SV technique is only applicable to schemes that rely on ring-LWE (or other hardness assumptions in ideal lattices), the PVW method can be used also for cryptosystems whose security is based on standard LWE (or more broadly on the hardness of "General-LWE"). Although using the PVW method with LWE-based schemes leads to worse asymptotic efficiency than using the SV technique with ring-LWE schemes, the simplicity of this method may still offer some practical advantages. Also, the two techniques can be used in tandem with "general-LWE" schemes, suggesting yet another tradeoff that can be optimized for different settings.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [1] Towards an efficient LWE-based fully homomorphic encryption scheme
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IET INFORMATION SECURITY, 2022, 16 (04) : 235 - 252
  • [2] An Efficient LWE-Based Additively Homomorphic Encryption with Shorter Public Keys
    Challa, Ratnakumari
    Gunta, VijayaKumari
    PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 : 171 - 177
  • [3] Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching
    Li, Zengpeng
    Ma, Chunguang
    Du, Gang
    Ouyang, Weiping
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 1169 - 1174
  • [4] A Homomorphic LWE-Based Verifiable Electronic Voting System
    Wu, Chen
    Tang, Shaohua
    Yan, Xingfu
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 98 - 105
  • [5] Design Procedure for Dynamic Controllers based on LWE-based Homomorphic Encryption to Operate for Infinite Time Horizon
    Kim, Junsoo
    Shim, Hyungbo
    Han, Kyoohyung
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 5463 - 5468
  • [6] Better Key Sizes (and Attacks) for LWE-Based Encryption
    Lindner, Richard
    Peikert, Chris
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 319 - +
  • [7] A LWE-Based Receiver-Deniable Encryption Scheme
    Chi, Po-Wen
    Wang, Ming-Hung
    Chuang, Yun-Hsin
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 124 - 133
  • [8] Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE)
    Antwi-Boasiako, Emmanuel
    Zhou, Shijie
    Liao, Yongjian
    Dong, Yingjie
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [9] Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
    Chen, Hao
    Dai, Wei
    Kim, Miran
    Song, Yongsoo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 460 - 479
  • [10] Proficient LWE-Based Encryption Using CAN Compression Algorithm
    Challa, RatnaKumari
    VijayaKumari, G.
    Sruthi, P. Satya
    2015 CONFERENCE ON POWER, CONTROL, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES FOR SUSTAINABLE GROWTH (PCCCTSG), 2015, : 304 - 307