Multi-key FHE without ciphertext-expansion in two-server model

被引:0
作者
Bingbing Jiang
机构
[1] Nanjing University,Department of Computer Science and Technology
来源
Frontiers of Computer Science | 2022年 / 16卷
关键词
multi-key FHE; secret sharing; secure computation;
D O I
暂无
中图分类号
学科分类号
摘要
López-Alt et al.(STOC12) put forward a primitive called multi-key fully homomorphic encryption (MKFHE), in which each involved party encrypts their own data using keys that are independently and randomly chosen whereby arbitrary computations can be performed on these encrypted data by a final collector. Subsequently, several superior schemes based on the standard assumption (LWE) were proposed. Most of these schemes were constructed by expanding a fresh GSW-ciphertext or BGV-ciphertext under a single key to a new same-type ciphertext of the same message under a combination of associated parties’ keys. Therefore, the new ciphertext’s size grew more or less linearly with an increase in the number of parties. In this paper, we proposed a novel and simple scheme of MKFHE based on LWE without increasing the size of the ciphertext in the two non-collusion server model. In other words, each party first independently shares their own data between two servers and each server only needs a one-round communication with another to construct a ciphertext of the same plaintext under a sum of associated parties’ keys. Our new ciphertext under multiple keys has the same size as that of the original one with only one-round communication between two servers. The communication complexity is O(kmlogq)- bit, where k is the number of input ciphertexts involved, m is the size of a GSW-ciphertext and q is a modulus. In conclusion, we proved that our scheme is CPA-secure against semi-honest adversaries.
引用
收藏
相关论文
共 10 条
  • [1] Li Z P(2018)Multi-key FHE for multi-bit messages Science China Information Science 61 1-3
  • [2] Ma C G(2018)Efficient multi-key FHE with short extended ciphertexts and less public parameters IACR Cryptogology ePrint Archive 2018 1054-3
  • [3] Zhou H S(2018)Securely min and Science China Information Science 61 1-undefined
  • [4] Zhou T P(undefined)th min computations with fully homomorphic encryption undefined undefined undefined-undefined
  • [5] Li N B(undefined)undefined undefined undefined undefined-undefined
  • [6] Yang X Y(undefined)undefined undefined undefined undefined-undefined
  • [7] Han Y L(undefined)undefined undefined undefined undefined-undefined
  • [8] Liu W C(undefined)undefined undefined undefined undefined-undefined
  • [9] Jiang B B(undefined)undefined undefined undefined undefined-undefined
  • [10] Zhang Y(undefined)undefined undefined undefined undefined-undefined