An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
نویسندگان
چکیده
Abstract We propose and implement a multiparty homomorphic encryption (MHE) scheme with $$t$$ t -out-of- $$N$$ N -threshold access-structure that is efficient does not require trusted dealer in the common random string model. construct this from ring-learning-with-error assumptions as an extension of MHE Mouchet et al. (PETS 21). By means specially adapted share re-sharing procedure, can be used to relax original into one. This procedure introduces only single round communication during setup phase, after which any set at least t parties compute additive sharing secret-key no interaction; new directly show that, by performing Shamir over ciphertext-space ring carefully chosen exceptional set, reconstruction made secure has negligible overhead. Moreover, it requires store constant-size state its phase. Hence, addition fault tolerance, lowering corruption threshold also yields considerable efficiency benefits, enabling distribution batched operations among online parties. implemented open-sourced our Lattigo library.
منابع مشابه
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption
We present a new general multiparty computation protocol for the cryptographic scenario which is universally composable — in particular, it is secure against an active and adaptive adversary, corrupting any minority of the parties. The protocol is as efficient as the best known statically secure solutions, in particular the number of bits broadcast (which dominates the complexity) is Ω(nk|C|), ...
متن کاملMultiparty Computation from Threshold Homomorphic Encryption
We introduce a new approach to multiparty computation (MPC) basing it on homomorphic threshold crypto-systems. We show that given keys for any sufficiently efficient system of this type, general MPC protocols for n players can be devised which are secure against an active adversary that corrupts any minority of the players. The total number of bits sent is O(nk|C|), where k is the security para...
متن کاملThreshold Fully Homomorphic Encryption
We formally define and give the first construction of (leveled) threshold fully homomorphic encryption for any access structure induced by a monotone boolean formula and in particular for the threshold access structure. Our construction is based on the learning with errors assumption and can be instantiated with any existing homomorphic encryption scheme that satisfies fairly general conditions...
متن کاملSemi-homomorphic Encryption and Multiparty Computation
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted input by manipulating only the ciphertexts. We define the relaxed notion of a semi-homomorphic encryption scheme, where the plaintext can be recovered as long as the computed function does not increase the size of the input “too much”. We show that a number of existing cryptosystems are captured b...
متن کاملMultiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithmetic circuits over any finite field Fpk . Our protocol consists of a preprocessing phase that is both independent of the function to be computed and of the inputs, and a much more efficient online phase where the actual...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2023
ISSN: ['0933-2790', '1432-1378']
DOI: https://doi.org/10.1007/s00145-023-09452-8