Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error
نویسندگان
چکیده
As cloud computing and AI as a Service are provided, it is increasingly necessary to deal with privacy sensitive data. To the data, there two cases of outsourcing process: i) many clients participate dynamically ii) pre-determined. The solutions for protecting data in both multi-key homomorphic encryption (MKHE) scheme threshold (TMKHE) scheme. However, these schemes may be difficult limited resources perform MKHE TMKHE. In addition, due large size evaluation keys, particular multiplication rotation communication between server that provide service increases. Also, keys must hold tremendous, particular, which essential bootstrapping operation. this paper, we propose variant TMKHE reduced keys. reduce ring learning errors (RLWE), called RLWE reusing (ReRLWE). ReRLWE generates other components by error used when generating an sample. We prove can modified under assumption, For MKHE, 66% 25%, respectively. TMKHE, 50%
منابع مشابه
Multi-key Homomorphic Authenticators
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elementsm1, . . . ,mt and outsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can generate a short authenticator vouching for the correctness of the output y of a function f computed on the outsourced data, i.e., y = f(m1, . . . ,mt). Recent...
متن کاملA Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism
Homomorphic signatures (HS) allow evaluation of signed messages by producing a signature on a function of messages signed by the same key. Motivated by the vast potential of applications, we initiate the study of multi-key HS (M-HS) which allows evaluation of signatures under different keys. We also study other multi-key extensions, namely, hierarchical HS (M-HiHS) for delegation of signing pow...
متن کاملDistributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance
In this paper, a construction of distributed multi-user, multikey searchable encryptions is proposed and analyzed. Our scheme leverages a combination of the Shamir’s threshold secret key sharing, the Pohlig-Hellman function and the ElGamal encryption scheme to provide high reliability with limited storage overhead. It achieves the semantic security in the context of the keyword hiding, the sear...
متن کاملConstruction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion from any stag-CCAsecure threshold tag-based encryption schemes to CCA-secure threshold public-key encryption schemes. Moreover, we give two concrete constructions of stag-CCA-secure threshold tag-based encryption schemes...
متن کاملMulti-Key Homomorphic Signatures Unforgeable under Insider Corruption
Homomorphic signatures (HS) allows the derivation of the signature of the message-function pair (m, g), where m = g(m1, . . . ,mK), given the signatures of each of the input messages mk signed under the same key. Multi-key HS (M-HS) introduced by Fiore et al. (ASIACRYPT’16) further enhances the utility by allowing evaluation of signatures under different keys. While the unforgeability of existi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3277862