Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error

نویسندگان

چکیده

As cloud computing and AI as a Service are provided, it is increasingly necessary to deal with privacy sensitive data. To the data, there two cases of outsourcing process: i) many clients participate dynamically ii) pre-determined. The solutions for protecting data in both multi-key homomorphic encryption (MKHE) scheme threshold (TMKHE) scheme. However, these schemes may be difficult limited resources perform MKHE TMKHE. In addition, due large size evaluation keys, particular multiplication rotation communication between server that provide service increases. Also, keys must hold tremendous, particular, which essential bootstrapping operation. this paper, we propose variant TMKHE reduced keys. reduce ring learning errors (RLWE), called RLWE reusing (ReRLWE). ReRLWE generates other components by error used when generating an sample. We prove can modified under assumption, For MKHE, 66% 25%, respectively. TMKHE, 50%

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-key Homomorphic Authenticators

Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elementsm1, . . . ,mt and outsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can generate a short authenticator vouching for the correctness of the output y of a function f computed on the outsourced data, i.e., y = f(m1, . . . ,mt). Recent...

متن کامل

A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism

Homomorphic signatures (HS) allow evaluation of signed messages by producing a signature on a function of messages signed by the same key. Motivated by the vast potential of applications, we initiate the study of multi-key HS (M-HS) which allows evaluation of signatures under different keys. We also study other multi-key extensions, namely, hierarchical HS (M-HiHS) for delegation of signing pow...

متن کامل

Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance

In this paper, a construction of distributed multi-user, multikey searchable encryptions is proposed and analyzed. Our scheme leverages a combination of the Shamir’s threshold secret key sharing, the Pohlig-Hellman function and the ElGamal encryption scheme to provide high reliability with limited storage overhead. It achieves the semantic security in the context of the keyword hiding, the sear...

متن کامل

Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions

In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion from any stag-CCAsecure threshold tag-based encryption schemes to CCA-secure threshold public-key encryption schemes. Moreover, we give two concrete constructions of stag-CCA-secure threshold tag-based encryption schemes...

متن کامل

Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption

Homomorphic signatures (HS) allows the derivation of the signature of the message-function pair (m, g), where m = g(m1, . . . ,mK), given the signatures of each of the input messages mk signed under the same key. Multi-key HS (M-HS) introduced by Fiore et al. (ASIACRYPT’16) further enhances the utility by allowing evaluation of signatures under different keys. While the unforgeability of existi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3277862