An Investigation of Complex Operations with Word-Size Homomorphic Encryption
نویسندگان
چکیده
Homomorphic encryption has progressed rapidly in both efficiency and versatility since its emergence in 2009. Meanwhile, a multitude of pressing privacy needs — ranging from cloud computing to healthcare management to the handling of shared databases such as those containing genomics data — call for immediate solutions that apply fully homomorpic encryption (FHE) and somewhat homomorphic encryption (SHE) technologies. Further progress towards these ends requires new ideas for the efficient implementation of algebraic operations on wordbased (as opposed to bit-wise) encrypted data. While the arithmetic operations that are essential for cloud computing have known boolean representations, most of them require access to each bit individually, such as comparison and we lack solutions on a word domain. In this work, we tackle this challenging problem of finding ways to solve algebraic problems -including comparison and homomorphic divisionin word-based encryption via an SHE scheme. We present concrete performance figures for all proposed primitives.
منابع مشابه
Homomorphic Evaluation Requires Depth
We show that homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure homomorphic encryption scheme cannot be implemented by circuits of polynomial size and constant depth, i.e., in the class AC. In contrast, we observe that there exist ordinary public-key encryption schemes of quasipolynomial security in AC assuming noisy parities are e...
متن کاملChosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
In homomorphic encryption schemes, anyone can perform homomorphic operations, and therefore, it is difficult to manage when, where and by whom they are performed. In addition, the property that anyone can “freely” perform the operation inevitably means that ciphertexts are malleable, and it is well-known that adaptive chosen ciphertext (CCA) security and the homomorphic property can never be ac...
متن کاملMulti-bit homomorphic encryption based on learning with errors over rings
Basing on Learning with errors over rings (RLWE) assumption, we provide a new multi-bit somewhat homomorphic encryption scheme. We introduce canonical embedding to transform a ring element into a vector, such that polynomial multiplication can be performed in ~ (nlog n) scalar operations, and ciphertext size is reduced at the same time. The CPA security of this scheme can be reduced into RLWE...
متن کاملPublic Auditing for Regeneration Code Based Cloud Storage Using Homomorphic Encryption for User Privacy
To protect the outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Existing remote checking methods for regenerating-coded data only provide public auditing with the help of Third Party Auditor (TPA) and Proxy to manage and recover the data if lost, but there is a lack of use...
متن کاملCHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption
Recent techniques reduce ORAM communication complexity down to constant in the number of blocks N . However, they induce expensive homomorphic encryption on both the server and the client. In this paper, we present an alternative approach CH -ORAM. This ORAM features constant communication complexity without homomorphic encryption, in exchange for expanding the traditional ORAM setting from sin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015