Homomorphic Encryption and Lattices , Spring 2011 Instructor : Shai Halevi Constructions of FHE
نویسندگان
چکیده
In the previous class we constructed a SWHE scheme with sk = w,pk = (d, r) and Decw(c) = [c · w]d mod 2. We want to use “bootstrapping” to convert our SWHE to FHE. Namely we add c∗ = Eec(w) to the public key (assuming circular security), then, given two ciphertexts c1, c2, consider the functions: ADDc1,c2(sk) = Decsk(c1) + Decsk(c2) MULTc1,c2(sk) = Decsk(c1) · Decsk(c2) If we can evaluate the function homomorphically on c∗ then we get two other ciphertexts c+, c× s.t. Decw(c +) = c1 + c2 and Decw(c ×) = c1 · c2. Our goal is therefore to get a bootstrappable scheme, namely one where the functions ADD,MULT are within the homomorphic capacity of the scheme for every two “evaluated ciphertexts” c1, c2 and “fresh ciphertext” c ∗. So far we have a SWHE scheme that can evaluate polynomials of degree up to √ n with up to n2 √ n terms. But the decryption algorithm for this scheme is given by Decw(c) = [c · w]d mod 2, where c, w, d have O(n1.5) bits. Thus a Boolean circuit to evaluate the decryption operation will be of degree Õ(n1.5) which is too much for the scheme to handle. We want to reduce the complexity of the decryption without decreasing the homomorphic capacity. We therefore add another “hint” about the secret key to the public key, namely a set of S elements x1, . . . , xS ∈ Zd such that there exists a very sparse subset of the xi’s that sums up to w modulo d. Although in principle adding such additional “hint” may compromise the security of the cryptosystem, in this case one can prove that if the “sparse subset-sum problem” (SSSP) is hard then the cryptosystem remains secure. Let ~σ = σ1σ2 · · ·σS be the characteristic vector of this subset, namely ∑S i=1 σixi ≡ w (mod d) and HW(~σ) = s << S. We now view ~σ as the secret key. Given a ciphertext c we post-process it to get yi = [c · xi]d, i ∈ [S]. Now decryption is given by:
منابع مشابه
Homomorphic Encryption
Fully homomorphic encryption (FHE) has been called the “Swiss Army knife of cryptography”, since it provides a single tool that can be uniformly applied to many cryptographic applications. In this tutorial we study FHE and describe its different properties, relations with other concepts in cryptography, and constructions. We briefly discuss the three generations of FHE constructions since Gentr...
متن کاملLattices and Homomorphic Encryption , Spring 2013 Instructors :
• The LWE error distribution Φαq is a continuous one-dimensional Gaussian, which is a projection of the spherical n-dimensional distribution Dαq onto its first coordinate. • The distribution Dαq is smooth in the following sense: If L is some lattice (or coset of a lattice) with λn(L) αq, then if we choose ~x← DL,r and ~y ← Ds such that r2 + s2 = (αq)2 then the induced distribution on ~x+ ~y is ...
متن کاملBetter Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantages even in cases that do not require pure FHE (such as when using the new noise-control technique of Brakerski-GentryVaikuntanathan). The main bottleneck in bootstrapping is the need to evaluate homomorphically the reduction ...
متن کاملFully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorphic encryption (FHE) schemes that for security parameter λ can evaluate any width-Ω(λ) circuit with t gates in time t · polylog(λ). To get low overhead, we use the recent batch homomorphic evaluation techniques of Sma...
متن کاملFully Homomorphic Encryption over the Integers
We construct a simple fully homomorphic encryption scheme, using only elementary modular arithmetic. We use Gentry’s technique to construct fully homomorphic scheme from a “bootstrappable” somewhat homomorphic scheme. However, instead of using ideal lattices over a polynomial ring, our bootstrappable encryption scheme merely uses addition and multiplication over the integers. The main appeal of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011