Efficient multi-key fully homomorphic encryption scheme from RLWE

被引:0
|
作者
Che X. [1 ,2 ]
Zhou H. [2 ]
Yang X. [1 ,2 ]
Zhou T. [1 ,2 ]
Liu L. [1 ]
Li N. [2 ]
机构
[1] College of Cryptographic Engineering, Engineering University of PAP, Xi'an
[2] Key Laboratory of Network and Information Security of the PAP, Xi'an
关键词
Ciphertext expansion algorithm; Evaluation key; Hybrid homomorphic multiplication; Key-switching; Multi-key fully homomorphic encryption;
D O I
10.19665/j.issn1001-2400.2021.01.010
中图分类号
学科分类号
摘要
The ring-LWE-based BGV-type multi-key fully homomorphic encryption (MKFHE) scheme has a large size of ciphertexts and keys,and the generation process of evaluation key is complicated,which results in a low homomorphic evaluating efficiency.To improve these problems,a BGV-type MKFHE scheme with a small-size key and a high efficiency of evaluation of key generation is proposed.First,by modifying the expansion of the ciphertext,the algorithm for generation of the evaluation key is optimized and the efficiency of the algorithm is improved.Second,the low bit discarding technique is used in the generation algorithm,which reduces the calculated redundancy and decreases the calculated complexity.Finally,by applying modulus-switching and key-switching techniques to the optimized algorithm,an efficient leveled BGV-type MKFHE scheme with IND-CPA security is proposed.Compared with the previous leveled BGV-type MKFHE schemes,the proposed scheme can simplify the process of generation of the evaluation key and decrease memory (bit-size) and calculation costs.Moreover,the proposed scheme has a higher efficiency and a less noise magnitude. © 2021, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:87 / 95
页数:8
相关论文
共 20 条
  • [1] LOPEZ-ALT A, TROMER E, VAIKUNTANATHAN V., On-the-fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption, Proceedings of the 2012 Annual ACM Symposium on Theory of Computing, pp. 1219-1234, (2012)
  • [2] QAOSAR M, ZAMANA, SIDDIQUE M.A, Et al., Privacy-preserving Secure Computation of Skyline Query in Distributed Multi-party Databases[J], Information, 10, 3, pp. 119-135, (2019)
  • [3] KIRAN A, PURI M, SURESH S., Privacy Preserving Model Using Homomorphic Encryption, International Journal of Computer Applications, 182, 38, pp. 12-18, (2019)
  • [4] HAN Kun, ZHANG Hailin, XIN Dan, Et al., Design Method of An Identity-based Fully Homomorphic Encryption Library, Journal of Xidian University, 44, 4, pp. 56-61, (2017)
  • [5] DOROZ Y, HU Y, SUNAR B., Homomorphic AES Evaluation Using the Modified LTV Scheme[J], Designs,Codes,and Cryptography, 80, 2, pp. 333-358, (2016)
  • [6] CHONGCHITMATE W, OSTROVSHY R., Circuit-private Multi-key FHE, Lecture Notes in Computer Science:10175, pp. 241-270, (2017)
  • [7] CHE X L, ZHOU T P, LI N B, Et al., Modified Multi-key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-switching[J], Tsinghua Science and Technology, 25, 5, pp. 564-578, (2020)
  • [8] GENTRY C, SAHAI A, WATERS B., Homomorphic Encryption from Learning with Errors:Conceptually-simpler,Asymptotically-faster,Attribute-based, Lecture Notes in Computer Science:8042, pp. 75-92, (2013)
  • [9] CLEAR M, MCGOLDRICK C., Multi-identity and Multi-key Leveled FHE from Learning with Errors, Lecture Notes in Computer Science:9216, pp. 630-656, (2015)
  • [10] MUKHEJEE P, WICHS D., Two Round Multiparty Computation via Multi-key FHE, Lecture Notes in Computer Science:9666, pp. 735-763, (2016)