Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus

被引:10
|
作者
Boudgoust, Katharina [1 ]
Scholl, Peter [1 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
关键词
RENYI DIVERGENCE; SECURITY; PROOFS;
D O I
10.1007/978-981-99-8721-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The learning with errors (LWE) assumption is a powerful tool for building encryption schemes with useful properties, such as plausible resistance to quantum computers, or support for homomorphic computations. Despite this, essentially the only method of achieving threshold decryption in schemes based on LWE requires a modulus that is superpolynomial in the security parameter, leading to a large overhead in ciphertext sizes and computation time. In this work, we propose a (fully homomorphic) encryption scheme that supports a simple t-out-of-n threshold decryption protocol while allowing for a polynomial modulus. The main idea is to use the Renyi divergence (as opposed to the statistical distance as in previous works) as a measure of distribution closeness. This comes with some technical obstacles, due to the difficulty of using the Renyi divergence in decisional security notions such as standard semantic security. We overcome this by constructing a threshold scheme with a weaker notion of one-way security and then showing how to transform any one-way (fully homomorphic) threshold scheme into one guaranteeing indistinguishability-based security.
引用
收藏
页码:371 / 404
页数:34
相关论文
共 50 条
  • [1] EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    SIAM JOURNAL ON COMPUTING, 2014, 43 (02) : 831 - 871
  • [2] Efficient Fully Homomorphic Encryption from (Standard) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 97 - 106
  • [3] On Homomorphic Secret Sharing from Polynomial-Modulus LWE
    Attema, Thomas
    Capitao, Pedro
    Kohl, Lisa
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 3 - 32
  • [4] Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
    Boneh, Dan
    Gennaro, Rosario
    Goldfeder, Steven
    Jain, Aayush
    Kim, Sam
    Rasmussen, Peter M. R.
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 565 - 596
  • [5] A Novel Fully Homomorphic Encryption Scheme Bsed on LWE
    DING Yong
    LI Xiumin
    Lü Haifeng
    LI Xinguo
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 84 - 92
  • [6] A New Multiplication Technique for LWE Based Fully Homomorphic Encryption
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IEEE Letters of the Computer Society, 2020, 3 (02): : 62 - 65
  • [7] Polynomial Multipliers for Fully Homomorphic Encryption on FPGA
    Jayet-Griffon, C.
    Cornelie, M. -A.
    Maistri, P.
    Elbaz-Vincent, Ph.
    Leveugle, R.
    2015 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2015,
  • [8] A multi-bit fully homomorphic encryption with better key size from LWE
    Chen Z.
    Song X.
    Zhao X.
    2016, Science Press (53): : 2216 - 2223
  • [9] Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
    Chen, Yuyue
    Huang, Ruwei
    Yang, Bo
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [10] A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE
    Song, Xinxia
    Chen, Zhigang
    Chen, Liang
    IEEE ACCESS, 2019, 7 : 50588 - 50594