Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus

被引:10
|
作者
Boudgoust, Katharina [1 ]
Scholl, Peter [1 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
关键词
RENYI DIVERGENCE; SECURITY; PROOFS;
D O I
10.1007/978-981-99-8721-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The learning with errors (LWE) assumption is a powerful tool for building encryption schemes with useful properties, such as plausible resistance to quantum computers, or support for homomorphic computations. Despite this, essentially the only method of achieving threshold decryption in schemes based on LWE requires a modulus that is superpolynomial in the security parameter, leading to a large overhead in ciphertext sizes and computation time. In this work, we propose a (fully homomorphic) encryption scheme that supports a simple t-out-of-n threshold decryption protocol while allowing for a polynomial modulus. The main idea is to use the Renyi divergence (as opposed to the statistical distance as in previous works) as a measure of distribution closeness. This comes with some technical obstacles, due to the difficulty of using the Renyi divergence in decisional security notions such as standard semantic security. We overcome this by constructing a threshold scheme with a weaker notion of one-way security and then showing how to transform any one-way (fully homomorphic) threshold scheme into one guaranteeing indistinguishability-based security.
引用
收藏
页码:371 / 404
页数:34
相关论文
共 50 条
  • [21] Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping
    Xu, Kexin
    Tan, Benjamin Hong Meng
    Wang, Li-Ping
    Aung, Khin Mi Mi
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2023, 968
  • [22] Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching
    Li, Zengpeng
    Ma, Chunguang
    Du, Gang
    Ouyang, Weiping
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 1169 - 1174
  • [23] Efficient Linear Homomorphic Encryption from LWE Over Rings
    Wang, Ting
    Yu, Jianping
    Zhang, Peng
    Xie, Xuan
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 1005 - 1016
  • [24] Efficient Linear Homomorphic Encryption from LWE Over Rings
    Ting Wang
    Jianping Yu
    Peng Zhang
    Xuan Xie
    Wireless Personal Communications, 2014, 74 : 1005 - 1016
  • [25] Practical Fully Homomorphic Encryption over Polynomial Quotient Rings
    Zhirov, Alexander
    Zhirova, Olga
    Krendelev, Sergey F.
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 70 - +
  • [26] VLSI Architecture of Polynomial Multiplication for BGV Fully Homomorphic Encryption
    Hsu, Hsuan-Jui
    Shieh, Ming-Der
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [27] Compact (Targeted Homomorphic) Inner Product Encryption from LWE
    Li, Jie
    Zhang, Daode
    Lu, Xianhui
    Wang, Kunpeng
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 132 - 140
  • [28] Hierarchical Threshold Multi-Key Fully Homomorphic Encryption
    Wan, Xiaohan
    Lin, Hao
    Wang, Mingqiang
    Shen, Wenting
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [29] FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption
    Su, Yang
    Yang, Bailong
    Yang, Chen
    Tian, Luogeng
    IEEE ACCESS, 2020, 8 : 168008 - 168025
  • [30] Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise
    Chen, Long
    Zhang, Zhenfeng
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 285 - 304