Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus

被引:10
|
作者
Boudgoust, Katharina [1 ]
Scholl, Peter [1 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
关键词
RENYI DIVERGENCE; SECURITY; PROOFS;
D O I
10.1007/978-981-99-8721-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The learning with errors (LWE) assumption is a powerful tool for building encryption schemes with useful properties, such as plausible resistance to quantum computers, or support for homomorphic computations. Despite this, essentially the only method of achieving threshold decryption in schemes based on LWE requires a modulus that is superpolynomial in the security parameter, leading to a large overhead in ciphertext sizes and computation time. In this work, we propose a (fully homomorphic) encryption scheme that supports a simple t-out-of-n threshold decryption protocol while allowing for a polynomial modulus. The main idea is to use the Renyi divergence (as opposed to the statistical distance as in previous works) as a measure of distribution closeness. This comes with some technical obstacles, due to the difficulty of using the Renyi divergence in decisional security notions such as standard semantic security. We overcome this by constructing a threshold scheme with a weaker notion of one-way security and then showing how to transform any one-way (fully homomorphic) threshold scheme into one guaranteeing indistinguishability-based security.
引用
收藏
页码:371 / 404
页数:34
相关论文
共 50 条
  • [31] Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus
    Kim, Sam
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 576 - 607
  • [32] A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD COMPUTING
    Li, Jian
    Song, Danjie
    Chen, Sicong
    Lu, Xiaofeng
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 214 - 217
  • [33] Packed Ciphertexts in LWE-Based Homomorphic Encryption
    Brakerski, Zvika
    Gentry, Craig
    Halevi, Shai
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 1 - 13
  • [34] Batched Fully Homomorphic Encryption from TFHE
    Jiang, Yuting
    Wei, Jianghong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 92 - 109
  • [35] Application of a circular secure variant of LWE in the homomorphic encryption
    Yang, Xiaoyuan
    Zhou, Tanping
    Zhang, Wei
    Wu, Liqiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1389 - 1393
  • [36] Multiparty computation from threshold homomorphic encryption
    Cramer, R
    Damgard, I
    Nielsen, JB
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 280 - 300
  • [37] Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
    Coron, Jean-Sebastien
    Naccache, David
    Tibouchi, Mehdi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 446 - 464
  • [38] A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching
    Chen, Zhigang
    Wang, Jian
    Chen, Liqun
    Song, Xinxia
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [39] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [40] A Flexible Fully Homomorphic Encryption
    Chunguang Ma
    Juyan Li
    Gang Du
    Wireless Personal Communications, 2017, 95 : 761 - 772