Optimizations in Fully Homomorphic Encryption

被引:0
|
作者
El-Yahyaoui, Ahmed [1 ]
El Kettani, Mohamed Dafir Ech-cherif [1 ]
机构
[1] Mohammed V Univ Rabat, CEDOC ST2I ENSIAS, Rabat, Morocco
关键词
D O I
10.1007/978-3-319-97719-5_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Optimizations in fully homomorphic encryption are the guidelines of many cryptographic researches after Gentry's breakthrough in 2009. In this chapter, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Among these technics, we will focus on the trans-ciphering one, for this method we will describe a homomorphic evaluation of the different AES circuits (AES-128, AES-192 and AES-256) using a noise-free fully homomorphic encryption scheme. After all, we will present a new noise-free fully homomorphic encryption scheme based on quaternions. Trans-ciphering is supposed to be an efficient solution to optimize data storage in a context of outsourcing computations to a remote cloud computing as it is considered a powerful tool to minimize runtime in the client side. In this implementation, we will use our noise-free fully homomorphic encryption scheme with different key sizes. Among the tools we are using in this work, a small laptop with characteristics: bi-cores Intel core i5 CPU running at 2.40 GHz, with 512 KB L2 cache and 4 GB of Random Access Memory. Our implementation takes about 18 min to evaluate an entire AES circuit using a key of 1024 bits for the fully homomorphic encryption scheme.
引用
收藏
页码:150 / 166
页数:17
相关论文
共 50 条
  • [1] Optimizations of Brakerski's Fully Homomorphic Encryption Scheme
    Wu, Ting
    Wang, Hui
    Liu, You-Ping
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2000 - 2005
  • [2] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [3] A Flexible Fully Homomorphic Encryption
    Chunguang Ma
    Juyan Li
    Gang Du
    Wireless Personal Communications, 2017, 95 : 761 - 772
  • [4] A Flexible Fully Homomorphic Encryption
    Ma, Chunguang
    Li, Juyan
    Du, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 761 - 772
  • [5] Faster Fully Homomorphic Encryption
    Stehle, Damien
    Steinfeld, Ron
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 377 - +
  • [6] The Rise of Fully Homomorphic Encryption
    Creeger M.
    Queue, 2022, 20 (04): : 39 - 60
  • [7] Fully Homomorphic Encryption for Mathematicians
    Silverberg, Alice
    WOMEN IN NUMBERS 2: RESEARCH DIRECTIONS IN NUMBER THEORY, 2013, 606 : 111 - 123
  • [8] Noiseless homomorphic encryption for complex numbers and fully homomorphic encryption with modular arithmetic
    Chun, Jonghee
    Han, Hee
    Kang, Stefano V.
    Wang, Hyo Keun
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2024,
  • [9] Unlocking the Potential of Fully Homomorphic Encryption
    Gorantala, Shruthi
    Springer, Rob
    Gipson, Bryant
    COMMUNICATIONS OF THE ACM, 2023, 66 (05) : 72 - 81
  • [10] KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION
    Habri, Hakim
    Chillali, Abdelhakim
    Boua, Abdelkarim
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2022, 54 : 35 - 50