Optimizations in Fully Homomorphic Encryption

被引:0
|
作者
El-Yahyaoui, Ahmed [1 ]
El Kettani, Mohamed Dafir Ech-cherif [1 ]
机构
[1] Mohammed V Univ Rabat, CEDOC ST2I ENSIAS, Rabat, Morocco
关键词
D O I
10.1007/978-3-319-97719-5_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Optimizations in fully homomorphic encryption are the guidelines of many cryptographic researches after Gentry's breakthrough in 2009. In this chapter, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Among these technics, we will focus on the trans-ciphering one, for this method we will describe a homomorphic evaluation of the different AES circuits (AES-128, AES-192 and AES-256) using a noise-free fully homomorphic encryption scheme. After all, we will present a new noise-free fully homomorphic encryption scheme based on quaternions. Trans-ciphering is supposed to be an efficient solution to optimize data storage in a context of outsourcing computations to a remote cloud computing as it is considered a powerful tool to minimize runtime in the client side. In this implementation, we will use our noise-free fully homomorphic encryption scheme with different key sizes. Among the tools we are using in this work, a small laptop with characteristics: bi-cores Intel core i5 CPU running at 2.40 GHz, with 512 KB L2 cache and 4 GB of Random Access Memory. Our implementation takes about 18 min to evaluate an entire AES circuit using a key of 1024 bits for the fully homomorphic encryption scheme.
引用
收藏
页码:150 / 166
页数:17
相关论文
共 50 条
  • [21] Better Bootstrapping in Fully Homomorphic Encryption
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 1 - 16
  • [22] Research Progress of Fully Homomorphic Encryption
    Lifang, Bai
    Yuefei, Zhu
    Yongjun, Li
    Shuai, Wang
    Xiaoqi, Yang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3069 - 3087
  • [23] MULTIKEY FULLY HOMOMORPHIC ENCRYPTION AND APPLICATIONS
    Lopez-Alt, Adriana
    Tromer, Eran
    Vaikuntanathan, Vinod
    SIAM JOURNAL ON COMPUTING, 2017, 46 (06) : 1827 - 1892
  • [24] Leakage Resilient Fully Homomorphic Encryption
    Berkoff, Alexandra
    Liu, Feng-Hao
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 515 - 539
  • [25] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [26] Verifiable Decryption for Fully Homomorphic Encryption
    Luo, Fucai
    Wang, Kunpeng
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 347 - 365
  • [27] Fully Homomorphic Encryption with Polylog Overhead
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 465 - 482
  • [28] Fully Homomorphic Encryption: Computations with a Blindfold
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    IEEE SECURITY & PRIVACY, 2016, 14 (01) : 62 - 66
  • [29] Fully homomorphic encryption and its applications
    Beijing International Center for Mathematical Research, Peking University, Beijing
    100871, China
    不详
    100084, China
    Jisuanji Yanjiu yu Fazhan, 12 (2593-2603):
  • [30] Fully homomorphic encryption: A case study
    Rauthan, J. S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (06) : 8417 - 8437