Optimizations in Fully Homomorphic Encryption

被引:0
|
作者
El-Yahyaoui, Ahmed [1 ]
El Kettani, Mohamed Dafir Ech-cherif [1 ]
机构
[1] Mohammed V Univ Rabat, CEDOC ST2I ENSIAS, Rabat, Morocco
关键词
D O I
10.1007/978-3-319-97719-5_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Optimizations in fully homomorphic encryption are the guidelines of many cryptographic researches after Gentry's breakthrough in 2009. In this chapter, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Among these technics, we will focus on the trans-ciphering one, for this method we will describe a homomorphic evaluation of the different AES circuits (AES-128, AES-192 and AES-256) using a noise-free fully homomorphic encryption scheme. After all, we will present a new noise-free fully homomorphic encryption scheme based on quaternions. Trans-ciphering is supposed to be an efficient solution to optimize data storage in a context of outsourcing computations to a remote cloud computing as it is considered a powerful tool to minimize runtime in the client side. In this implementation, we will use our noise-free fully homomorphic encryption scheme with different key sizes. Among the tools we are using in this work, a small laptop with characteristics: bi-cores Intel core i5 CPU running at 2.40 GHz, with 512 KB L2 cache and 4 GB of Random Access Memory. Our implementation takes about 18 min to evaluate an entire AES circuit using a key of 1024 bits for the fully homomorphic encryption scheme.
引用
收藏
页码:150 / 166
页数:17
相关论文
共 50 条
  • [31] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [32] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [33] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [34] Minimizing ESOP Expressions for Fully Homomorphic Encryption
    Ye, Jheng-Hao
    Chen, Si-Quan
    Shieh, Ming-Der
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [35] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [36] Batched Fully Homomorphic Encryption from TFHE
    Jiang, Yuting
    Wei, Jianghong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 92 - 109
  • [37] Low Communication Threshold Fully Homomorphic Encryption
    Passelegue, Alain
    Stehle, Damien
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 297 - 329
  • [38] On DGHV and BGV Fully Homomorphic Encryption Schemes
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [39] Practical Fully Homomorphic Encryption for Fully Masked Neural Networks
    Izabachene, Malika
    Sirdey, Renaud
    Zuber, Martin
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 24 - 36
  • [40] Approximating Max Function in Fully Homomorphic Encryption
    Lee, Hyunjun
    Choi, Jina
    Lee, Younho
    ELECTRONICS, 2023, 12 (07)