Optimizations in Fully Homomorphic Encryption

被引:0
|
作者
El-Yahyaoui, Ahmed [1 ]
El Kettani, Mohamed Dafir Ech-cherif [1 ]
机构
[1] Mohammed V Univ Rabat, CEDOC ST2I ENSIAS, Rabat, Morocco
关键词
D O I
10.1007/978-3-319-97719-5_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Optimizations in fully homomorphic encryption are the guidelines of many cryptographic researches after Gentry's breakthrough in 2009. In this chapter, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Among these technics, we will focus on the trans-ciphering one, for this method we will describe a homomorphic evaluation of the different AES circuits (AES-128, AES-192 and AES-256) using a noise-free fully homomorphic encryption scheme. After all, we will present a new noise-free fully homomorphic encryption scheme based on quaternions. Trans-ciphering is supposed to be an efficient solution to optimize data storage in a context of outsourcing computations to a remote cloud computing as it is considered a powerful tool to minimize runtime in the client side. In this implementation, we will use our noise-free fully homomorphic encryption scheme with different key sizes. Among the tools we are using in this work, a small laptop with characteristics: bi-cores Intel core i5 CPU running at 2.40 GHz, with 512 KB L2 cache and 4 GB of Random Access Memory. Our implementation takes about 18 min to evaluate an entire AES circuit using a key of 1024 bits for the fully homomorphic encryption scheme.
引用
收藏
页码:150 / 166
页数:17
相关论文
共 50 条
  • [41] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254
  • [42] Fully Homomorphic Encryption Based On the Parallel Computing
    Tan, Delin
    Wang, Huajun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 497 - 522
  • [43] Fully-homomorphic Encryption Based SPIR
    Zhong, Hong
    Yi, Lei
    Zhao, Yu
    Yuan, Xianping
    Sha, Xianjun
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [44] Development of a Testbed for Fully Homomorphic Encryption Solutions
    Marrone, Stefano
    Tortora, Antonio
    Bellini, Emanuele
    Maione, Antonella
    Raimondo, Mariapia
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 206 - 211
  • [45] Breaking Fully-Homomorphic-Encryption Challenges
    Nguyen, Phong Q.
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 13 - 14
  • [46] Enhancing Data Parallelism of Fully Homomorphic Encryption
    Martins, Paulo
    Sousa, Leonel
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 194 - 207
  • [47] A novel method of fully homomorphic encryption scheme
    Mittal, Sonam
    Suntheya, A. K.
    Anbunathan, R.
    Ashokkumar, N.
    INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS, 2024, 20 (03) : 228 - 242
  • [48] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [49] An Adaptive and Efficient Fully Homomorphic Encryption Technique
    Yagoub, Mohammed Amine
    Laouid, Abdelkader
    Kazar, Okba
    Bounceur, Ahcene
    Euler, Reinhardt
    AlShaikh, Muath
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [50] Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption
    Lee, Kang Hoon
    Jeon, YoungBae
    Yoon, Ji Won
    9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 486 - 505