Efficient Fully Homomorphic Encryption from (Standard) LWE

被引:571
|
作者
Brakerski, Zvika [1 ]
Vaikuntanathan, Vinod [2 ]
机构
[1] Weizmann Inst Sci, IL-76100 Rehovot, Israel
[2] Univ Toronto, Toronto, ON, Canada
关键词
PRIVATE INFORMATION-RETRIEVAL; KEY;
D O I
10.1109/FOCS.2011.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a fully homomorphic encryption scheme that is based solely on the (standard) learning with errors (LWE) assumption. Applying known results on LWE, the security of our scheme is based on the worst-case hardness of "short vector problems" on arbitrary lattices. Our construction improves on previous works in two aspects: 1) We show that "somewhat homomorphic" encryption can be based on LWE, using a new re-linearization technique. In contrast, all previous schemes relied on complexity assumptions related to ideals in various rings. 2) We deviate from the "squashing paradigm" used in all previous works. We introduce a new dimension-modulus reduction technique, which shortens the ciphertexts and reduces the decryption complexity of our scheme, without introducing additional assumptions. Our scheme has very short ciphertexts and we therefore use it to construct an asymptotically efficient LWE-based single-server private information retrieval (PIR) protocol. The communication complexity of our protocol (in the public-key model) is k. polylog(k) + log vertical bar DB vertical bar bits per single-bit query (here, k is a security parameter).
引用
收藏
页码:97 / 106
页数:10
相关论文
共 50 条
  • [31] Batched Fully Homomorphic Encryption from TFHE
    Jiang, Yuting
    Wei, Jianghong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 92 - 109
  • [32] Application of a circular secure variant of LWE in the homomorphic encryption
    Yang, Xiaoyuan
    Zhou, Tanping
    Zhang, Wei
    Wu, Liqiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1389 - 1393
  • [33] Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption
    Kirshanova, Elena
    Marcolla, Chiara
    Rovira, Sergi
    PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 376 - 400
  • [34] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [35] A Flexible Fully Homomorphic Encryption
    Chunguang Ma
    Juyan Li
    Gang Du
    Wireless Personal Communications, 2017, 95 : 761 - 772
  • [36] Optimizations in Fully Homomorphic Encryption
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-cherif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 150 - 166
  • [37] A Flexible Fully Homomorphic Encryption
    Ma, Chunguang
    Li, Juyan
    Du, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 761 - 772
  • [38] Faster Fully Homomorphic Encryption
    Stehle, Damien
    Steinfeld, Ron
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 377 - +
  • [39] The Rise of Fully Homomorphic Encryption
    Creeger M.
    Queue, 2022, 20 (04): : 39 - 60
  • [40] Fully Homomorphic Encryption for Mathematicians
    Silverberg, Alice
    WOMEN IN NUMBERS 2: RESEARCH DIRECTIONS IN NUMBER THEORY, 2013, 606 : 111 - 123