Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes

被引:0
|
作者
Smart, Nigel P. [1 ]
Vercauteren, Frederik [2 ]
机构
[1] Univ Bristol, Dept Comp Sci, Merchant Venturers Bldg,Woodland Rd, Bristol BS8 1UB, Avon, England
[2] Catholic Univ Louvain, COSIC Elect Engn, B-3001 Heverlee, Belgium
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction follows that of Gentry by producing a fully homomorphic scheme from a "somewhat" homomorphic scheme. For the somewhat homomorphic scheme the public and private keys consist of two large integers (one of which is shared by both the public and private key) and the ciphertext consists of one large integer. As such, our scheme has smaller message expansion and key size than Gentry's original scheme. hi addition, our proposal allows efficient fully homomorphic encryption over any field of characteristic two.
引用
收藏
页码:420 / +
页数:3
相关论文
共 50 条
  • [1] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [2] Iris Ciphertext Authentication System Based on fully Homomorphic Encryption
    Song, Xinxia
    Chen, Zhigang
    Sun, Dechao
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2020, 16 (03): : 599 - 611
  • [3] An Improved Ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption
    LI Xinyan
    MOU Huajian
    LU Dianjun
    [J]. Wuhan University Journal of Natural Sciences, 2019, 24 (03) : 218 - 222
  • [4] KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION
    Habri, Hakim
    Chillali, Abdelhakim
    Boua, Abdelkarim
    [J]. JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2022, 54 : 35 - 50
  • [5] Secure Frequent Pattern Mining by Fully Homomorphic Encryption with Ciphertext Packing
    Imabayashi, Hiroki
    Ishimaki, Yu
    Umayabara, Akira
    Sato, Hiroki
    Yamana, Hayato
    [J]. DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 181 - 195
  • [6] A General Design Method of Constructing Fully Homomorphic Encryption with Ciphertext Matrix
    Song, Xinxia
    Chen, Zhigang
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2629 - 2650
  • [7] Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion
    Li, Yunyu
    Zhou, Jiantao
    Li, Yuanman
    [J]. MM'15: PROCEEDINGS OF THE 2015 ACM MULTIMEDIA CONFERENCE, 2015, : 1063 - 1066
  • [8] High-throughput and fully-pipelined ciphertext multiplier for homomorphic encryption
    Wang, Zeyu
    Ikeda, Makoto
    [J]. IEICE ELECTRONICS EXPRESS, 2024,
  • [9] High-throughput and fully-pipelined ciphertext multiplier for homomorphic encryption
    Wang, Zeyu
    Ikeda, Makoto
    [J]. IEICE ELECTRONICS EXPRESS, 2024, 21 (06): : 1 - 6
  • [10] A Fully Homomorphic Encryption Scheme with Better Key Size
    Chen Zhigang
    Wang Jian
    Zhang ZengNian
    Song Xinxia
    [J]. CHINA COMMUNICATIONS, 2014, 11 (09) : 82 - 92