Candidate iO from Homomorphic Encryption Schemes

被引:37
|
作者
Brakerski, Zvika [1 ]
Doettling, Nico [2 ]
Garg, Sanjam [3 ]
Malavolta, Giulio [3 ,4 ,5 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
[2] CISPA Helmoltz Ctr Informat Secur, Saarbrucken, Germany
[3] Univ Calif Berkeley, Berkeley, CA 94704 USA
[4] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[5] Simons Inst Theory Comp, Berkeley, CA USA
基金
欧盟地平线“2020”; 以色列科学基金会;
关键词
D O I
10.1007/978-3-030-45721-1_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our construction is obtained via a new intermediate primitive that we call split fully-homomorphic encryption (split FHE), which we show to be sufficient for constructing iO. Specifically, split FHE is FHE where decryption takes the following two-step syntactic form: (i) A secret decryption step uses the secret key and produces a hint which is (asymptotically) shorter than the length of the encrypted message, and (ii) a public decryption step that only requires the ciphertext and the previously generated hint (and not the entire secret key), and recovers the encrypted message. In terms of security, the hints for a set of ciphertexts should not allow one to violate semantic security for any other ciphertexts. Next, we show a generic candidate construction of split FHE based on three building blocks: (i) A standard FHE scheme with linear decrypt-and-multiply (which can be instantiated with essentially all LWE-based constructions), (ii) a linearly homomorphic encryption scheme with short decryption hints (such as the Damgard-Jurik encryption scheme, based on the DCR problem), and (iii) a cryptographic hash function (which can be based on a variety of standard assumptions). Our approach is heuristic in the sense that our construction is not provably secure and makes implicit assumptions about the interplay between these underlying primitives. We show evidence that this construction is secure by providing an argument in an appropriately defined oracle model. We view our construction as a big departure from the state-of-the-art constructions, and it is in fact quite simple.
引用
收藏
页码:79 / 109
页数:31
相关论文
共 50 条
  • [21] Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem
    Sanyashi, Tikaram
    Desai, Darshil
    Menezes, Bernard
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 517 - 522
  • [22] SecureBP from Homomorphic Encryption
    Liu, Qinju
    Lu, Xianhui
    Luo, Fucai
    Zhou, Shuai
    He, Jingnan
    Wang, Kunpeng
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [23] A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes
    Saeid Esmaeilzade
    Nasrollah Pakniat
    Ziba Eslami
    The Journal of Supercomputing, 2022, 78 : 72 - 92
  • [24] Evaluation of the Complexity of Fully Homomorphic Encryption Schemes in Implementations of Programs
    Chakarov, Dimitar
    Papazov, Yavor
    COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 62 - 67
  • [25] Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
    Fouque, Pierre-Alain
    Hadjibeyli, Benjamin
    Kirchner, Paul
    COMPUTING AND COMBINATORICS, COCOON 2016, 2016, 9797 : 269 - 280
  • [26] A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes
    Esmaeilzade, Saeid
    Pakniat, Nasrollah
    Eslami, Ziba
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 72 - 92
  • [27] Blinded additively homomorphic encryption schemes for self-tallying voting
    Dossogne, Jerome
    Lafitte, Frederic
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 : 40 - 53
  • [28] Fast Evaluation of Homomorphic Encryption Schemes based on Ring-LWE
    Feron, Cyrielle
    Lapotre, Vianney
    Lagadec, Loic
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [29] On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes
    Chenal, Massimo
    Tang, Qiang
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 239 - 258
  • [30] Towards practical program execution over fully homomorphic encryption schemes
    Fau, Simon
    Sirdey, Renaud
    Fontaine, Caroline
    Aguilar-Melchor, Carlos
    Gogniat, Guy
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 284 - 290