Candidate iO from Homomorphic Encryption Schemes

被引:37
|
作者
Brakerski, Zvika [1 ]
Doettling, Nico [2 ]
Garg, Sanjam [3 ]
Malavolta, Giulio [3 ,4 ,5 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
[2] CISPA Helmoltz Ctr Informat Secur, Saarbrucken, Germany
[3] Univ Calif Berkeley, Berkeley, CA 94704 USA
[4] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[5] Simons Inst Theory Comp, Berkeley, CA USA
基金
欧盟地平线“2020”; 以色列科学基金会;
关键词
D O I
10.1007/978-3-030-45721-1_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our construction is obtained via a new intermediate primitive that we call split fully-homomorphic encryption (split FHE), which we show to be sufficient for constructing iO. Specifically, split FHE is FHE where decryption takes the following two-step syntactic form: (i) A secret decryption step uses the secret key and produces a hint which is (asymptotically) shorter than the length of the encrypted message, and (ii) a public decryption step that only requires the ciphertext and the previously generated hint (and not the entire secret key), and recovers the encrypted message. In terms of security, the hints for a set of ciphertexts should not allow one to violate semantic security for any other ciphertexts. Next, we show a generic candidate construction of split FHE based on three building blocks: (i) A standard FHE scheme with linear decrypt-and-multiply (which can be instantiated with essentially all LWE-based constructions), (ii) a linearly homomorphic encryption scheme with short decryption hints (such as the Damgard-Jurik encryption scheme, based on the DCR problem), and (iii) a cryptographic hash function (which can be based on a variety of standard assumptions). Our approach is heuristic in the sense that our construction is not provably secure and makes implicit assumptions about the interplay between these underlying primitives. We show evidence that this construction is secure by providing an argument in an appropriately defined oracle model. We view our construction as a big departure from the state-of-the-art constructions, and it is in fact quite simple.
引用
收藏
页码:79 / 109
页数:31
相关论文
共 50 条
  • [31] Receipt-free electronic auction schemes using homomorphic encryption
    Chen, XF
    Lee, B
    Kim, K
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 259 - 273
  • [32] Analyzing Homomorphic Encryption Schemes in Securing Wireless Sensor Networks (WSN)
    Ertaul, Levent
    Yang, Johan Hadiwijaya
    Saldamli, Gokay
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (05): : 1 - 11
  • [33] Homomorphic Encryption
    Ogburn, Monique
    Turner, Claude
    Dahal, Pushkar
    COMPLEX ADAPTIVE SYSTEMS: EMERGING TECHNOLOGIES FOR EVOLVING SYSTEMS: SOCIO-TECHNICAL, CYBER AND BIG DATA, 2013, 20 : 502 - 509
  • [34] CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
    Boura, Christina
    Gama, Nicolas
    Georgieva, Mariya
    Jetchev, Dimitar
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 316 - 338
  • [35] A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes
    Wang, Xun
    Luo, Tao
    Li, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [36] Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
    Shen, Tongchen
    Wang, Fuqun
    Chen, Kefei
    Wang, Kunpeng
    Li, Bao
    IEEE ACCESS, 2019, 7 : 79299 - 79310
  • [37] Privacy preservation for machine learning training and classification based on homomorphic encryption schemes
    Li, Jing
    Kuang, Xiaohui
    Lin, Shujie
    Ma, Xu
    Tang, Yi
    INFORMATION SCIENCES, 2020, 526 : 166 - 179
  • [38] Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
    Mainardi, Nicholas
    Barenghi, Alessandro
    Pelosi, Gerardo
    COMPUTERS & SECURITY, 2019, 87
  • [39] Multiparty computation from threshold homomorphic encryption
    Cramer, R
    Damgard, I
    Nielsen, JB
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 280 - 300
  • [40] Homomorphic Encryption and Signatures from Vector Decomposition
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 57 - +