EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE

被引:343
|
作者
Brakerski, Zvika [1 ]
Vaikuntanathan, Vinod [2 ,3 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-7610001 Rehovot, Israel
[2] Univ Toronto, Mississauga, ON L5L 106, Canada
[3] MIT CSAIL, Cambridge, MA 02139 USA
基金
加拿大自然科学与工程研究理事会;
关键词
cryptology; public-key encryption; fully homomorphic encryption; learning with errors; private information retrieval; PRIVATE INFORMATION-RETRIEVAL; PUBLIC-KEY CRYPTOSYSTEMS; SHORTEST VECTOR; LATTICE; HARD;
D O I
10.1137/120868669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m, into an encryption of any (efficient) function of that message, f(m), without knowing the secret key. We present a leveled FHE scheme that is based solely on the (standard) learning with errors (LWE) assumption. (Leveled FHE schemes are initialized with a bound on the maximal evaluation depth. However, this restriction can be removed by assuming " weak circular security.") Applying known results on LWE, the security of our scheme is based on the worst-case hardness of " short vector problems" on arbitrary lattices. Our construction improves on previous works in two aspects: 1. We show that " somewhat homomorphic" encryption can be based on LWE, using a new relinearization technique. In contrast, all previous schemes relied on complexity assumptions related to ideals in various rings. 2. We deviate from the " squashing paradigm" used in all previous works. We introduce a new dimension-modulus reduction technique, which shortens the ciphertexts and reduces the decryption complexity of our scheme, without introducing additional assumptions. Our scheme has very short ciphertexts, and we therefore use it to construct an asymptotically efficient LWE-based single-server private information retrieval (PIR) protocol. The communication complexity of our protocol (in the public-key model) is k . polylog(k)+ log | DB| bits per single-bit query, in order to achieve security against 2k-time adversaries (based on the best known attacks against our underlying assumptions).
引用
收藏
页码:831 / 871
页数:41
相关论文
共 50 条
  • [1] Efficient Fully Homomorphic Encryption from (Standard) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 97 - 106
  • [2] Towards an efficient LWE-based fully homomorphic encryption scheme
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IET INFORMATION SECURITY, 2022, 16 (04) : 235 - 252
  • [3] Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
    Chen, Yuyue
    Huang, Ruwei
    Yang, Bo
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [4] A Novel Fully Homomorphic Encryption Scheme Bsed on LWE
    DING Yong
    LI Xiumin
    Lü Haifeng
    LI Xinguo
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 84 - 92
  • [5] Efficient Linear Homomorphic Encryption from LWE Over Rings
    Wang, Ting
    Yu, Jianping
    Zhang, Peng
    Xie, Xuan
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 1005 - 1016
  • [6] Efficient Linear Homomorphic Encryption from LWE Over Rings
    Ting Wang
    Jianping Yu
    Peng Zhang
    Xuan Xie
    Wireless Personal Communications, 2014, 74 : 1005 - 1016
  • [7] Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus
    Boudgoust, Katharina
    Scholl, Peter
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT I, 2023, 14438 : 371 - 404
  • [8] A New Multiplication Technique for LWE Based Fully Homomorphic Encryption
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IEEE Letters of the Computer Society, 2020, 3 (02): : 62 - 65
  • [9] A multi-bit fully homomorphic encryption with better key size from LWE
    Chen Z.
    Song X.
    Zhao X.
    2016, Science Press (53): : 2216 - 2223
  • [10] A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE
    Song, Xinxia
    Chen, Zhigang
    Chen, Liang
    IEEE ACCESS, 2019, 7 : 50588 - 50594