EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE

被引:343
|
作者
Brakerski, Zvika [1 ]
Vaikuntanathan, Vinod [2 ,3 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-7610001 Rehovot, Israel
[2] Univ Toronto, Mississauga, ON L5L 106, Canada
[3] MIT CSAIL, Cambridge, MA 02139 USA
基金
加拿大自然科学与工程研究理事会;
关键词
cryptology; public-key encryption; fully homomorphic encryption; learning with errors; private information retrieval; PRIVATE INFORMATION-RETRIEVAL; PUBLIC-KEY CRYPTOSYSTEMS; SHORTEST VECTOR; LATTICE; HARD;
D O I
10.1137/120868669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m, into an encryption of any (efficient) function of that message, f(m), without knowing the secret key. We present a leveled FHE scheme that is based solely on the (standard) learning with errors (LWE) assumption. (Leveled FHE schemes are initialized with a bound on the maximal evaluation depth. However, this restriction can be removed by assuming " weak circular security.") Applying known results on LWE, the security of our scheme is based on the worst-case hardness of " short vector problems" on arbitrary lattices. Our construction improves on previous works in two aspects: 1. We show that " somewhat homomorphic" encryption can be based on LWE, using a new relinearization technique. In contrast, all previous schemes relied on complexity assumptions related to ideals in various rings. 2. We deviate from the " squashing paradigm" used in all previous works. We introduce a new dimension-modulus reduction technique, which shortens the ciphertexts and reduces the decryption complexity of our scheme, without introducing additional assumptions. Our scheme has very short ciphertexts, and we therefore use it to construct an asymptotically efficient LWE-based single-server private information retrieval (PIR) protocol. The communication complexity of our protocol (in the public-key model) is k . polylog(k)+ log | DB| bits per single-bit query, in order to achieve security against 2k-time adversaries (based on the best known attacks against our underlying assumptions).
引用
收藏
页码:831 / 871
页数:41
相关论文
共 50 条
  • [21] Efficient batch identity-based fully homomorphic encryption scheme in the standard model
    Hu, Mingxing
    Ye, Qing
    Tang, Yongli
    IET INFORMATION SECURITY, 2018, 12 (06) : 475 - 483
  • [22] Compact (Targeted Homomorphic) Inner Product Encryption from LWE
    Li, Jie
    Zhang, Daode
    Lu, Xianhui
    Wang, Kunpeng
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 132 - 140
  • [23] An Efficient LWE-Based Additively Homomorphic Encryption with Shorter Public Keys
    Challa, Ratnakumari
    Gunta, VijayaKumari
    PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 : 171 - 177
  • [24] Efficient Fully Homomorphic Encryption with Large Plaintext Space
    Li, NingBo
    Zhou, TanPing
    Yang, XiaoYuan
    Han, YiLiang
    Sun, YuJuan
    IETE TECHNICAL REVIEW, 2018, 35 : 85 - 96
  • [25] Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
    Lin, Wei-Kai
    Mook, Ethan
    Wichs, Daniel
    PROCEEDINGS OF THE 55TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2023, 2023, : 595 - 608
  • [26] FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption
    Su, Yang
    Yang, Bailong
    Yang, Chen
    Tian, Luogeng
    IEEE ACCESS, 2020, 8 : 168008 - 168025
  • [27] Efficient multi-key fully homomorphic encryption scheme from RLWE
    Che X.
    Zhou H.
    Yang X.
    Zhou T.
    Liu L.
    Li N.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 87 - 95
  • [28] Efficient identity-based leveled fully homomorphic encryption from RLWE
    Sun, Xiaoqiang
    Yu, Jianping
    Wang, Ting
    Sun, Zhiwei
    Zhang, Peng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5155 - 5165
  • [29] Efficient private database queries using ring-LWE somewhat homomorphic encryption
    Saha, Tushar Kanti
    Rathee, Mayank
    Koshiba, Takeshi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [30] Packed Ciphertexts in LWE-Based Homomorphic Encryption
    Brakerski, Zvika
    Gentry, Craig
    Halevi, Shai
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 1 - 13