EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE

被引:343
|
作者
Brakerski, Zvika [1 ]
Vaikuntanathan, Vinod [2 ,3 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-7610001 Rehovot, Israel
[2] Univ Toronto, Mississauga, ON L5L 106, Canada
[3] MIT CSAIL, Cambridge, MA 02139 USA
基金
加拿大自然科学与工程研究理事会;
关键词
cryptology; public-key encryption; fully homomorphic encryption; learning with errors; private information retrieval; PRIVATE INFORMATION-RETRIEVAL; PUBLIC-KEY CRYPTOSYSTEMS; SHORTEST VECTOR; LATTICE; HARD;
D O I
10.1137/120868669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m, into an encryption of any (efficient) function of that message, f(m), without knowing the secret key. We present a leveled FHE scheme that is based solely on the (standard) learning with errors (LWE) assumption. (Leveled FHE schemes are initialized with a bound on the maximal evaluation depth. However, this restriction can be removed by assuming " weak circular security.") Applying known results on LWE, the security of our scheme is based on the worst-case hardness of " short vector problems" on arbitrary lattices. Our construction improves on previous works in two aspects: 1. We show that " somewhat homomorphic" encryption can be based on LWE, using a new relinearization technique. In contrast, all previous schemes relied on complexity assumptions related to ideals in various rings. 2. We deviate from the " squashing paradigm" used in all previous works. We introduce a new dimension-modulus reduction technique, which shortens the ciphertexts and reduces the decryption complexity of our scheme, without introducing additional assumptions. Our scheme has very short ciphertexts, and we therefore use it to construct an asymptotically efficient LWE-based single-server private information retrieval (PIR) protocol. The communication complexity of our protocol (in the public-key model) is k . polylog(k)+ log | DB| bits per single-bit query, in order to achieve security against 2k-time adversaries (based on the best known attacks against our underlying assumptions).
引用
收藏
页码:831 / 871
页数:41
相关论文
共 50 条
  • [31] Batched Fully Homomorphic Encryption from TFHE
    Jiang, Yuting
    Wei, Jianghong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 92 - 109
  • [32] Application of a circular secure variant of LWE in the homomorphic encryption
    Yang, Xiaoyuan
    Zhou, Tanping
    Zhang, Wei
    Wu, Liqiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1389 - 1393
  • [33] Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption
    Kirshanova, Elena
    Marcolla, Chiara
    Rovira, Sergi
    PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 376 - 400
  • [34] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [35] A Flexible Fully Homomorphic Encryption
    Chunguang Ma
    Juyan Li
    Gang Du
    Wireless Personal Communications, 2017, 95 : 761 - 772
  • [36] Optimizations in Fully Homomorphic Encryption
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-cherif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 150 - 166
  • [37] A Flexible Fully Homomorphic Encryption
    Ma, Chunguang
    Li, Juyan
    Du, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 761 - 772
  • [38] Faster Fully Homomorphic Encryption
    Stehle, Damien
    Steinfeld, Ron
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 377 - +
  • [39] The Rise of Fully Homomorphic Encryption
    Creeger M.
    Queue, 2022, 20 (04): : 39 - 60
  • [40] Fully Homomorphic Encryption for Mathematicians
    Silverberg, Alice
    WOMEN IN NUMBERS 2: RESEARCH DIRECTIONS IN NUMBER THEORY, 2013, 606 : 111 - 123