Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error

被引:0
|
作者
Koo, Zahyun [1 ]
Lee, Joon-Woo [2 ]
No, Jong-Seon [1 ]
Kim, Young-Sik [3 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, INMC, Seoul 08826, South Korea
[2] Chung Ang Univ, Sch Comp Sci & Engn, Seoul 06974, South Korea
[3] Chosun Univ, Dept Informat & Commun Engn, Gwangju 61452, South Korea
关键词
Servers; Outsourcing; Public key; Homomorphic encryption; Lattices; Cloud computing; Costs; Homomorphic encryption (HE); multi-key homomorphic encryption (MKHE); ring learning with error (RLWE); threshold multi-key homomorphic encryption (TMKHE);
D O I
10.1109/ACCESS.2023.3277862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing and AI as a Service are provided, it is increasingly necessary to deal with privacy sensitive data. To deal with the sensitive data, there are two cases of outsourcing process: i) many clients participate dynamically ii) many clients are pre-determined. The solutions for protecting sensitive data in both cases are the multi-key homomorphic encryption (MKHE) scheme and the threshold multi-key homomorphic encryption (TMKHE) scheme. However, these schemes may be difficult for clients with limited resources to perform MKHE and TMKHE. In addition, due to the large size of the evaluation keys, in particular multiplication and rotation keys, the communication between the clients and server that provide outsourcing service increases. Also, the size of the evaluation keys that the server must hold is tremendous, in particular, for the multiplication and rotation keys, which are essential for bootstrapping operation. In this paper, we propose a variant of MKHE and TMKHE with reduced evaluation keys. To reduce the size of the evaluation keys, we propose a variant of ring learning with errors (RLWE), called RLWE reusing errors (ReRLWE). ReRLWE generates other components by reusing the error that is used when generating an RLWE sample. We prove that RLWE can be reduced to ReRLWE and propose modified evaluation keys under the ReRLWE assumption, which are the modified multiplication and rotation keys. For MKHE, multiplication and rotation keys are reduced by 66% and 25%, respectively. For TMKHE, a multiplication and rotation keys are reduced by 50% and 25%, respectively.
引用
收藏
页码:50310 / 50324
页数:15
相关论文
共 50 条
  • [1] Multi-key homomorphic authenticators
    Fiore, Dario
    Mitrokotsa, Aikaterini
    Nizzardo, Luca
    Pagnin, Elena
    IET INFORMATION SECURITY, 2019, 13 (06) : 618 - 638
  • [2] Multi-key Homomorphic Authenticators
    Fiore, Dario
    Mitrokotsa, Aikaterini
    Nizzardo, Luca
    Pagnin, Elena
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 499 - 530
  • [3] Hierarchical Threshold Multi-Key Fully Homomorphic Encryption
    Wan, Xiaohan
    Lin, Hao
    Wang, Mingqiang
    Shen, Wenting
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [4] Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE
    Xu, Peiying
    Wang, Li-Ping
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 248 - 269
  • [5] Matrioska: A Compiler for Multi-key Homomorphic Signatures
    Fiore, Dario
    Pagnin, Elena
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 43 - 62
  • [6] Multi-Key Homomorphic Encryption from TFHE
    Chen, Hao
    Chillotti, Ilaria
    Song, Yongsoo
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 446 - 472
  • [7] Federated learning enabled multi-key homomorphic encryption
    Kumbhar, Hemant Ramdas
    Rao, S. Srinivasa
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 268
  • [8] A compiler for multi-key homomorphic signatures for Turing machines
    Samarin, Somayeh Dolatnezhad
    Fiore, Dario
    Venturi, Daniele
    Amini, Morteza
    THEORETICAL COMPUTER SCIENCE, 2021, 889 : 145 - 170
  • [9] Multi-key Homomorphic Proxy Re-Encryption
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Hiromasa, Ryo
    Kawai, Yutaka
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 328 - 346
  • [10] Griffin: Towards Mixed Multi-Key Homomorphic Encryption
    Schneider, Thomas
    Yalame, Hossein
    Yonli, Michael
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 147 - 158