Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error

被引:0
|
作者
Koo, Zahyun [1 ]
Lee, Joon-Woo [2 ]
No, Jong-Seon [1 ]
Kim, Young-Sik [3 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, INMC, Seoul 08826, South Korea
[2] Chung Ang Univ, Sch Comp Sci & Engn, Seoul 06974, South Korea
[3] Chosun Univ, Dept Informat & Commun Engn, Gwangju 61452, South Korea
关键词
Servers; Outsourcing; Public key; Homomorphic encryption; Lattices; Cloud computing; Costs; Homomorphic encryption (HE); multi-key homomorphic encryption (MKHE); ring learning with error (RLWE); threshold multi-key homomorphic encryption (TMKHE);
D O I
10.1109/ACCESS.2023.3277862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing and AI as a Service are provided, it is increasingly necessary to deal with privacy sensitive data. To deal with the sensitive data, there are two cases of outsourcing process: i) many clients participate dynamically ii) many clients are pre-determined. The solutions for protecting sensitive data in both cases are the multi-key homomorphic encryption (MKHE) scheme and the threshold multi-key homomorphic encryption (TMKHE) scheme. However, these schemes may be difficult for clients with limited resources to perform MKHE and TMKHE. In addition, due to the large size of the evaluation keys, in particular multiplication and rotation keys, the communication between the clients and server that provide outsourcing service increases. Also, the size of the evaluation keys that the server must hold is tremendous, in particular, for the multiplication and rotation keys, which are essential for bootstrapping operation. In this paper, we propose a variant of MKHE and TMKHE with reduced evaluation keys. To reduce the size of the evaluation keys, we propose a variant of ring learning with errors (RLWE), called RLWE reusing errors (ReRLWE). ReRLWE generates other components by reusing the error that is used when generating an RLWE sample. We prove that RLWE can be reduced to ReRLWE and propose modified evaluation keys under the ReRLWE assumption, which are the modified multiplication and rotation keys. For MKHE, multiplication and rotation keys are reduced by 66% and 25%, respectively. For TMKHE, a multiplication and rotation keys are reduced by 50% and 25%, respectively.
引用
收藏
页码:50310 / 50324
页数:15
相关论文
共 50 条
  • [31] Decentralized Distributed Federated Learning Based on Multi-Key Homomorphic Encryption
    Shang, Mengxue
    Zhang, Dandan
    Li, Fengyin
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 260 - 265
  • [32] Multi-key FHE for multi-bit messages
    Li, Zengpeng
    Ma, Chunguang
    Zhou, Hongsheng
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (02)
  • [33] Modified Multi-Key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-Switching
    Che, Xiaoliang
    Zhou, Tanping
    Li, Ningbo
    Zhou, Haonan
    Chen, Zhenhua
    Yang, Xiaoyuan
    TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 564 - 578
  • [34] Multi-key FHE for multi-bit messages
    Zengpeng LI
    Chunguang MA
    Hongsheng ZHOU
    ScienceChina(InformationSciences), 2018, 61 (02) : 266 - 277
  • [35] Modified Multi-Key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-Switching
    Xiaoliang Che
    Tanping Zhou
    Ningbo Li
    Haonan Zhou
    Zhenhua Chen
    Xiaoyuan Yang
    Tsinghua Science and Technology, 2020, 25 (05) : 564 - 578
  • [36] Optimization of NTRU-type Multi-key Fully Homomorphic Encryption Scheme
    Che X.
    Zhou T.
    Li N.
    Zhou H.
    Liu L.
    Yang X.
    Yang, Xiaoyuan (xyyangwj@126.com), 1600, Sichuan University (52): : 186 - 193
  • [37] Privacy-preserving federated learning based on multi-key homomorphic encryption
    Ma, Jing
    Naas, Si-Ahmed
    Sigg, Stephan
    Lyu, Xixiang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) : 5880 - 5901
  • [38] SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption
    Cai, Yuxuan
    Ding, Wenxiu
    Xiao, Yuxuan
    Yan, Zheng
    Liu, Ximeng
    Wan, Zhiguo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3817 - 3833
  • [39] Multi-key FHE for multi-bit messages
    Zengpeng Li
    Chunguang Ma
    Hongsheng Zhou
    Science China Information Sciences, 2018, 61
  • [40] Multi-level and Multi-key Trust in PPDM
    Sriharsha, A. V.
    Parthasarathy, C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,