Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error

被引:0
|
作者
Koo, Zahyun [1 ]
Lee, Joon-Woo [2 ]
No, Jong-Seon [1 ]
Kim, Young-Sik [3 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, INMC, Seoul 08826, South Korea
[2] Chung Ang Univ, Sch Comp Sci & Engn, Seoul 06974, South Korea
[3] Chosun Univ, Dept Informat & Commun Engn, Gwangju 61452, South Korea
关键词
Servers; Outsourcing; Public key; Homomorphic encryption; Lattices; Cloud computing; Costs; Homomorphic encryption (HE); multi-key homomorphic encryption (MKHE); ring learning with error (RLWE); threshold multi-key homomorphic encryption (TMKHE);
D O I
10.1109/ACCESS.2023.3277862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing and AI as a Service are provided, it is increasingly necessary to deal with privacy sensitive data. To deal with the sensitive data, there are two cases of outsourcing process: i) many clients participate dynamically ii) many clients are pre-determined. The solutions for protecting sensitive data in both cases are the multi-key homomorphic encryption (MKHE) scheme and the threshold multi-key homomorphic encryption (TMKHE) scheme. However, these schemes may be difficult for clients with limited resources to perform MKHE and TMKHE. In addition, due to the large size of the evaluation keys, in particular multiplication and rotation keys, the communication between the clients and server that provide outsourcing service increases. Also, the size of the evaluation keys that the server must hold is tremendous, in particular, for the multiplication and rotation keys, which are essential for bootstrapping operation. In this paper, we propose a variant of MKHE and TMKHE with reduced evaluation keys. To reduce the size of the evaluation keys, we propose a variant of ring learning with errors (RLWE), called RLWE reusing errors (ReRLWE). ReRLWE generates other components by reusing the error that is used when generating an RLWE sample. We prove that RLWE can be reduced to ReRLWE and propose modified evaluation keys under the ReRLWE assumption, which are the modified multiplication and rotation keys. For MKHE, multiplication and rotation keys are reduced by 66% and 25%, respectively. For TMKHE, a multiplication and rotation keys are reduced by 50% and 25%, respectively.
引用
收藏
页码:50310 / 50324
页数:15
相关论文
共 50 条
  • [41] Privacy preserving security using multi-key homomorphic encryption for face recognition
    Wang, Jing
    Xin, Rundong
    Alfarraj, Osama
    Tolba, Amr
    Tang, Qitao
    EXPERT SYSTEMS, 2025, 42 (02)
  • [42] Fully-Succinct Multi-key Homomorphic Signatures from Standard Assumptions
    Anthoine, Gaspard
    Balbas, David
    Fiore, Dario
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT III, 2024, 14922 : 317 - 351
  • [43] Random forest evaluation using multi-key homomorphic encryption and lookup tables
    Petrean, Diana-Elena
    Potolea, Rodica
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2023 - 2041
  • [44] Connecting tweakable and multi-key blockcipher security
    Lee, Jooyoung
    Luykx, Atul
    Mennink, Bart
    Minematsu, Kazuhiko
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 623 - 640
  • [45] Circuit-Private Multi-key FHE
    Chongchitmate, Wutichai
    Ostrovsky, Rafail
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 241 - 270
  • [46] Connecting tweakable and multi-key blockcipher security
    Jooyoung Lee
    Atul Luykx
    Bart Mennink
    Kazuhiko Minematsu
    Designs, Codes and Cryptography, 2018, 86 : 623 - 640
  • [47] A Novel Index Structure for Multi-key Search
    Wei, Dongyu
    Pan, Xin
    Shi, Chuan
    Chen, Yueguo
    WEB-AGE INFORMATION MANAGEMENT, WAIM 2014, 2014, 8485 : 431 - 434
  • [48] Multi-key FHE from LWE, Revisited
    Peikert, Chris
    Shiehian, Sina
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 217 - 238
  • [49] Multi-key index for distributed database system
    Hosain, MS
    Newton, MAH
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2005, 15 (02) : 433 - 438
  • [50] Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting
    Parbat, Tanusree
    Banerjee, Aniket
    Terjee, Ayantika Chat
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 259 - 271