Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts

被引:94
|
作者
Brakerski, Zvika [1 ]
Perlman, Renen [2 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
[2] Tel Aviv Univ, Tel Aviv, Israel
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I | 2016年 / 9814卷
基金
以色列科学基金会;
关键词
D O I
10.1007/978-3-662-53018-4_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a multi-key fully homomorphic encryption scheme that supports an unbounded number of homomorphic operations for an unbounded number of parties. Namely, it allows to perform arbitrarily many computational steps on inputs encrypted by an a-priori unbounded (polynomial) number of parties. Inputs from new parties can be introduced into the computation dynamically, so the final set of parties needs not be known ahead of time. Furthermore, the length of the ciphertexts, as well as the space complexity of an atomic homomorphic operation, grow only linearly with the current number of parties. Prior works either supported only an a-priori bounded number of parties (Lopez-Alt, Tromer and Vaikuntanthan, STOC '12), or only supported single-hop evaluation where all inputs need to be known before the computation starts (Clear and McGoldrick, Crypto '15, Mukherjee and Wichs, Eurocrypt '16). In all aforementioned works, the ciphertext length grew at least quadratically with the number of parties. Technically, our starting point is the LWE-based approach of previous works. Our result is achieved via a careful use of Gentry's bootstrapping technique, tailored to the specific scheme. Our hardness assumption is that the scheme of Mukherjee and Wichs is circular secure (and thus bootstrappable). A leveled scheme can be achieved under standard LWE.
引用
收藏
页码:190 / 213
页数:24
相关论文
共 50 条
  • [1] Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol
    Li, Ningbo
    Zhou, Tanping
    Yang, Xiaoyuan
    Han, Yiliang
    Liu, Wenchao
    Tu, Guangsheng
    IEEE ACCESS, 2019, 7 : 56724 - 56732
  • [2] Fully Dynamic Multi-Key FHE Without Gaussian Noise
    Huang, Yu
    Wu, Kaigui
    Chen, Ming
    IEEE ACCESS, 2021, 9 (09): : 50639 - 50645
  • [3] Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems
    Jiang, Yuting
    Wei, Jianghong
    Pan, Jing
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 105 - 120
  • [4] Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE
    Chen, Yuling
    Dong, Sen
    Li, Tao
    Wang, Yilei
    Zhou, Huiyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5239 - 5249
  • [5] A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE
    Huiyong Wang
    Yong Feng
    Yong Ding
    Shijie Tang
    Soft Computing, 2019, 23 : 1735 - 1744
  • [6] A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE
    Wang, Huiyong
    Feng, Yong
    Ding, Yong
    Tang, Shijie
    SOFT COMPUTING, 2019, 23 (05) : 1735 - 1744
  • [7] Multi-key FHE for multi-bit messages
    Li, Zengpeng
    Ma, Chunguang
    Zhou, Hongsheng
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (02)
  • [8] Multi-key FHE for multi-bit messages
    Zengpeng LI
    Chunguang MA
    Hongsheng ZHOU
    ScienceChina(InformationSciences), 2018, 61 (02) : 266 - 277
  • [9] Circuit-Private Multi-key FHE
    Chongchitmate, Wutichai
    Ostrovsky, Rafail
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 241 - 270
  • [10] Multi-key FHE from LWE, Revisited
    Peikert, Chris
    Shiehian, Sina
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 217 - 238