Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix

被引:0
|
作者
Chinmoy Biswas
Ratna Dutta
机构
[1] Indian Institute of Technology,Department of Mathematics
关键词
Post quantum cryptography; Lattice based cryptosystem; Multi-key fully homomorphic encryption; Learning with errors;
D O I
暂无
中图分类号
学科分类号
摘要
We propose a dynamic (leveled) multi-key Fully Homomorphic Encryption (FHE) scheme under the learning with errors (LWE) assumption. Multi-key FHE in a dynamic setting is the most versatile variant of FHE which requires no information about the participating parties prior to key generation. In addition, it also introduces inputs from new parties into the computation. Designing dynamic multi-key FHE without blowing up the storage and ciphertext size of homomorphic computation is a challenging task. Unlike the existing LWE based multi-key FHE, our design does not use any common reference matrix in common parameter which seems to strengthen the power of using MFHE to allow users to generate their own keys independently. The ciphertext length and public key size of our construction are comparable to the existing similar works. We use only one component in the public extension key, resulting efficient extension of the ciphertexts under additional secret keys. The ciphertext in our design is generated using the FHE scheme of Gentry, Sahai, and Waters with no additional components, allowing efficient homomorphic evaluation. Our scheme is proven to be secure under standard LWE assumption without using circular security. More interestingly, our multi-key FHE is dynamic while maintaining ciphertext compactness.
引用
收藏
页码:1241 / 1254
页数:13
相关论文
共 20 条
  • [1] Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix
    Biswas, Chinmoy
    Dutta, Ratna
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (02) : 1241 - 1254
  • [2] Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE
    Chen, Yuling
    Dong, Sen
    Li, Tao
    Wang, Yilei
    Zhou, Huiyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5239 - 5249
  • [3] Multi-key FHE from LWE, Revisited
    Peikert, Chris
    Shiehian, Sina
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 217 - 238
  • [4] A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE
    Huiyong Wang
    Yong Feng
    Yong Ding
    Shijie Tang
    Soft Computing, 2019, 23 : 1735 - 1744
  • [5] A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE
    Wang, Huiyong
    Feng, Yong
    Ding, Yong
    Tang, Shijie
    SOFT COMPUTING, 2019, 23 (05) : 1735 - 1744
  • [6] Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE
    Xu, Peiying
    Wang, Li-Ping
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 248 - 269
  • [7] Fully Dynamic Multi-Key FHE Without Gaussian Noise
    Huang, Yu
    Wu, Kaigui
    Chen, Ming
    IEEE ACCESS, 2021, 9 (09): : 50639 - 50645
  • [8] Maliciously circuit-private multi-key FHE and MPC based on LWE
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Hiromasa, Ryo
    Matsuda, Takahiro
    Schuldt, Jacob C. N.
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1645 - 1684
  • [9] Maliciously circuit-private multi-key FHE and MPC based on LWE
    Nuttapong Attrapadung
    Goichiro Hanaoka
    Ryo Hiromasa
    Takahiro Matsuda
    Jacob C. N. Schuldt
    Designs, Codes and Cryptography, 2023, 91 : 1645 - 1684
  • [10] Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension
    Chen, Long
    Zhang, Zhenfeng
    Wang, Xueqing
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 597 - 627