Fully Homomorphic Encryption: Overview and Cryptanalysis
نویسندگان
چکیده
Scheme. Gentry starts with a definition of an abstract scheme using rings and ideals, omitting instantiation details at first. His scheme is as follows (additional remarks appear after the description): KeyGen(R,BI). On input a ring R and the basis BI of an ideal I, this randomised algorithm generates via (Bsk J , B pk J ) ←R IdealGen(R,BI) two bases for an ideal J and outputs the public key pk = (R,BI , B pk J ,Samp) and secret key sk = (pk,B sk J ). Encrypt(pk, π). On input a public key pk and a plaintext π, this algorithm generates ψ∗ ← Samp(BI , π) and outputs ψ := ψ∗ mod B J . Decrypt(sk, ψ). On input a secret key sk and a ciphertext ψ, this algorithm outputs π := ψ mod Bsk J mod BI = ψ −Bsk J · ⌊ Bsk J · ψ ⌉ mod BI . Evaluate(pk, C,Ψ). On input a public key pk, a circuit C with t inputs (of some special set C of “allowed” circuits) and a set of t ciphertexts Ψ = (ψ1, . . . , ψt), this algorithm invokes the evaluation of the embedded additions (ψi + ψj) mod B pk J and multiplications (ψi · ψj) mod B J in the circuit C in the right order to obtain a ciphertext ψ which it outputs. Remarks. 1. The plaintext space is (a subset of) R mod BI . 2. The (randomised) algorithms IdealGen and Samp remain abstract, but – roughly speaking – IdealGen(R,BI) constructs a secret and public basis for an ideal J coprime to the input ideal I and Samp(BI , x) samples the coset x+ I.
منابع مشابه
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption
For the fully homomorphic encryption schemes in [SV10, GH11], this paper presents attacks to solve equivalent secret key and directly recover plaintext from ciphertext for lattice dimensions n=2048 by using lattice reduction algorithm. According to the average-case behavior of LLL in [NS06], their schemes are also not secure for n=8192.
متن کاملImproved Fully Homomorphic Encryption without Bootstrapping
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the enciphering function. In this paper I propose the improved fully homomorphic public-key encryption scheme on non-associative octonion ring over finite field without bootstrapping tec...
متن کاملFully Homomorphic Encryption without bootstrapping
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the plaintext [1]. In this paper I propose the improved fully homomorphic encryption scheme on non-associative octonion ring over finite field without bootstrapping technique where the p...
متن کاملFully Homomorphic Encryption with Composite Number Modulus
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the plaintext [1][18]. In this paper I propose the improved fully homomorphic encryption scheme on non-associative octonion ring over finite ring with composite number modulus where the ...
متن کاملQuantum fully homomorphic encryption scheme based on universal quantum circuit
Fully homomorphic encryption enables arbitrary computation on encrypted data without decrypting the data. Here it is studied in the context of quantum information processing. Based on universal quantum circuit, we present a quantum fully homomorphic encryption (QFHE) scheme, which permits arbitrary quantum transformation on an encrypted data. The QFHE scheme is proved to be perfectly secure. In...
متن کاملImproved Fully Homomorphic Encryption with Composite Number Modulus
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the plaintext [1],[15]. I also proposed a fully homomorphic encryption with composite number modulus which avoids the weak point by adopting the plaintext including the random numbers in...
متن کامل