Fully Homomorphic Encryption: Overview and Cryptanalysis

نویسندگان

  • Patrick Schmidt
  • Richard Lindner
  • Michael Schneider
چکیده

Scheme. Gentry starts with a definition of an abstract scheme using rings and ideals, omitting instantiation details at first. His scheme is as follows (additional remarks appear after the description): KeyGen(R,BI). On input a ring R and the basis BI of an ideal I, this randomised algorithm generates via (Bsk J , B pk J ) ←R IdealGen(R,BI) two bases for an ideal J and outputs the public key pk = (R,BI , B pk J ,Samp) and secret key sk = (pk,B sk J ). Encrypt(pk, π). On input a public key pk and a plaintext π, this algorithm generates ψ∗ ← Samp(BI , π) and outputs ψ := ψ∗ mod B J . Decrypt(sk, ψ). On input a secret key sk and a ciphertext ψ, this algorithm outputs π := ψ mod Bsk J mod BI = ψ −Bsk J · ⌊ Bsk J · ψ ⌉ mod BI . Evaluate(pk, C,Ψ). On input a public key pk, a circuit C with t inputs (of some special set C of “allowed” circuits) and a set of t ciphertexts Ψ = (ψ1, . . . , ψt), this algorithm invokes the evaluation of the embedded additions (ψi + ψj) mod B pk J and multiplications (ψi · ψj) mod B J in the circuit C in the right order to obtain a ciphertext ψ which it outputs. Remarks. 1. The plaintext space is (a subset of) R mod BI . 2. The (randomised) algorithms IdealGen and Samp remain abstract, but – roughly speaking – IdealGen(R,BI) constructs a secret and public basis for an ideal J coprime to the input ideal I and Samp(BI , x) samples the coset x+ I.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption

For the fully homomorphic encryption schemes in [SV10, GH11], this paper presents attacks to solve equivalent secret key and directly recover plaintext from ciphertext for lattice dimensions n=2048 by using lattice reduction algorithm. According to the average-case behavior of LLL in [NS06], their schemes are also not secure for n=8192.

متن کامل

Improved Fully Homomorphic Encryption without Bootstrapping

Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the enciphering function. In this paper I propose the improved fully homomorphic public-key encryption scheme on non-associative octonion ring over finite field without bootstrapping tec...

متن کامل

Fully Homomorphic Encryption without bootstrapping

Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the plaintext [1]. In this paper I propose the improved fully homomorphic encryption scheme on non-associative octonion ring over finite field without bootstrapping technique where the p...

متن کامل

Fully Homomorphic Encryption with Composite Number Modulus

Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the plaintext [1][18]. In this paper I propose the improved fully homomorphic encryption scheme on non-associative octonion ring over finite ring with composite number modulus where the ...

متن کامل

Quantum fully homomorphic encryption scheme based on universal quantum circuit

Fully homomorphic encryption enables arbitrary computation on encrypted data without decrypting the data. Here it is studied in the context of quantum information processing. Based on universal quantum circuit, we present a quantum fully homomorphic encryption (QFHE) scheme, which permits arbitrary quantum transformation on an encrypted data. The QFHE scheme is proved to be perfectly secure. In...

متن کامل

Improved Fully Homomorphic Encryption with Composite Number Modulus

Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the plaintext [1],[15]. I also proposed a fully homomorphic encryption with composite number modulus which avoids the weak point by adopting the plaintext including the random numbers in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011