On the depth complexity of homomorphic encryption schemes

نویسندگان

  • Andrej Bogdanov
  • Chin Ho Lee
چکیده

We show that secure homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure encryption scheme cannot be implemented by constant depth, polynomial size circuits, i.e. in the class AC. In contrast, we observe that certain previously studied encryption schemes (with quasipolynomial security) can be implemented in AC. We view this as evidence that encryption schemes that support homomorphic evaluation are inherently more complex than ordinary ones.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity

Fully homomorphic encryption is an encryption method with the property that any computation on the plaintext can be performed by a party having access to the ciphertext only. Here, we formally define and give schemes for quantum homomorphic encryption, which is the encryption of quantum information such that quantum computations can be performed given the ciphertext only. Our schemes allow for ...

متن کامل

Adaptively Secure Fully Homomorphic Signatures Based on Lattices

In a homomorphic signature scheme, given the public key and a vector of signaturesσ := (σ1, . . . , σl) over l messages μ := (μ1, . . . , μl), there exists an efficient algorithm to produce a signature σ′ for μ = f(μ). Given the tuple (σ′, μ, f), anyone can then publicly verify the validity of the signature σ′. Inspired by the recent (selectively secure) key-homomorphic functional encryption fo...

متن کامل

Partially Homomorphic Encryption Schemes over Finite Fields

Homomorphic encryption scheme enables computation in the encrypted domain, which is of great importance because of its wide and growing range of applications. The main issue with the known fully (or partially) homomorphic encryption schemes is the high computational complexity and large communication cost required for their execution. In this work, we study symmetric partially homomorphic encry...

متن کامل

Homomorphic Evaluation Requires Depth

We show that homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure homomorphic encryption scheme cannot be implemented by circuits of polynomial size and constant depth, i.e., in the class AC. In contrast, we observe that there exist ordinary public-key encryption schemes of quasipolynomial security in AC assuming noisy parities are e...

متن کامل

A Depth Specific Description of Somewhat Homomorphic Encryption and Its Applications

In this paper, we consider the depth-specific description of somewhat homomorphic encryption(SHE) schemes over integers. The ciphertexts of SHE scheme may have various forms depending on its encryption depth, and this makes the correctness check of the encryption scheme cumbersome. However, if one can present a SHE scheme depth-specifically, the correctness check is enough with depth-wise check...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Electronic Colloquium on Computational Complexity (ECCC)

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2012