On the depth complexity of homomorphic encryption schemes
نویسندگان
چکیده
We show that secure homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure encryption scheme cannot be implemented by constant depth, polynomial size circuits, i.e. in the class AC. In contrast, we observe that certain previously studied encryption schemes (with quasipolynomial security) can be implemented in AC. We view this as evidence that encryption schemes that support homomorphic evaluation are inherently more complex than ordinary ones.
منابع مشابه
Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity
Fully homomorphic encryption is an encryption method with the property that any computation on the plaintext can be performed by a party having access to the ciphertext only. Here, we formally define and give schemes for quantum homomorphic encryption, which is the encryption of quantum information such that quantum computations can be performed given the ciphertext only. Our schemes allow for ...
متن کاملAdaptively Secure Fully Homomorphic Signatures Based on Lattices
In a homomorphic signature scheme, given the public key and a vector of signaturesσ := (σ1, . . . , σl) over l messages μ := (μ1, . . . , μl), there exists an efficient algorithm to produce a signature σ′ for μ = f(μ). Given the tuple (σ′, μ, f), anyone can then publicly verify the validity of the signature σ′. Inspired by the recent (selectively secure) key-homomorphic functional encryption fo...
متن کاملPartially Homomorphic Encryption Schemes over Finite Fields
Homomorphic encryption scheme enables computation in the encrypted domain, which is of great importance because of its wide and growing range of applications. The main issue with the known fully (or partially) homomorphic encryption schemes is the high computational complexity and large communication cost required for their execution. In this work, we study symmetric partially homomorphic encry...
متن کاملHomomorphic Evaluation Requires Depth
We show that homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure homomorphic encryption scheme cannot be implemented by circuits of polynomial size and constant depth, i.e., in the class AC. In contrast, we observe that there exist ordinary public-key encryption schemes of quasipolynomial security in AC assuming noisy parities are e...
متن کاملA Depth Specific Description of Somewhat Homomorphic Encryption and Its Applications
In this paper, we consider the depth-specific description of somewhat homomorphic encryption(SHE) schemes over integers. The ciphertexts of SHE scheme may have various forms depending on its encryption depth, and this makes the correctness check of the encryption scheme cumbersome. However, if one can present a SHE scheme depth-specifically, the correctness check is enough with depth-wise check...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 19 شماره
صفحات -
تاریخ انتشار 2012