Homomorphic Encryption From Regev ’ s Cryptosystem

نویسندگان

  • Shai Halevi
  • Tal Malkin
  • Kina Winoto
  • Clément Canonne
چکیده

EncryptA(b ∈ {0, 1}). Denote ~b = ⌊ q 2 ⌋ · (0 . . . 0 b ) ∈ Zq . Choose ~r ← DZm,σ, and output the ciphertext ~c = A~r +~b ∈ Zq . Decrypt~s(~c). Compute the inner-product d = 〈~s,~c〉 mod q. Output 1 if |d| > q 4 and 0 if |d| < q 4 . Correctness. We note that 〈~s,~c〉 = ~s(A~r+~b) = (~sA)~r+〈~s,~b〉 = 〈~e′, ~r〉+〈~s,~b〉 (mod q). Since ~e′ and ~r were chosen from an error distribution then they are both small and hence |〈~e′, ~r〉| q. At the same time 〈~s,~b〉 = −bb q 2c, hence 〈~e ′, ~r〉 + 〈~s,~b〉 is closer to 0 when b = 0 and closer to q/2 when b = 1.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

A Toolkit for Ring-LWE Cryptography

Recent advances in lattice cryptography, mainly stemming from the development of ring-based primitives such as ring-LWE, have made it possible to design cryptographic schemes whose efficiency is competitive with that of more traditional number-theoretic ones, along with entirely new applications like fully homomorphic encryption. Unfortunately, realizing the full potential of ring-based cryptog...

متن کامل

Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices

In this paper, we analyze the security of cryptosystems using short generators over ideal lattices such as candidate multilinear maps by Garg, Gentry and Halevi and fully homomorphic encryption by Smart and Vercauteren. Our approach is based on a recent work by Cramer, Ducas, Peikert and Regev on analysis of recovering a short generator of an ideal in the q-th cyclotomic field for a prime power...

متن کامل

Introduction to Homomorphic Encryption

Homomorphic encryption enables computations on encrypted data. This property makes such encryption schemes useful in a wide variety of privacy preserving applications. This paper provides a brief survey on the homomorphic encryption. We describe the homomorphic cryptosystems from partially homomorphic encryption to fully homomorphic encryption. We also give some security analysis and describe h...

متن کامل

Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption

We present a new general multiparty computation protocol for the cryptographic scenario which is universally composable — in particular, it is secure against an active and adaptive adversary, corrupting any minority of the parties. The protocol is as efficient as the best known statically secure solutions, in particular the number of bits broadcast (which dominates the complexity) is Ω(nk|C|), ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013