Homomorphic Encryption From Regev ’ s Cryptosystem
نویسندگان
چکیده
EncryptA(b ∈ {0, 1}). Denote ~b = ⌊ q 2 ⌋ · (0 . . . 0 b ) ∈ Zq . Choose ~r ← DZm,σ, and output the ciphertext ~c = A~r +~b ∈ Zq . Decrypt~s(~c). Compute the inner-product d = 〈~s,~c〉 mod q. Output 1 if |d| > q 4 and 0 if |d| < q 4 . Correctness. We note that 〈~s,~c〉 = ~s(A~r+~b) = (~sA)~r+〈~s,~b〉 = 〈~e′, ~r〉+〈~s,~b〉 (mod q). Since ~e′ and ~r were chosen from an error distribution then they are both small and hence |〈~e′, ~r〉| q. At the same time 〈~s,~b〉 = −bb q 2c, hence 〈~e ′, ~r〉 + 〈~s,~b〉 is closer to 0 when b = 0 and closer to q/2 when b = 1.
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملA Toolkit for Ring-LWE Cryptography
Recent advances in lattice cryptography, mainly stemming from the development of ring-based primitives such as ring-LWE, have made it possible to design cryptographic schemes whose efficiency is competitive with that of more traditional number-theoretic ones, along with entirely new applications like fully homomorphic encryption. Unfortunately, realizing the full potential of ring-based cryptog...
متن کاملSecurity Analysis of Cryptosystems Using Short Generators over Ideal Lattices
In this paper, we analyze the security of cryptosystems using short generators over ideal lattices such as candidate multilinear maps by Garg, Gentry and Halevi and fully homomorphic encryption by Smart and Vercauteren. Our approach is based on a recent work by Cramer, Ducas, Peikert and Regev on analysis of recovering a short generator of an ideal in the q-th cyclotomic field for a prime power...
متن کاملIntroduction to Homomorphic Encryption
Homomorphic encryption enables computations on encrypted data. This property makes such encryption schemes useful in a wide variety of privacy preserving applications. This paper provides a brief survey on the homomorphic encryption. We describe the homomorphic cryptosystems from partially homomorphic encryption to fully homomorphic encryption. We also give some security analysis and describe h...
متن کاملUniversally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption
We present a new general multiparty computation protocol for the cryptographic scenario which is universally composable — in particular, it is secure against an active and adaptive adversary, corrupting any minority of the parties. The protocol is as efficient as the best known statically secure solutions, in particular the number of bits broadcast (which dominates the complexity) is Ω(nk|C|), ...
متن کامل