An Additively Homomorphic Encryption over Large Message Space

An Additively Homomorphic Encryption over Large Message Space

Hu Chen (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China), Yupu Hu (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China), Zhizhu Lian (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China), Huiwen Jia (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China) and Xu An Wang (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China)
DOI: 10.4018/IJITWE.2015070106
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Fully homomorphic encryption schemes available are not efficient enough to be practical, and a number of real-world applications require only that a homomorphic encryption scheme is somewhat homomorphic, even additively homomorphic and has much larger message space for efficiency. An additively homomorphic encryption scheme based heavily on Smart-Vercauteren encryption scheme (SV10 scheme, PKC 2010) is put forward, where both schemes each work with two ideals I and J. As a contribution of independent interest, a two-element representation of the ideal I is given and proven by factoring prime numbers in a number field. This two-element representation serves as the public key. The authors' scheme allows working over much larger message space than that of SV10 scheme by selecting the ideal I with larger decryption radius to generate public/private key pair, instead of choosing the ideal J as done in the SV10 scheme. The correctness and security of the scheme are shown, followed by setting parameters and computational results. The results indicate that this construction has much larger message space than SV10 scheme.
Article Preview

1. Introduction

Several exciting advances for lattice-based public key cryptosystem have been made, including predicate encryptions (Gorbunov, 2015a), the schemes of candidate multilinear maps (Garg, 2013a; Gentry, 2015; Coron, 2013a; Coron, 2015) and their applications (Garg, 2013b; Sahai, 2014), and homomorphic constructions (Gorbunov, 2015b; Gentry, 2009a). Particularly, homomorphic encryption (HE) is such an encryption where the output of the ring operations on the ciphertext space can be decrypted as the output of the corresponding ring operations on the plaintext space. It can be used for secure function evaluation, but the major application is homomorphic service, which is in such a scene. A user needs to obtain the output of the ring-operations on the plaintext space, and he wants to do nothing but decryption. The server implements homomorphic operations on the ciphertext space. That is, the server is given corresponding ciphertexts of input plaintexts, and computes the corresponding ciphertext of the output plaintext. Then the server sends this ciphertext to the user. The user then decrypts this ciphertext to obtain the original output plaintext. If an HE scheme can compute any function of the ciphertexts, then it is known as a Fully Homomorphic Encryption (FHE) scheme. Otherwise, it is referred to as a Somewhat Homomorphic Encryption (SHE) scheme. Recent years have witnessed several exciting advances for FHE, since the breakthrough work of Gentry (Gentry, 2009a; Gentry, 2009b). Smart and Vercauteren presented a novel FHE at PKC 2010 (Smart, 2010) (SV10 scheme for short), in which ciphertexts are integers rather than vectors. Another earliest scheme for FHE over the integers was presented by Dijk et al. (Dijk, 2010) at Eurocrypt 2010. The schemes above that follow Gentry’s blueprint have fairly poor performance. Without using the squashing step, the schemes in (Gentry, 2011a; Brakerski, 2011) begin to make the differences from Gentry’s blueprint for FHE. As shown in (Brakerski, 2011), the authors introduced new way of dimension-modulus reduction to control noise and thus to construct an FHE scheme based on the learning with error (LWE) problem. Soon after, Brakerski et al. (Brakerski, 2012b) made good use of modulus switching technique to obtain an FHE scheme without bootstrapping. Subsequently, the authors of (Brakerski, 2012a; Coron, 2014) gave several FHE schemes without modulus switching. At Crypto 2013 Gentry et al. (Gentry, 2013) used the approximate eigenvector method for building FHE scheme, which has no evaluation keys. This makes their scheme asymptotically faster and helps them construct the first identity-based FHE scheme. As a key technology for achieving FHE, faster bootstrapping is also explored in (Alperin-Sheriff, 2014; Ducas, 2015).

Complete Article List

Search this Journal:
Volume 18: 1 Issue (2023): Forthcoming, Available for Pre-Order
Volume 17: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 16: 4 Issues (2021)
Volume 15: 4 Issues (2020)
Volume 14: 4 Issues (2019)
Volume 13: 4 Issues (2018)
Volume 12: 4 Issues (2017)
Volume 11: 4 Issues (2016)
Volume 10: 4 Issues (2015)
Volume 9: 4 Issues (2014)
Volume 8: 4 Issues (2013)
Volume 7: 4 Issues (2012)
Volume 6: 4 Issues (2011)
Volume 5: 4 Issues (2010)
Volume 4: 4 Issues (2009)
Volume 3: 4 Issues (2008)
Volume 2: 4 Issues (2007)
Volume 1: 4 Issues (2006)
View Complete Journal Contents Listing