Efficient Dynamic Multi-key FHE Scheme from LWE for Untrusted Cloud Environments.

Shuchang Zeng,Chingfang Hsu,Jianqun Cui, Wei Xie, Qihang Hou

International Conference on Parallel and Distributed Systems(2023)

引用 0|浏览2
暂无评分
摘要
Fully Homomorphic Encryption (FHE) provides a good solution to directly operate on the ciphertext, and the decryption result is equivalent to the corresponding operation on the plaintext. As a technique suitable for distributed environments, multi-key Fully Homomorphic Encryption (MKFHE) scheme is the most common variant of the FHE scheme since it allows encrypted data to be computed under different keys. Unfortunately, the existing dynamic MKFHE schemes based on learning with errors (LWE) still suffer from the inefficiency of long public keys, which typically grow cube in size along the lattice dimension. Moreover, there current constructions fail to provide reliable and fast algorithms to simultaneously expand ciphertexts with multiple additional keys. In order to solve the above problems, a new faster dynamic MKFHE scheme with shorter public key in asymmetric key setting from LWE is proposed in this paper, in which the size of the public key is further reduced from $\tilde O\left( {{n^3}{{(K + L)}^2}} \right)$ to $\tilde O\left( {{n^2}{{(K + L)}^2}} \right)$. In addition, our scheme cleverly adopts the dual-user cooperation method in distributed system to realize the ciphertext expansion locally, thereby reducing the computing overhead of the cloud server. More interestingly, we design a flexible parallel ciphertext expansion algorithm for the first time based on the basic algorithm. This algorithm realizes the ciphertext expansion when multiple keys are added at the same time, thus significantly improving the computational efficiency of ciphertext expansion in the dynamic MKFHE scheme. Finally, the CPA-secure of our scheme based on standard LWE assumptions is proven.
更多
查看译文
关键词
Post-quantum,GSW,Multi-key fully homomorphic encryption,Ciphertext expansion,Learning with errors,Distributed,Lattice-based cryptography.
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要