×

Practical private-key fully homomorphic encryption in rings. (English) Zbl 1391.94755

Summary: We describe a practical fully homomorphic encryption (FHE) scheme based on homomorphisms between rings and show that it enables very efficient computation on encrypted data. Our encryption though is private-key; public information is only used to operate on encrypted data without decrypting it. Still, we show that our method allows for a third party search on encrypted data.

MSC:

94A60 Cryptography

Software:

HElib
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Z. Brakerski, C. Gentry and V. Vaikuntanathan, (Leveled) fully homomorphic encryption without bootstrapping, Proceedings of the 3rd Innovations in Theoretical Computer Science—Conference ITCS 2012, ACM, New York (2012), 309-325. · Zbl 1347.68120
[2] Z. Brakerski and V. Vaikuntanathan, Efficient fully homomorphic encryption from (standard) LWE, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science—FOCS 2011 (Los Alamitos 2011), IEEE Press, Piscataway (2011), 97-106. · Zbl 1292.94038
[3] M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan, Fully homomorphic encryption over the integers, Advances in Cryptology—EUROCRYPT 2010, Lecture Notes in Comput. Sci. 6110, Springer, Berlin (2010), 24-43. · Zbl 1279.94130
[4] L. Ducas and D. Micciancio, FHE Bootstrapping in less than a second, Advances in Cryptology—EUROCRYPT 2015, Lecture Notes in Comput. Sci. 9056, Springer, Berlin (2015), 617-640. · Zbl 1370.94509
[5] C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM Symposium on Theory of Computing—STOC ’09, ACM, New York (2009), 169-178. · Zbl 1304.94059
[6] D. Grigoriev and I. Ponomarenko, Homomorphic public-key cryptosystems over groups and rings, Quad. Mat. 13 (2004), 305-326. · Zbl 1149.94318
[7] S. Halevi and V. Shoup, Algorithms in HElib, Advances in Cryptology—CRYPTO 2014, Lecture Notes in Comput. Sci. 8616, Springer, Berlin (2014), 554-571. · Zbl 1343.94061
[8] S. Halevi and V. Shoup, HElib - An implementation of homomorphic encryption,
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.