Thông tin tài liệu


Nhan đề : 
Maliciously circuit-private multi-key FHE and MPC based on LWE
Tác giả : 
Nuttapong, Attrapadung
Goichiro, Hanaoka
Ryo, Hiromasa
Năm xuất bản : 
2022
Nhà xuất bản : 
Springer
Tóm tắt : 
In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our schemes are based on learning with errors (LWE) besides appropriate circular security assumptions. In contrast, the previous maliciously circuit-private MKFHE scheme by Chongchitmate and Ostrovsky (PKC, 2017) is based on the non-standard decisional small polynomial ratio (DSPR) assumption with a super-polynomial modulus, besides ring learning with errors and circular security assumptions. We note that it was shown by Albrecht et al. (CRYPTO, 2016) that there exists a sub-exponential time attack against this type of DSPR assumption. The main building block of our maliciously circuit-private MKFHE scheme is a (plain) MKFHE scheme by Brakerski et al. (TCC, 2017), and the security of our schemes is proven under the hardness of LWE with sub-exponential modulus-to-noise ratio and circular security assumptions related to the Brakerski et al. scheme. Furthermore, based on our MKFHE schemes, we construct four-round multi-party computation (MPC) protocols with circuit privacy against a semi-honest server and malicious clients in the plain model. The protocols are obtained by combining our schemes with a maliciously sender-private oblivious transfer protocol and a circuit garbling scheme, all of which can be instantiated only assuming LWE.
Mô tả: 
CC BY
URI: 
https://link.springer.com/article/10.1007/s10623-022-01160-x
https://dlib.phenikaa-uni.edu.vn/handle/PNK/8287
Bộ sưu tập
OER - Công nghệ thông tin
XEM MÔ TẢ

18

XEM TOÀN VĂN

30

Danh sách tệp tin đính kèm:

Ảnh bìa
  • Maliciously circuit-private multi-key FHE and MPC based on LWE-2022.pdf
      Restricted Access
    • Dung lượng : 755,7 kB

    • Định dạng : Adobe PDF