An Overview of Homomorphic Encryption
Alexander Lange
Department of Computer Science Rochester Institute of Technology Rochester, NY 14623
May 9, 2011
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 1 / 22
An Overview of Homomorphic Encryption Alexander Lange Department of - - PowerPoint PPT Presentation
An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623 May 9, 2011 Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 1 / 22 Outline Algebraic
Department of Computer Science Rochester Institute of Technology Rochester, NY 14623
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 1 / 22
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 2 / 22
Algebraic Homomorphisms Group & Ring Homomorphism
1 ϕ is a group homomorphism on the additive groups (R, +) and (S, +) 2 ϕ(xy) = ϕ(x)ϕ(y)
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 3 / 22
Application to Cryptography
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 4 / 22
Application to Cryptography Example: RSA
1 xb 2 mod n = (x1x2)b mod n = eK(x1x2)
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 5 / 22
History Data Banks
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 6 / 22
History Blind Signatures
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 7 / 22
Additive Homomorphisms ElGamal
p such that α is a generator of Z∗
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 8 / 22
Additive Homomorphisms ElGamal
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 9 / 22
Additive Homomorphisms ElGamal
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 10 / 22
Additive Homomorphisms Paillier
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 11 / 22
Additive Homomorphisms Paillier
n2 such that L(gλ
n ). n and g are public; p and
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 12 / 22
Applications E-Voting
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 13 / 22
Applications E-Voting
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 14 / 22
Applications E-Voting
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 15 / 22
Applications Private Information Retrieval
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 16 / 22
Applications Private Information Retrieval
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 17 / 22
Fully Homorphic Encryption Overview
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 18 / 22
Fully Homorphic Encryption Craig Gentry
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 19 / 22
Fully Homorphic Encryption Craig Gentry
1 + pq1)(m′ 2 + pq2)
1 + pq1)(m′ 2 + pq2) mod p mod 2 = m′ 1 · m′ 2 mod 2 = m1 · m2
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 20 / 22
Fully Homorphic Encryption Craig Gentry
1 · m′ 2 in the example) results in loss of
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 21 / 22
Fully Homorphic Encryption Craig Gentry
Alexander Lange (RIT) Homomorphic Encryption May 9, 2011 22 / 22