Circuit-Private Multi-Key FHE
Wutichai Chongchitmate∗ Rafail Ostrovsky†
Abstract Multi-key fully homomorphic encryption (MFHE) schemes allow polynomially many users without trusted setup assumptions to send their data (encrypted under different FHE keys chosen by users independently of each other) to an honest-but-curious server that can compute the output of an arbitrary polynomial-time computable function on this joint data and issue it back to all participating users for decryption. One of the main open problems left in MFHE was dealing with malicious users without trusted setup assumptions. We show how this can be done, generalizing previous results of circuit-private FHE. Just like standard circuit-private FHE, our security model shows that even if both ciphertexts and public keys of individual users are not well-formed, no information is revealed regarding the server computation— other than that gained from the output on some well-formed inputs of all users. MFHE schemes have direct applications to server-assisted multiparty computation (MPC), called on-the-fly MPC, introduced by L´
- pez-Alt et al. (STOC ’12), where the number of users is not known in
- advance. In this setting, a poly-time server wants to evaluate a circuit C on data uploaded by
multiple clients and encrypted under different keys. Circuit privacy requires that users’ work is independent of |C| held by the server, while each client learns nothing about C other than its
- utput. We present a framework for transforming MFHE schemes with no circuit privacy into
maliciously circuit-private schemes. We then construct 3-round on-the-fly MPC with circuit privacy against malicious clients in the plain model.
∗University of California, Los Angeles. Department of Computer Science. Email: wutichai@cs.ucla.edu †University of California, Los Angeles. Department of Computer Science and Department of Mathematics. Email:
rafail@cs.ucla.edu Research supported in part by NSF grant 1619348, US-Israel BSF grant 2012366, by DARPA Safeware program, OKAWA Foundation Research Award, IBM Faculty Research Award, Xerox Faculty Research Award, B. John Garrick Foundation Award, Teradata Research Award, and Lockheed-Martin Corporation Research
- Award. The views expressed are those of the authors and do not reflect position of the Department of Defense or the