Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
Zvika Brakerski
(Weizmann)
Vinod Vaikuntanathan
(University of Toronto)
CRYPTO 2011
Fully Homomorphic Encryption from Ring-LWE and Security for Key - - PowerPoint PPT Presentation
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages Zvika Brakerski Vinod Vaikuntanathan (Weizmann) (University of Toronto) CRYPTO 2011 Outsourcing Computation x Function x f f ( x ) medical records
CRYPTO 2011
Function
medical records analysis risk factors
Function
Knows nothing of x.
Function
Privacy guarantee (semantic security [GM82]):
Correctness guarantee:
d-HE with dec. depth > d
Ideal lattice assumption.
“Squash” to dec. depth < d
Sparse Subset-Sum assumption.
Eval for any depth d circuit (aka “somewhat” HE)
Explicit circular security assumption
Novel use of ideal lattices! Previous works (e.g. [NTRU,
MR04, LM06, M07]) used for
efficiency, here used for functionality.
=key dependent message security
( more generally: 𝐹𝑜𝑑(𝑔 𝑡𝑙 ) )
d-HE with dec. depth > d
assumption.
“Squash” to dec. depth < d
Sparse Subset-Sum assumption.
Explicit circular security assumption
– Circular security extends to polynomials of key (a la [MTY11]). – Caveat: circular scheme is not bootstrappable.
– Combine the “two callings” of ideal lattices: efficiency and functionality.
d-HE with dec. depth > d
Ring-LWE [LPR10] assumption.
“Squash” to dec. depth < d
Sparse Subset-Sum assumption.
Explicit circular security assumption
Simple
People are implementing!
Ring of polynomials:
Degree (𝑜 − 1) polynomials with coefficients in ℤ𝑟 (𝑟 large odd prime). 𝑺𝑴𝑿𝑭𝒐,𝒓 assumption: For random 𝑡 ∈ 𝑆𝑟,
For uniform 𝑏𝑗, 𝑣𝑗 and for “small” 𝑓𝑗.
[LPR10] any coefficient
(obviously insecure in our ring)
modular operation needed for actual scheme Circular security: 𝐹𝑜𝑑𝑡 𝑡 = 𝑏, −𝑏𝑡 + 𝑡 = 𝑏, − 𝑏 − 1 𝑡 = 𝑏′ + 1 , −𝑏′𝑡 = 𝐹𝑜𝑑𝑡 0 + (1,0)
s.t. 𝑏𝑡 + 𝑐 = 𝑛
s.t. 𝑏′𝑡 + 𝑐′ = 𝑛′
Correctness:
+
s.t. 𝑏𝑡 + 𝑐 = 𝑛
s.t. 𝑏′𝑡 + 𝑐′ = 𝑛′
×
After hom. eval. of deg. 𝑒 function
= (𝑡𝑒, … , 𝑡, 1).)