fully homomorphic encryption
play

Fully Homomorphic Encryption Francisco Vial-Prado ASCrypto - - PowerPoint PPT Presentation

Fully Homomorphic Encryption Francisco Vial-Prado ASCrypto - LatinCrypt 19 IMFD Chile, Ecole Polytechnique, Universit e Paris-Saclay Applied Cryptography @ ProtonMail Generic homomorphic encryption Gentrys blueprint Second generation


  1. Fully Homomorphic Encryption Francisco Vial-Prado ASCrypto - LatinCrypt ’19 IMFD Chile, Ecole Polytechnique, Universit´ e Paris-Saclay Applied Cryptography @ ProtonMail

  2. Generic homomorphic encryption Gentry’s blueprint Second generation Overview Generic homomorphic encryption, a priori observations Gentry’s blueprint Second and third generation schemes Francisco Vial-Prado Fully Homomorphic Encryption

  3. Generic homomorphic encryption Gentry’s blueprint Second generation The problem (Rivest, Adleman, Dertouzos, 1978) On Data Banks And Privacy Homomorphisms - 1978 ... a system working with encrypted data can at most store or retrieve data for the user; any more complicated operations seem to require that the data be decrypted before being operated on. ... it appears likely that there exist [...] Privacy Homomorphisms. Francisco Vial-Prado Fully Homomorphic Encryption

  4. Generic homomorphic encryption Gentry’s blueprint Second generation Privacy Homomorphisms Find an encryption scheme S such that: Let y = S . Enc k ( x ). For any PPT function f mapping plaintexts to plaintexts, find y ′ publicly such that S . Dec k ( y ′ ) = f ( x ). Example: If S . plainspace is a ring, provide functionalities Add , Mult such that Add ( Enc ( x ) , Enc ( y )) encrypts x + y Mult ( Enc ( x ) , Enc ( y )) encrypts x × y . Disclaimer Along with reasonable security properties! Francisco Vial-Prado Fully Homomorphic Encryption

  5. Generic homomorphic encryption Gentry’s blueprint Second generation Privacy Homomorphisms Find an encryption scheme S such that: Let y = S . Enc k ( x ). For any PPT function f mapping plaintexts to plaintexts, find y ′ publicly such that S . Dec k ( y ′ ) = f ( x ). Example: If S . plainspace is a ring, provide functionalities Add , Mult such that Add ( Enc ( x ) , Enc ( y )) encrypts x + y Mult ( Enc ( x ) , Enc ( y )) encrypts x × y . Disclaimer Along with reasonable security properties! Francisco Vial-Prado Fully Homomorphic Encryption

  6. Generic homomorphic encryption Gentry’s blueprint Second generation Privacy Homomorphisms Find an encryption scheme S such that: Let y = S . Enc k ( x ). For any PPT function f mapping plaintexts to plaintexts, find y ′ publicly such that S . Dec k ( y ′ ) = f ( x ). Example: If S . plainspace is a ring, provide functionalities Add , Mult such that Add ( Enc ( x ) , Enc ( y )) encrypts x + y Mult ( Enc ( x ) , Enc ( y )) encrypts x × y . Disclaimer Along with reasonable security properties! Francisco Vial-Prado Fully Homomorphic Encryption

  7. A priori observations

  8. Generic homomorphic encryption Gentry’s blueprint Second generation HE is non determinist 1. Homomorphic encryption must be non-determinist The attacker could solve ring equations x = k ⇔ ( x � = 0) ∧ ( x 2 = x + x + · · · + x ) � �� � k times 1bis. Broccoli heuristics: If ciphertext spaces are distinguishable, they should be somewhat separable. Francisco Vial-Prado Fully Homomorphic Encryption

  9. Generic homomorphic encryption Gentry’s blueprint Second generation HE is non determinist 1. Homomorphic encryption must be non-determinist The attacker could solve ring equations x = k ⇔ ( x � = 0) ∧ ( x 2 = x + x + · · · + x ) � �� � k times 1bis. Broccoli heuristics: If ciphertext spaces are distinguishable, they should be somewhat separable. Francisco Vial-Prado Fully Homomorphic Encryption

  10. Generic homomorphic encryption Gentry’s blueprint Second generation HE runs in worst-case complexity for decision algorithms 2. Logical conditions translate to homomorphic comparison circuits. Consider the equality circuit: Let a , b ∈ { 0 , 1 } κ . � 0 κ if a = b , � Eq( a , b ) = 1 ⊕ ( a i ⊕ b i ⊕ 1) = 1 if a � = b . i =1 Francisco Vial-Prado Fully Homomorphic Encryption

  11. Generic homomorphic encryption Gentry’s blueprint Second generation Don’t allow easy CCA’s 3. – Decrypt Verifiable Computations Only If Possible (Homomorphic encryption schemes are known to be vulnerable to IND-CCA Key-Recovery attacks) Francisco Vial-Prado Fully Homomorphic Encryption

  12. Generic homomorphic encryption Gentry’s blueprint Second generation Connections with other cryptographic problems (implied by) Functional encryption (provides reduction of) Secure Multiparty Computation (compatible with) Identity/Attribute-Based Encryption (brick of?) Indistinguishability Obfuscation (first multi-hop?) Proxy Re-encryption Francisco Vial-Prado Fully Homomorphic Encryption

  13. Generic homomorphic encryption Gentry’s blueprint Second generation Connections with other cryptographic problems (implied by) Functional encryption (provides reduction of) Secure Multiparty Computation (compatible with) Identity/Attribute-Based Encryption (brick of?) Indistinguishability Obfuscation (first multi-hop?) Proxy Re-encryption Francisco Vial-Prado Fully Homomorphic Encryption

  14. Generic homomorphic encryption Gentry’s blueprint Second generation Connections with other cryptographic problems (implied by) Functional encryption (provides reduction of) Secure Multiparty Computation (compatible with) Identity/Attribute-Based Encryption (brick of?) Indistinguishability Obfuscation (first multi-hop?) Proxy Re-encryption Francisco Vial-Prado Fully Homomorphic Encryption

  15. Generic homomorphic encryption Gentry’s blueprint Second generation Connections with other cryptographic problems (implied by) Functional encryption (provides reduction of) Secure Multiparty Computation (compatible with) Identity/Attribute-Based Encryption (brick of?) Indistinguishability Obfuscation (first multi-hop?) Proxy Re-encryption Francisco Vial-Prado Fully Homomorphic Encryption

  16. Generic homomorphic encryption Gentry’s blueprint Second generation Connections with other cryptographic problems (implied by) Functional encryption (provides reduction of) Secure Multiparty Computation (compatible with) Identity/Attribute-Based Encryption (brick of?) Indistinguishability Obfuscation (first multi-hop?) Proxy Re-encryption Francisco Vial-Prado Fully Homomorphic Encryption

  17. Generic homomorphic encryption Gentry’s blueprint Second generation Gentry’s solution The Sophomore’s Dream Let R be some ring and I be an ideal of R . Let m ∈ R / I . Let Enc ( m ) := m + i where i ∈ I is sampled randomly. Enc ( m 1 ) + Enc ( m 2 ) = m 1 + m 2 + i ′ , Enc ( m 1 ) × Enc ( m 2 ) = m 1 × m 2 + i ′′ . Good game; now look for Random efficient sampling from α + I for every α ∈ R / I Secret decryption power: ideal annihilation procedure α + xI �→ α . Connection to hard problems. Francisco Vial-Prado Fully Homomorphic Encryption

  18. Generic homomorphic encryption Gentry’s blueprint Second generation Gentry’s solution The Sophomore’s Dream Let R be some ring and I be an ideal of R . Let m ∈ R / I . Let Enc ( m ) := m + i where i ∈ I is sampled randomly. Enc ( m 1 ) + Enc ( m 2 ) = m 1 + m 2 + i ′ , Enc ( m 1 ) × Enc ( m 2 ) = m 1 × m 2 + i ′′ . Good game; now look for Random efficient sampling from α + I for every α ∈ R / I Secret decryption power: ideal annihilation procedure α + xI �→ α . Connection to hard problems. Francisco Vial-Prado Fully Homomorphic Encryption

  19. Generic homomorphic encryption Gentry’s blueprint Second generation Gentry’s solution The Sophomore’s Dream Let R be some ring and I be an ideal of R . Let m ∈ R / I . Let Enc ( m ) := m + i where i ∈ I is sampled randomly. Enc ( m 1 ) + Enc ( m 2 ) = m 1 + m 2 + i ′ , Enc ( m 1 ) × Enc ( m 2 ) = m 1 × m 2 + i ′′ . Good game; now look for Random efficient sampling from α + I for every α ∈ R / I Secret decryption power: ideal annihilation procedure α + xI �→ α . Connection to hard problems. Francisco Vial-Prado Fully Homomorphic Encryption

  20. Generic homomorphic encryption Gentry’s blueprint Second generation Gentry’s solution The Sophomore’s Dream Let R be some ring and I be an ideal of R . Let m ∈ R / I . Let Enc ( m ) := m + i where i ∈ I is sampled randomly. Enc ( m 1 ) + Enc ( m 2 ) = m 1 + m 2 + i ′ , Enc ( m 1 ) × Enc ( m 2 ) = m 1 × m 2 + i ′′ . Good game; now look for Random efficient sampling from α + I for every α ∈ R / I Secret decryption power: ideal annihilation procedure α + xI �→ α . Connection to hard problems. Francisco Vial-Prado Fully Homomorphic Encryption

  21. Generic homomorphic encryption Gentry’s blueprint Second generation Gentry’s solution The Sophomore’s Dream Let R be some ring and I be an ideal of R . Let m ∈ R / I . Let Enc ( m ) := m + i where i ∈ I is sampled randomly. Enc ( m 1 ) + Enc ( m 2 ) = m 1 + m 2 + i ′ , Enc ( m 1 ) × Enc ( m 2 ) = m 1 × m 2 + i ′′ . Good game; now look for Random efficient sampling from α + I for every α ∈ R / I Secret decryption power: ideal annihilation procedure α + xI �→ α . Connection to hard problems. Francisco Vial-Prado Fully Homomorphic Encryption

  22. Generic homomorphic encryption Gentry’s blueprint Second generation Ideals + Lattices = Ideal Lattices Gentry’s first FHE scheme Specialized the latter construction using polynomial rings and two sets of ideal lattices. Secret and public keys are parallelepipeds in R n , with large n , and plaintexts/ciphertexts are polynomials in Z [ X ] / ( X n − 1). Francisco Vial-Prado Fully Homomorphic Encryption

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend