期刊文献+

LWE上的全同态加密方案研究 被引量:11

Survey on LWE-based Fully Homomorphic Encryption Scheme
下载PDF
导出
摘要 文章介绍了全同态加密的研究历史和现状,分析了构建全同态加密方案的思想与方法,并且介绍和整理了全同态加密的一些主要技术。文章还综述了基于LWE的全同态加密方案,先是用重线性化技术构造一个部分同态加密方案,再利用维数模约减技术降低密文的尺寸和解密电路复杂度,结合bootstrappable技术获得全同态加密。文章研究的基于LWE的全同态加密方案主要从噪声、参数性能、安全性这三个方面进行具体分析。文章最后对该方案与整数上的全同态加密方案从性能、安全性两个方面进行比较,同时指出全同态加密方案的构建本质与亟待解决的关键问题,为进一步研究全同态加密提供参考性意见。 This paper introduced history and current situation in fully homomorphic encryption (FHE). We analyzed the idea and methods of constructing FHE scheme, and classified the main techniques that are used to construct FHE scheme. Then this paper summarized LWE-based fully homomorphic encryption scheme, firstly, a somewhat homomorphic encryption schemes is constructed by using a re-linearization technique, secondly, dimension-modulus reduction technique is utilized to reduce the size of ciphertexts and decryption circuit complexity, combined bootstrappable technology to achieve full homomorphic encryption. It mainly analyzed three aspects which from noise problem, parameters and performance as well as security. At last we compared with the fully homomorphic encryption over the integers, which from two aspects of performance and security, and point out the essence of the way to construct FHE and the main problems that need to be solved at present. We hope this paper can provide guidance for further in-depth study of fully homomorphic encrvntion.
出处 《信息网络安全》 2015年第1期32-38,共7页 Netinfo Security
基金 国家高技术研究发展计划[2012AA011705] 广西自然科学基金[2013GXNSFBB053005] ISN国际重点实验室开放基金 广西无线宽带通信与信号处理重点实验室开放基金
关键词 全同态加密 LWE 噪声 参数及性能 安全性 fully homomorphic encryption LWE noise parameters and performance security
  • 相关文献

参考文献36

  • 1GENTRY C. Fully homornorphic encryption using ideal lattices[C]// Proceedings of the 41st annual ACM symposium on Theory of computing. Bethesda, MD, USA; ACM. 2009: 169-178. 被引量:1
  • 2RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[J]. Foundations of secure computation, 1978,4(11): 169-180. 被引量:1
  • 3MICCIANCIO D. A first glimpse of cryptography's Holy Grail[J]. Communications of the ACM, 2010, 53(3): 96-96. 被引量:1
  • 4RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communication ACM, 1978, 21(2): 120-126. 被引量:1
  • 5GOLDWASSER 8, MICALI 8. Probabilistic encryption[J]. Journal of computer and system sciences, 1984, 28(2): 270-299. 被引量:1
  • 6ELGAMAL T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Trans InfTheory, 1985, 31(4): 469-472. 被引量:1
  • 7PAILLIER P. Public-Key Cryptosystems Based on CompositeDegree Residuosity Classes[C]//STERN J. Advances in Cryptology-- EUROCRYPT'99. Springer Berlin Heidelberg. 1999: 223-238. 被引量:1
  • 8Damgdrd I, JU1LIK M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System[C]//Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography. Springer-Verlag. 2001: 119- 136. 被引量:1
  • 9AJTAI M S, DWOILK C. A public-key cryptosystem with worst- caseaverage-case equivalence[C]//Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. E1 Paso, Texas, United States; ACM. 1997: 284-293. 被引量:1
  • 10tLEGEV O. New lattice-based cryptographic constructions[J]. JACM, 2004, 51(6): 899-942. 被引量:1

同被引文献77

  • 1RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978: 169-179. 被引量:1
  • 2GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299. 被引量:1
  • 3PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[J]. Advances in Cryptology-Eurocrypt, 1999: 223-238. 被引量:1
  • 4DAMGARD I, JURIK M. A generalisation, a simplification and some applications of paiUier' s probabilistic public-key system[J]. Public Key Cryptography, 2001: 119-136. 被引量:1
  • 5BONEH D, GOH E, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[C]//Second Theory of Cryptography Conference, Cambridge, 2005, 325-341. 被引量:1
  • 6GENTRY C. Fully homomorphic encryption using ideal lattices[J]. Proc Stoc, 2009, 2011, (4):169-178. 被引量:1
  • 7SMART N P, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[C]//13th International Conference on Practice and Theory in Public Key Cryptography, Paris, 2010: 420-443. 被引量:1
  • 8STEHLE D, STEINFELD R. Faster fully homomorphic encryption[C]//16th International Conference on the Theory and Application of Cryptology and Information Security, 2010: 377-394. 被引量:1
  • 9BRAKERSKI Z, VAIKUNTANATHAN V. Fully homomorphic encryption from ring-LWE and security for key dependent messages[C]//31st Annual Cryptology Conference, Santa, 2011, 505-524. 被引量:1
  • 10GENTRY C, HALEVI S. Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits[J]. Foundations of Computer Science Annual Symposium on, 2011, 47(10): 107-109. 被引量:1

引证文献11

二级引证文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部