Abstract
In 1978, Rivest, Adleman and Dertouzos introduced the basic concept of privacy homomorphism that allows computation on encrypted data without decryption. It was an interesting work whose idea precedes the recent development of fully homomorphic encryption, although actual example schemes proposed in the paper are all susceptible to simple known-plaintext attacks. In this paper, we revisit one of their proposals, in particular the third scheme which is based on the Chinese Remainder Theorem and is ring homomorphic. It is known that only a single pair of known plaintext/ciphertext is needed to break this scheme. However, by exploiting the standard technique to insert an error to a message before encryption, we can cope with this problem. We present a secure modification of their proposal by showing that the proposed scheme is fully homomorphic and secure against the chosen plaintext attacks under the approximate GCD assumption and the sparse subset sum assumption when the message space is restricted to Z2k. Interestingly, the proposed scheme can be regarded as a generalization of the DGHV scheme with larger plaintext space. Our scheme has O∼(λ5) ciphertext expansion overhead while the DGHV has O∼(λ8) for the security parameter λ. When restricted to the homomorphic encryption scheme with depth of O(logλ), the overhead is reduced to O∼(λ). Our scheme can be used in applications requiring a large message space ZQ for logQ=O(λ4), or SIMD style operations on ZQk for logQ=O(λ),k=O(λ3), with O∼(λ5) ciphertext size as in the DGHV.
Original language | English |
---|---|
Pages (from-to) | 149-162 |
Number of pages | 14 |
Journal | Information Sciences |
Volume | 310 |
DOIs | |
State | Published - 20 Jul 2015 |
Bibliographical note
Publisher Copyright:© 2015 Published by Elsevier Inc.
Keywords
- Approximate gcd
- Chinese remainder theorem
- DGHV
- Homomorphic encryption
- Privacy homomorphism