(2022) Maliciously Circuit-Private FHE from Information-Theoretic Principles.
|
Text
main.pdf Download (791kB) | Preview |
Abstract
Fully homomorphic encryption (FHE) allows arbitrary computations on encrypted data. The standard security requirement, IND-CPA security, ensures that the encrypted data remain private. However, it does not guarantee privacy for the computation performed on the encrypted data. Statistical circuit privacy offers a strong privacy guarantee for the computation process, namely that a homomorphically evaluated ciphertext does not leak any information on how the result of the computation was obtained. Malicious statistical circuit privacy requires this to hold even for maliciously generated keys and ciphertexts. Ostrovsky, Paskin and Paskin (CRYPTO 2014) constructed an FHE scheme achieving malicious statistical circuit privacy. Their construction, however, makes non-black-box use of a specific underlying FHE scheme, resulting in a circuit-private scheme with inherently high overhead. This work presents a conceptually different construction of maliciously circuit-private FHE from simple information-theoretical principles. Furthermore, our construction only makes black-box use of the underlying FHE scheme, opening the possibility of achieving practically efficient schemes. Finally, in contrast to the OPP scheme in our scheme, pre- and post-homomorphic ciphertexts are syntactically the same, enabling new applications in multi-hop settings.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Divisions: | Nico Döttling (Cryptographic Algorithms, CA) |
Conference: | UNSPECIFIED |
Depositing User: | Jesko Dujmovic |
Date Deposited: | 09 May 2022 08:40 |
Last Modified: | 09 May 2022 08:40 |
Primary Research Area: | NRA1: Trustworthy Information Processing |
URI: | https://publications.cispa.saarland/id/eprint/3677 |
Actions
Actions (login required)
View Item |