Maliciously circuit-private multi-key FHE and MPC based on LWE

CC BY

Lưu vào:
Hiển thị chi tiết
Tác giả chính: Nuttapong, Attrapadung, Goichiro, Hanaoka, Ryo, Hiromasa
Định dạng: Sách
Ngôn ngữ:English
Nhà xuất bản: Springer 2023
Chủ đề:
MPC
Truy cập trực tuyến:https://link.springer.com/article/10.1007/s10623-022-01160-x
https://dlib.phenikaa-uni.edu.vn/handle/PNK/8287
Từ khóa: Thêm từ khóa
Không có từ khóa, Hãy là người đầu tiên đánh dấu biểu ghi này!
id oai:localhost:PNK-8287
record_format dspace
spelling oai:localhost:PNK-82872023-04-25T07:17:16Z Maliciously circuit-private multi-key FHE and MPC based on LWE Nuttapong, Attrapadung Goichiro, Hanaoka Ryo, Hiromasa MKFHE MPC CC BY In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our schemes are based on learning with errors (LWE) besides appropriate circular security assumptions. In contrast, the previous maliciously circuit-private MKFHE scheme by Chongchitmate and Ostrovsky (PKC, 2017) is based on the non-standard decisional small polynomial ratio (DSPR) assumption with a super-polynomial modulus, besides ring learning with errors and circular security assumptions. We note that it was shown by Albrecht et al. (CRYPTO, 2016) that there exists a sub-exponential time attack against this type of DSPR assumption. The main building block of our maliciously circuit-private MKFHE scheme is a (plain) MKFHE scheme by Brakerski et al. (TCC, 2017), and the security of our schemes is proven under the hardness of LWE with sub-exponential modulus-to-noise ratio and circular security assumptions related to the Brakerski et al. scheme. Furthermore, based on our MKFHE schemes, we construct four-round multi-party computation (MPC) protocols with circuit privacy against a semi-honest server and malicious clients in the plain model. The protocols are obtained by combining our schemes with a maliciously sender-private oblivious transfer protocol and a circuit garbling scheme, all of which can be instantiated only assuming LWE. 2023-04-25T07:17:16Z 2023-04-25T07:17:16Z 2022 Book https://link.springer.com/article/10.1007/s10623-022-01160-x https://dlib.phenikaa-uni.edu.vn/handle/PNK/8287 en application/pdf Springer
institution Digital Phenikaa
collection Digital Phenikaa
language English
topic MKFHE
MPC
spellingShingle MKFHE
MPC
Nuttapong, Attrapadung
Goichiro, Hanaoka
Ryo, Hiromasa
Maliciously circuit-private multi-key FHE and MPC based on LWE
description CC BY
format Book
author Nuttapong, Attrapadung
Goichiro, Hanaoka
Ryo, Hiromasa
author_facet Nuttapong, Attrapadung
Goichiro, Hanaoka
Ryo, Hiromasa
author_sort Nuttapong, Attrapadung
title Maliciously circuit-private multi-key FHE and MPC based on LWE
title_short Maliciously circuit-private multi-key FHE and MPC based on LWE
title_full Maliciously circuit-private multi-key FHE and MPC based on LWE
title_fullStr Maliciously circuit-private multi-key FHE and MPC based on LWE
title_full_unstemmed Maliciously circuit-private multi-key FHE and MPC based on LWE
title_sort maliciously circuit-private multi-key fhe and mpc based on lwe
publisher Springer
publishDate 2023
url https://link.springer.com/article/10.1007/s10623-022-01160-x
https://dlib.phenikaa-uni.edu.vn/handle/PNK/8287
_version_ 1764177438219173888
score 8.891145