• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Fully homomorphic encryption using ideal lattices (2009)

Cached

  • Download as a PDF

Download Links

  • [www.cs.cmu.edu]
  • [sage.math.washington.edu]
  • [www.signallake.com]
  • [sage.math.washington.edu]
  • [modular.math.washington.edu]
  • [modular.math.washington.edu]
  • [www.cs.cmu.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Craig Gentry
Venue:In Proc. STOC
Citations:659 - 17 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Gentry09fullyhomomorphic,
    author = {Craig Gentry},
    title = {Fully homomorphic encryption using ideal lattices},
    booktitle = {In Proc. STOC},
    year = {2009},
    pages = {169--178}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in three steps. First, we provide a general result – that, to construct an encryption scheme that permits evaluation of arbitrary circuits, it suffices to construct an encryption scheme that can evaluate (slightly augmented versions of) its own decryption circuit; we call a scheme that can evaluate its (augmented) decryption circuit bootstrappable. Next, we describe a public key encryption scheme using ideal lattices that is almost bootstrappable. Lattice-based cryptosystems typically have decryption algorithms with low circuit complexity, often dominated by an inner product computation that is in NC1. Also, ideal lattices provide both additive and multiplicative homomorphisms (modulo a public-key ideal in a polynomial ring that is represented as a lattice), as needed to evaluate general circuits. Unfortunately, our initial scheme is not quite bootstrappable – i.e., the depth that the scheme can correctly evaluate can be logarithmic in the lattice dimension, just like the depth of the decryption circuit, but the latter is greater than the former. In the final step, we show how to modify the scheme to reduce the depth of the decryption circuit, and thereby obtain a bootstrappable encryption scheme, without reducing the depth that the scheme can evaluate. Abstractly, we accomplish this by enabling the encrypter to start the decryption process, leaving less work for the decrypter, much like the server leaves less work for the decrypter in a server-aided cryptosystem.

Keyphrases

ideal lattice    decryption circuit    homomorphic encryption    encryption scheme    homomorphic encryption scheme    final step    public key encryption scheme    initial scheme    arbitrary circuit    bootstrappable encryption scheme    low circuit complexity    server-aided cryptosystem    decryption algorithm    multiplicative homomorphism    general circuit    decryption process    inner product computation    public-key ideal    polynomial ring    lattice dimension    general result    lattice-based cryptosystems   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University