Fully Homomorphic Encryption Using Ideal Lattices

被引:3733
作者
Gentry, Craig [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
来源
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING | 2009年
关键词
ALGORITHMS; REDUCTION;
D O I
10.1145/1536414.1536440
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a fully homomorphic encryption scheme - i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in three steps. First, we provide a general result - that, to construct an encryption scheme that permits evaluation of arbitrary circuits, it suffices to construct an encryption scheme that can evaluate (slightly augmented versions of) its own decryption circuit; we call a scheme that can evaluate its (augmented) decryption circuit bootstrappable. Next, we describe a public key encryption scheme using ideal lattices that is almost bootstrappable. Lattice-based cryptosystems typically have decryption algorithms with low circuit complexity, often dominated by an inner product computation that is in NC1. Also, ideal lattices provide both additive and multiplicative homomorphisms (modulo a public-key ideal in a polynomial ring that is represented as a lattice), as needed to evaluate general circuits. Unfortunately, our initial scheme is not quite bootstrappable - i.e., the depth that the scheme can correctly evaluate can be logarithmic in the lattice dimension, just like the depth of the decryption circuit, but the latter is greater than the former. In the final step, we show how to modify the scheme to reduce the depth of the decryption scheme, and thereby obtain a bootstrappable encryption scheme, without reducing the depth that the scheme can evaluate. Abstractly, we accomplish this by enabling the encrypter to start the decryption process, leaving less work for the decrypter, much like the server leaves less work for the decrypter in a server-aided cryptosystem.
引用
收藏
页码:169 / 178
页数:10
相关论文
共 58 条
[1]  
AJTAI M, GENERATING HARD INST, P99
[2]  
Ajtai Miklos., 1997, A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence." In, P284
[3]  
[Anonymous], 1990, Cryptology and Computational Number Theory, DOI 10.1090/psapm/042
[4]  
[Anonymous], 1998, LNCS
[5]  
Armknecht F., NEW APPROACH ALGEBRA
[6]   ON LOVASZ LATTICE REDUCTION AND THE NEAREST LATTICE POINT PROBLEM [J].
BABAI, L .
COMBINATORICA, 1986, 6 (01) :1-13
[7]  
BARRINGTON D, BOUNDED WIDTH POLYNO, P1
[8]  
BEAVER D, MINIMAL LATENCY SECU, P335
[9]  
BENALOH JC, 1988, THESIS YALE U
[10]  
BLACK J, ENCRYPTION SCHEME SE, P62