22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

encrypted data. We introduce a precise framework, generalizing the foundational notion of nonmalleability<br />

introduced by Dolev, Dwork, and Naor[20], ensuring that the malleability of a<br />

scheme is targeted only at a specific set of "allowable" functions.<br />

In this setting we are mainly interested in the efficiency of such schemes as a function of the<br />

number of repeated homomorphic operations. Whereas constructing a scheme whose ciphertext<br />

grows linearly with the number of such operations is straightforward, obtaining more realistic (or<br />

merely non-trivial) length guarantees is significantly more challenging.<br />

We present two constructions that transform any homomorphic encryption scheme into one that<br />

offers targeted malleability. Our constructions rely on standard cryptographic tools and on<br />

succinct non-interactive arguments, which are currently known to exist in the standard model<br />

based on variants of the knowledge-of-exponent assumption. The two constructions offer<br />

somewhat different efficiency guarantees, each of which may be preferable depending on the<br />

underlying building blocks.<br />

4. “Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller” by Daniele Micciancio and<br />

Chris Peikert[10]<br />

We give new methods for generating and using “strong trapdoors” in cryptographic lattices,<br />

which are simultaneously simple, efficient, easy to implement (even in parallel), and<br />

asymptotically optimal with very small hidden constants. Our methods involve a new kind of<br />

trapdoor, and include specialized algorithms for inverting LWE, randomly sampling SIS<br />

preimages, and securely delegating trapdoors. These tasks were previously the main bottleneck<br />

for a wide range of cryptographic schemes, and our techniques substantially improve upon the<br />

prior ones, both in terms of practical performance and quality of the produced outputs. Moreover,<br />

the simple structure of the new trapdoor and associated algorithms can be exposed in<br />

applications, leading to further simplifications and efficiency improvements. We exemplify the<br />

applicability of our methods with new digital signature schemes and CCA-secure encryption<br />

schemes, which have better efficiency and security than the previously known lattice-based<br />

constructions.<br />

5. “Homomorphic Evaluation of the AES Circuit” by Craig Gentry, Shai Halevi and Nigel<br />

Smart[7]<br />

We describe a working implementation of leveled homomorphic encryption (without<br />

bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes<br />

under over 36 hours to evaluate an entire AES encryption operation, using NTL (over GMP) as<br />

our underlying software platform, and running on a large-memory machine. Using SIMD<br />

techniques, we can process over 54 blocks in each evaluation, yielding an amortized rate of just<br />

under 40 minutes per block. Another implementation takes just over two and a half days to<br />

evaluate the AES operation, but can process 720 blocks in each evaluation, yielding an amortized<br />

rate of just over five minutes per block. We also detail a third implementation, which<br />

theoretically could yield even better amortized complexity, but in practice turns out to be less<br />

competitive.<br />

Approved for Public Release; Distribution Unlimited.<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!