22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

1 Introduction 1<br />

1.1 Our Main Technical Innovation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

1.2 An Illustration of an Elgamal-Based Instantiation . . . . . . . . . . . . . . . . . . . . 2<br />

1.3 Leveled FHE Based on Worst-Case Hardness . . . . . . . . . . . . . . . . . . . . . . 3<br />

2 Decryption as a Depth-3 Arithmetic Circuit 4<br />

2.1 Restricted Depth-3 Arithmetic Circuits . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

2.2 Lattice-Based Somewhat-Homomorphic Cryptosystems . . . . . . . . . . . . . . . . . 6<br />

2.3 Decryption Using a Restricted Depth-3 Circuit . . . . . . . . . . . . . . . . . . . . . 6<br />

3 Leveled FHE from SWHE and MHE 7<br />

3.1 Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br />

3.2 Compatible SWHE and MHE Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />

3.3 Chimeric Leveled FHE: The Construction . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

4 Optimizations 10<br />

4.1 Computing Only One Product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />

4.2 Short FHE Ciphertexts: Decryption as a Pure Symmetric Polynomial . . . . . . . . 11<br />

References 12<br />

A Instantiations of Chimeric FHE 14<br />

A.1 The Homomorphic Capacity of SWHE Schemes . . . . . . . . . . . . . . . . . . . . . 14<br />

A.2 Elgamal-based Instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />

A.3 Leveled FHE Based on Worst-Case Hardness . . . . . . . . . . . . . . . . . . . . . . 16<br />

A.3.1 Decryption under Sml . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />

A.3.2 The SWHE scheme Lrg. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

A.3.3 Setting the parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

B Proof of Lemma 1 19<br />

1. Fully Homomorphic Encryption without Squashing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!