22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Lemma 4. Let prime p = ω(N 2 ). There is a prime r = O(N) and a univariate polynomial f(x)<br />

of degree O(N 2 ) such that, for all ciphertexts (c, {u ′ i }, {u′′ i }) that encrypt m ∈ {0, 1}, we have<br />

m = f(t r ) mod p where<br />

def<br />

t r = [2 κ · c] r + ∑ i s i · [−2 κ · u ′ i − u ′′<br />

i ] r . (3)<br />

Proof. Let t = 2 κ( c − ∑ s i · u ′ ∑<br />

i)<br />

− si · u ′′<br />

i . The original decryption formula (Equation 2) is<br />

m = c − ∑ s i · u ′ i − ⌊2 −κ · ∑ s i · u ′′<br />

i ⌉ = ⌊2 −κ · t⌉ mod p<br />

Thus, m can be recovered from t. Since there are only 2 possibilities for m, the (consecutive)<br />

support of t has size 2 κ+1 = O(N). Set r to be a prime ≥ 2 κ+1 . Since the mapping x ↦→ [x] r has<br />

no collisions over the support of t, t can be recovered from [t] r . Note that [t] r = [t r ] r . Thus m can<br />

be recovered from t r (via [t r ] r = [t] r , then t). Since there are O(N · r) = O(N 2 ) possibilities for t r ,<br />

the lemma follows.<br />

Theorem 3. Let prime p = ω(N 2 ). There is a prime r = O(N) and a multilinear symmetric<br />

polynomial M such that, for all “hashed” ciphertexts ([2 κ · c] r , {[−2 κ · u ′ i − u′′ i ] r}) that encrypt<br />

m ∈ {0, 1}, we have<br />

m = M(1, . . . , 1, 0, . . . , 0, . . . s<br />

} {{ } } {{ } 1 , . . . , s 1 , 0, . . . , 0<br />

} {{ } } {{ }<br />

[2 κ·c] r r−[2 κ·c] r [−2 κ·u ′ 1 −u′′ 1 ]r<br />

r−[−2 κ·u ′ 1 −u′′<br />

Proof. This follows easily from Lemmas 4 and 2.<br />

, . . . s N , . . . , s N , 0, . . . , 0 ) mod p<br />

} {{ } } {{ }<br />

1 ]r [−2 κ·u ′ N −u′′ N ]r r−[−2 κ·u ′ N −u′′ N ]r<br />

Thus, decryption can be turned into a purely multilinear symmetric polynomial M whose<br />

product gates output λ j · P (a j ) (for known ciphertext-independent λ j ’s), where P (z) is similar<br />

to the polynomial described in Section 4.1. Using the optimization of Section 4.1, we can compress<br />

the entire leveled FHE ciphertext down to a single MHE ciphertext that encrypts P (a 1 ).<br />

Acknowledgments This material is based on research sponsored by DARPA under agreement<br />

number FA8750-11-C-0096. The U.S. Government is authorized to reproduce and distribute reprints<br />

for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions<br />

contained herein are those of the authors and should not be interpreted as necessarily<br />

representing the official policies or endorsements, either expressed or implied, of DARPA or the<br />

U.S. Government. Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)<br />

References<br />

[BV11]<br />

[ElG85]<br />

Zvika Brakerski and Vinod Vaikuntanathan. Fully homomorphic encryption for ringlwe<br />

and security for key dependent messages. In Advances in Cryptology - CRYPTO<br />

2011, Lecture Notes in Computer Science. Springer, 2011.<br />

T. ElGamal. A public key cryptosystem and a signature scheme based on discrete<br />

logarithms. In Advances in Cryptology – CRYPTO ’84, volume 196 of Lecture Notes<br />

in Computer Science, pages 10–18. Springer-Verlag, 1985.<br />

12<br />

1. Fully Homomorphic Encryption without Squashing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!