Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings

Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Abstract

We present constructions of CPA-secure (leveled) homomorphic encryption from learning with errors (LWE) problem. We use the construction introduced by Gentry, Sahai and Waters ‘GSW’ (CRYPTO’13) as building blocks of our schemes. We apply their approximate eigenvector method to our scheme. In contrast to the GSW scheme we provide extensions of the (leveled) homomorphic identity-based encryption (IBE) and (leveled) homomorphic attribute-based encryption (ABE) on the multi-identity and multi-attribute settings respectively. We realize the (leveled) homomorphic property for the multi-party setting by applying tensor product and natural logarithm. Tensor product and natural logarithm allow to evaluate different ciphertexts computed under different public keys. Similar to the GSW scheme, our constructions do not need any evaluation key, which enables evaluation even without the knowledge of user’s public key.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2017
Subtitle of host publication20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers
EditorsHowon Kim, Dong-Chan Kim
Place of PublicationCham Switzerland
PublisherSpringer
Pages71-92
Number of pages22
ISBN (Electronic)9783319785561
ISBN (Print)9783319785554
DOIs
Publication statusPublished - 2018
Externally publishedYes
EventInternational Conference on Information Security and Cryptology 2017 - Seoul, Korea, Republic of (South)
Duration: 29 Nov 20171 Dec 2017
Conference number: 20th
http://www.icisc.org/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10779
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Information Security and Cryptology 2017
Abbreviated titleICISC 2017
CountryKorea, Republic of (South)
CitySeoul
Period29/11/171/12/17
Internet address

Cite this

Kuchta, V., Sharma, G., Sahu, R. A., & Markowitch, O. (2018). Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings. In H. Kim, & D-C. Kim (Eds.), Information Security and Cryptology - ICISC 2017: 20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers (pp. 71-92). (Lecture Notes in Computer Science ; Vol. 10779 ). Cham Switzerland: Springer. https://doi.org/10.1007/978-3-319-78556-1_5
Kuchta, Veronika ; Sharma, Gaurav ; Sahu, Rajeev Anand ; Markowitch, Olivier. / Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings. Information Security and Cryptology - ICISC 2017: 20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers. editor / Howon Kim ; Dong-Chan Kim. Cham Switzerland : Springer, 2018. pp. 71-92 (Lecture Notes in Computer Science ).
@inproceedings{c4bb210d16594bf7b8c1e8e3ee6bb74e,
title = "Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings",
abstract = "We present constructions of CPA-secure (leveled) homomorphic encryption from learning with errors (LWE) problem. We use the construction introduced by Gentry, Sahai and Waters ‘GSW’ (CRYPTO’13) as building blocks of our schemes. We apply their approximate eigenvector method to our scheme. In contrast to the GSW scheme we provide extensions of the (leveled) homomorphic identity-based encryption (IBE) and (leveled) homomorphic attribute-based encryption (ABE) on the multi-identity and multi-attribute settings respectively. We realize the (leveled) homomorphic property for the multi-party setting by applying tensor product and natural logarithm. Tensor product and natural logarithm allow to evaluate different ciphertexts computed under different public keys. Similar to the GSW scheme, our constructions do not need any evaluation key, which enables evaluation even without the knowledge of user’s public key.",
author = "Veronika Kuchta and Gaurav Sharma and Sahu, {Rajeev Anand} and Olivier Markowitch",
year = "2018",
doi = "10.1007/978-3-319-78556-1_5",
language = "English",
isbn = "9783319785554",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "71--92",
editor = "Howon Kim and Dong-Chan Kim",
booktitle = "Information Security and Cryptology - ICISC 2017",

}

Kuchta, V, Sharma, G, Sahu, RA & Markowitch, O 2018, Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings. in H Kim & D-C Kim (eds), Information Security and Cryptology - ICISC 2017: 20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers. Lecture Notes in Computer Science , vol. 10779 , Springer, Cham Switzerland, pp. 71-92, International Conference on Information Security and Cryptology 2017, Seoul, Korea, Republic of (South), 29/11/17. https://doi.org/10.1007/978-3-319-78556-1_5

Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings. / Kuchta, Veronika; Sharma, Gaurav; Sahu, Rajeev Anand; Markowitch, Olivier.

Information Security and Cryptology - ICISC 2017: 20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers. ed. / Howon Kim; Dong-Chan Kim. Cham Switzerland : Springer, 2018. p. 71-92 (Lecture Notes in Computer Science ; Vol. 10779 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

TY - GEN

T1 - Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings

AU - Kuchta, Veronika

AU - Sharma, Gaurav

AU - Sahu, Rajeev Anand

AU - Markowitch, Olivier

PY - 2018

Y1 - 2018

N2 - We present constructions of CPA-secure (leveled) homomorphic encryption from learning with errors (LWE) problem. We use the construction introduced by Gentry, Sahai and Waters ‘GSW’ (CRYPTO’13) as building blocks of our schemes. We apply their approximate eigenvector method to our scheme. In contrast to the GSW scheme we provide extensions of the (leveled) homomorphic identity-based encryption (IBE) and (leveled) homomorphic attribute-based encryption (ABE) on the multi-identity and multi-attribute settings respectively. We realize the (leveled) homomorphic property for the multi-party setting by applying tensor product and natural logarithm. Tensor product and natural logarithm allow to evaluate different ciphertexts computed under different public keys. Similar to the GSW scheme, our constructions do not need any evaluation key, which enables evaluation even without the knowledge of user’s public key.

AB - We present constructions of CPA-secure (leveled) homomorphic encryption from learning with errors (LWE) problem. We use the construction introduced by Gentry, Sahai and Waters ‘GSW’ (CRYPTO’13) as building blocks of our schemes. We apply their approximate eigenvector method to our scheme. In contrast to the GSW scheme we provide extensions of the (leveled) homomorphic identity-based encryption (IBE) and (leveled) homomorphic attribute-based encryption (ABE) on the multi-identity and multi-attribute settings respectively. We realize the (leveled) homomorphic property for the multi-party setting by applying tensor product and natural logarithm. Tensor product and natural logarithm allow to evaluate different ciphertexts computed under different public keys. Similar to the GSW scheme, our constructions do not need any evaluation key, which enables evaluation even without the knowledge of user’s public key.

UR - http://www.scopus.com/inward/record.url?scp=85044472314&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-78556-1_5

DO - 10.1007/978-3-319-78556-1_5

M3 - Conference Paper

SN - 9783319785554

T3 - Lecture Notes in Computer Science

SP - 71

EP - 92

BT - Information Security and Cryptology - ICISC 2017

A2 - Kim, Howon

A2 - Kim, Dong-Chan

PB - Springer

CY - Cham Switzerland

ER -

Kuchta V, Sharma G, Sahu RA, Markowitch O. Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings. In Kim H, Kim D-C, editors, Information Security and Cryptology - ICISC 2017: 20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers. Cham Switzerland: Springer. 2018. p. 71-92. (Lecture Notes in Computer Science ). https://doi.org/10.1007/978-3-319-78556-1_5