TY - JOUR
T1 - Practical homomorphic encryption over the integers for secure computation in the cloud
AU - Dyer, James
AU - Dyer, Martin
AU - Xu, Jie
PY - 2019/10/1
Y1 - 2019/10/1
N2 - We present novel homomorphic encryption schemes for integer arithmetic, intended primarily for use in secure single-party computation in the cloud. These schemes are capable of securely computing arbitrary degree polynomials homomorphically. In practice, ciphertext size and running times limit the polynomial degree, but this appears sufficient for most practical applications. We present four schemes, with increasing levels of security, but increasing computational overhead. Two of the schemes provide strong security for high-entropy data. The remaining two schemes provide strong security regardless of this assumption. These four algorithms form the first two levels of a hierarchy of schemes, and we also present the general cases of each scheme. We further elaborate how a fully homomorphic system can be constructed from one of our general cases. In addition, we present a variant based upon Chinese Remainder Theorem secret sharing. We detail extensive evaluation of the first four algorithms of our hierarchy by computing low-degree polynomials. The timings of these computations are extremely favourable by comparison with even the best of existing methods and dramatically outperform many well-publicised schemes. The results clearly demonstrate the practical applicability of our schemes.
AB - We present novel homomorphic encryption schemes for integer arithmetic, intended primarily for use in secure single-party computation in the cloud. These schemes are capable of securely computing arbitrary degree polynomials homomorphically. In practice, ciphertext size and running times limit the polynomial degree, but this appears sufficient for most practical applications. We present four schemes, with increasing levels of security, but increasing computational overhead. Two of the schemes provide strong security for high-entropy data. The remaining two schemes provide strong security regardless of this assumption. These four algorithms form the first two levels of a hierarchy of schemes, and we also present the general cases of each scheme. We further elaborate how a fully homomorphic system can be constructed from one of our general cases. In addition, we present a variant based upon Chinese Remainder Theorem secret sharing. We detail extensive evaluation of the first four algorithms of our hierarchy by computing low-degree polynomials. The timings of these computations are extremely favourable by comparison with even the best of existing methods and dramatically outperform many well-publicised schemes. The results clearly demonstrate the practical applicability of our schemes.
KW - Computing on encrypted data
KW - Cryptography
KW - Homomorphic encryption
KW - Secure computation in the cloud
KW - Symmetric encryption
UR - http://www.scopus.com/inward/record.url?scp=85061310732&partnerID=8YFLogxK
U2 - 10.1007/s10207-019-00427-0
DO - 10.1007/s10207-019-00427-0
M3 - Article
AN - SCOPUS:85061310732
VL - 18
SP - 549
EP - 579
JO - International Journal of Information Security
JF - International Journal of Information Security
SN - 1615-5262
IS - 5
ER -