TY - GEN
T1 - Practical Homomorphic Encryption Over the Integers for Secure Computation in the Cloud
AU - Dyer, James
AU - Dyer, Martin
AU - Xu, Jie
PY - 2017/11/25
Y1 - 2017/11/25
N2 - We present novel homomorphic encryption schemes for integer arithmetic, intended primarily for use in secure single-party computation in the cloud. These schemes are capable of securely computing arbitrary degree polynomials homomorphically. In practice, ciphertext size and running times limit the polynomial degree, but this appears sufficient for most practical applications. We present four schemes, with increasing levels of security, but increasing computational overhead. Two of the schemes provide strong security for high-entropy data. The remaining two schemes provide strong security regardless of this assumption. These four algorithms form the first two levels of a hierarchy of schemes which require linearly decreasing entropy. We have evaluated these four algorithms by computing low-degree polynomials. The timings of these computations are extremely favourable by comparison with even the best of existing methods, and dramatically out-perform running times of directly comparable schemes by a factor of up to 1000, and considerably more than that for fully homomorphic schemes, used in the same context. The results clearly demonstrate the practical applicability of our schemes.
AB - We present novel homomorphic encryption schemes for integer arithmetic, intended primarily for use in secure single-party computation in the cloud. These schemes are capable of securely computing arbitrary degree polynomials homomorphically. In practice, ciphertext size and running times limit the polynomial degree, but this appears sufficient for most practical applications. We present four schemes, with increasing levels of security, but increasing computational overhead. Two of the schemes provide strong security for high-entropy data. The remaining two schemes provide strong security regardless of this assumption. These four algorithms form the first two levels of a hierarchy of schemes which require linearly decreasing entropy. We have evaluated these four algorithms by computing low-degree polynomials. The timings of these computations are extremely favourable by comparison with even the best of existing methods, and dramatically out-perform running times of directly comparable schemes by a factor of up to 1000, and considerably more than that for fully homomorphic schemes, used in the same context. The results clearly demonstrate the practical applicability of our schemes.
KW - Computing on encrypted data
KW - Cryptography
KW - Homomorphic encryption
KW - Secure computation in the cloud
KW - Symmetric encryption
UR - http://www.scopus.com/inward/record.url?scp=85038208626&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-71045-7_3
DO - 10.1007/978-3-319-71045-7_3
M3 - Conference contribution
AN - SCOPUS:85038208626
SN - 9783319710440
VL - 10655 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 44
EP - 76
BT - Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings
PB - Springer Nature
T2 - 16th IMA International Conference on Cryptography and Coding, IMACC 2017
Y2 - 12 December 2017 through 14 December 2017
ER -