File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 162 -
dc.citation.startPage 149 -
dc.citation.title INFORMATION SCIENCES -
dc.citation.volume 310 -
dc.contributor.author Cheon, Jung Hee -
dc.contributor.author Kim, Jinsu -
dc.contributor.author Lee, Moon Sung -
dc.contributor.author Yun, Aaram -
dc.date.accessioned 2023-12-22T01:08:22Z -
dc.date.available 2023-12-22T01:08:22Z -
dc.date.created 2015-05-20 -
dc.date.issued 2015-07 -
dc.description.abstract In 1978, Rivest, Adleman and Dertouzos introduced the basic concept of privacy homomorphism that allows computation on encrypted data without decryption. It was an interesting work whose idea precedes the recent development of fully homomorphic encryption, although actual example schemes proposed in the paper are all susceptible to simple known-plaintext attacks.

In this paper, we revisit one of their proposals, in particular the third scheme which is based on the Chinese Remainder Theorem and is ring homomorphic. It is known that only a single pair of known plaintext/ciphertext is needed to break this scheme. However, by exploiting the standard technique to insert an error to a message before encryption, we can cope with this problem. We present a secure modification of their proposal by showing that the proposed scheme is fully homomorphic and secure against the chosen plaintext attacks under the approximate GCD assumption and the sparse subset sum assumption when the message space is restricted to Z(2)(k).

Interestingly, the proposed scheme can be regarded as a generalization of the DGHV scheme with larger plaintext space. Our scheme has (O) over tilde(lambda(5)) ciphertext expansion overhead while the DGHV has (O) over tilde(lambda(8)) for the security parameter lambda. When restricted to the homomorphic encryption scheme with depth of O(log lambda), the overhead is reduced to (O) over tilde(lambda). Our scheme can be used in applications requiring a large message space Z(Q) for log Q = (O) over tilde(lambda(4))or SIMD style operations on Z(Q)(k) for log Q = O(lambda), k = O(lambda(3)), with (O) over tilde(lambda(5)) ciphertext size as in the DGHV.
-
dc.identifier.bibliographicCitation INFORMATION SCIENCES, v.310, pp.149 - 162 -
dc.identifier.doi 10.1016/j.ins.2015.03.019 -
dc.identifier.issn 0020-0255 -
dc.identifier.scopusid 2-s2.0-84926687996 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/11532 -
dc.identifier.url http://www.sciencedirect.com/science/article/pii/S002002551500184X# -
dc.identifier.wosid 000354341100010 -
dc.language 영어 -
dc.publisher ELSEVIER SCIENCE INC -
dc.title CRT-based fully homomorphic encryption over the integers -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Computer Science, Information Systems -
dc.relation.journalResearchArea Computer Science -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Approximate gcd -
dc.subject.keywordAuthor Chinese remainder theorem -
dc.subject.keywordAuthor DGHV -
dc.subject.keywordAuthor Homomorphic encryption -
dc.subject.keywordAuthor Privacy homomorphism -
dc.subject.keywordPlus CRYPTANALYSIS -
dc.subject.keywordPlus KEY -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.