Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. The resulting computations are left in an encrypted form which, when decrypted, result in an output that is identical to that of the operations performed on the unencrypted data. While homomorphic encryption does not protect against side-channel attacks that observe behavior, it can be used for privacy-preserving outsourced storage and computation. This allows data to be encrypted and outsourced to commercial cloud environments for processing, all while encrypted.
As an example of a practical application of homomorphic encryption: encrypted photographs can be scanned for points of interest, without revealing the contents of a photo. However, observation of side-channels can see a photograph being sent to a point-of-interest lookup service, revealing the fact that photographs were taken.
Thus, homomorphic encryption eliminates the need for processing data in the clear, thereby preventing attacks that would enable an attacker to access that data while it is being processed, using privilege escalation.[1]
For sensitive data, such as healthcare information, homomorphic encryption can be used to enable new services by removing privacy barriers inhibiting data sharing or increasing security to existing services. For example, predictive analytics in healthcare can be hard to apply via a third-party service provider due to medical data privacy concerns. But if the predictive-analytics service provider could operate on encrypted data instead, without having the decryption keys, these privacy concerns are diminished. Moreover, even if the service provider's system is compromised, the data would remain secure.[2]
Description
Homomorphic encryption is a form of encryption with an additional evaluation capability for computing over encrypted data without access to the secret key. The result of such a computation remains encrypted. Homomorphic encryption can be viewed as an extension of public-key cryptography[how?]. Homomorphic refers to homomorphism in algebra: the encryption and decryption functions can be thought of as homomorphisms between plaintext and ciphertext spaces.
Homomorphic encryption includes multiple types of encryption schemes that can perform different classes of computations over encrypted data.[3] The computations are represented as either Boolean or arithmetic circuits. Some common types of homomorphic encryption are partially homomorphic, somewhat homomorphic, leveledfully homomorphic, and fully homomorphic encryption:
Partially homomorphic encryption encompasses schemes that support the evaluation of circuits consisting of only one type of gate, e.g., addition or multiplication.
Somewhat homomorphic encryption schemes can evaluate two types of gates, but only for a subset of circuits.
Leveled fully homomorphic encryption supports the evaluation of arbitrary circuits composed of multiple types of gates of bounded (pre-determined) depth.
Fully homomorphic encryption (FHE) allows the evaluation of arbitrary circuits composed of multiple types of gates of unbounded depth and is the strongest notion of homomorphic encryption.
For the majority of homomorphic encryption schemes, the multiplicative depth of circuits is the main practical limitation in performing computations over encrypted data. Homomorphic encryption schemes are inherently malleable. In terms of malleability, homomorphic encryption schemes have weaker security properties than non-homomorphic schemes.
History
Homomorphic encryption schemes have been developed using different approaches. Specifically, fully homomorphic encryption schemes are often grouped into generations corresponding to the underlying approach.[4]
Pre-FHE
The problem of constructing a fully homomorphic encryption scheme was first proposed in 1978, within a year of publishing of the RSA scheme.[5] For more than 30 years, it was unclear whether a solution existed. During that period, partial results included the following schemes:
RSA cryptosystem (unbounded number of modular multiplications)
Craig Gentry, using lattice-based cryptography, described the first plausible construction for a fully homomorphic encryption scheme in 2009.[9] Gentry's scheme supports both addition and multiplication operations on ciphertexts, from which it is possible to construct circuits for performing arbitrary computation. The construction starts from a somewhat homomorphic encryption scheme, which is limited to evaluating low-degree polynomials over encrypted data; it is limited because each ciphertext is noisy in some sense, and this noise grows as one adds and multiplies ciphertexts, until ultimately the noise makes the resulting ciphertext indecipherable.
Gentry then shows how to slightly modify this scheme to make it bootstrappable, i.e., capable of evaluating its own decryption circuit and then at least one more operation. Finally, he shows that any bootstrappable somewhat homomorphic encryption scheme can be converted into a fully homomorphic encryption through a recursive self-embedding. For Gentry's "noisy" scheme, the bootstrapping procedure effectively "refreshes" the ciphertext by applying to it the decryption procedure homomorphically, thereby obtaining a new ciphertext that encrypts the same value as before but has lower noise. By "refreshing" the ciphertext periodically whenever the noise grows too large, it is possible to compute an arbitrary number of additions and multiplications without increasing the noise too much.
Gentry based the security of his scheme on the assumed hardness of two problems: certain worst-case problems over ideal lattices, and the sparse (or low-weight) subset sum problem. Gentry's Ph.D. thesis[10] provides additional details. The Gentry-Halevi implementation of Gentry's original cryptosystem reported a timing of about 30 minutes per basic bit operation.[11] Extensive design and implementation work in subsequent years have improved upon these early implementations by many orders of magnitude runtime performance.
In 2010, Marten van Dijk, Craig Gentry, Shai Halevi and Vinod Vaikuntanathan presented a second fully homomorphic encryption scheme,[12] which uses many of the tools of Gentry's construction, but which does not require ideal lattices. Instead, they show that the somewhat homomorphic component of Gentry's ideal lattice-based scheme can be replaced with a very simple somewhat homomorphic scheme that uses integers. The scheme is therefore conceptually simpler than Gentry's ideal lattice scheme, but has similar properties with regards to homomorphic operations and efficiency. The somewhat homomorphic component in the work of Van Dijk et al. is similar to an encryption scheme proposed by Levieil and Naccache in 2008,[13] and also to one that was proposed by Bram Cohen in 1998.[14]
Cohen's method is not even additively homomorphic, however. The Levieil–Naccache scheme supports only additions, but it can be modified to also support a small number of multiplications. Many refinements and optimizations of the scheme of Van Dijk et al. were proposed in a sequence of works by Jean-Sébastien Coron, Tancrède Lepoint, Avradip Mandal, David Naccache, and Mehdi Tibouchi.[15][16][17][18] Some of these works included also implementations of the resulting schemes.
Second-generation FHE
The homomorphic cryptosystems of this generation are derived from techniques that were developed starting in 2011–2012 by Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan, and others. These innovations led to the development of much more efficient somewhat and fully homomorphic cryptosystems. These include:
The Brakerski-Gentry-Vaikuntanathan (BGV, 2011) scheme,[19] building on techniques of Brakerski-Vaikuntanathan;[20]
The NTRU-based scheme by Lopez-Alt, Tromer, and Vaikuntanathan (LTV, 2012);[21]
The Brakerski/Fan-Vercauteren (BFV, 2012) scheme,[22] building on Brakerski's scale-invariant cryptosystem;[23]
The NTRU-based scheme by Bos, Lauter, Loftus, and Naehrig (BLLN, 2013),[24] building on LTV and Brakerski's scale-invariant cryptosystem;[23]
The security of most of these schemes is based on the hardness of the (Ring) Learning With Errors (RLWE) problem, except for the LTV and BLLN schemes that rely on an overstretched[25] variant of the NTRU computational problem. This NTRU variant was subsequently shown vulnerable to subfield lattice attacks,[26][25] which is why these two schemes are no longer used in practice.
All the second-generation cryptosystems still follow the basic blueprint of Gentry's original construction, namely they first construct a somewhat homomorphic cryptosystem and then convert it to a fully homomorphic cryptosystem using bootstrapping.
A distinguishing characteristic of the second-generation cryptosystems is that they all feature a much slower growth of the noise during the homomorphic computations. Additional optimizations by Craig Gentry, Shai Halevi, and Nigel Smart resulted in cryptosystems with nearly optimal asymptotic complexity: Performing operations on data encrypted with security parameter has complexity of only .[27][28][29] These optimizations build on the Smart-Vercauteren techniques that enable packing of many plaintext values in a single ciphertext and operating on all these plaintext values in a SIMD fashion.[30] Many of the advances in these second-generation cryptosystems were also ported to the cryptosystem over the integers.[17][18]
Another distinguishing feature of second-generation schemes is that they are efficient enough for many applications even without invoking bootstrapping, instead operating in the leveled FHE mode.
Third-generation FHE
In 2013, Craig Gentry, Amit Sahai, and Brent Waters (GSW) proposed a new technique for building FHE schemes that avoids an expensive "relinearization" step in homomorphic multiplication.[31] Zvika Brakerski and Vinod Vaikuntanathan observed that for certain types of circuits, the GSW cryptosystem features an even slower growth rate of noise, and hence better efficiency and stronger security.[32] Jacob Alperin-Sheriff and Chris Peikert then described a very efficient bootstrapping technique based on this observation.[33]
These techniques were further improved to develop efficient ring variants of the GSW cryptosystem: FHEW (2014)[34] and TFHE (2016).[35] The FHEW scheme was the first to show that by refreshing the ciphertexts after every single operation, it is possible to reduce the bootstrapping time to a fraction of a second. FHEW introduced a new method to compute Boolean gates on encrypted data that greatly simplifies bootstrapping and implemented a variant of the bootstrapping procedure.[33] The efficiency of FHEW was further improved by the TFHE scheme, which implements a ring variant of the bootstrapping procedure[36] using a method similar to the one in FHEW.
Fourth-generation FHE
In 2016, Cheon, Kim, Kim and Song (CKKS)[37] proposed an approximate homomorphic encryption scheme that supports a special kind of fixed-point arithmetic that is commonly referred to as block floating point arithmetic. The CKKS scheme includes an efficient rescaling operation that scales down an encrypted message after a multiplication. For comparison, such rescaling requires bootstrapping in the BGV and BFV schemes. The rescaling operation makes CKKS scheme the most efficient method for evaluating polynomial approximations, and is the preferred approach for implementing privacy-preserving machine learning applications. The scheme introduces several approximation errors, both nondeterministic and deterministic, that require special handling in practice.[38]
A 2020 article by Baiyu Li and Daniele Micciancio discusses passive attacks against CKKS, suggesting that the standard IND-CPA definition may not be sufficient in scenarios where decryption results are shared.[39] The authors apply the attack to four modern homomorphic encryption libraries (HEAAN, SEAL, HElib and PALISADE) and report that it is possible to recover the secret key from decryption results in several parameter configurations. The authors also propose mitigation strategies for these attacks, and include a Responsible Disclosure in the paper suggesting that the homomorphic encryption libraries already implemented mitigations for the attacks before the article became publicly available. Further information on the mitigation strategies implemented in the homomorphic encryption libraries has also been published.[40][41]
Partially homomorphic cryptosystems
In the following examples, the notation is used to denote the encryption of the message .
Unpadded RSA
If the RSA public key has modulus and encryption exponent , then the encryption of a message is given by . The homomorphic property is then
ElGamal
In the ElGamal cryptosystem, in a cyclic group of order with generator , if the public key is , where , and is the secret key, then the encryption of a message is , for some random . The homomorphic property is then
Goldwasser–Micali
In the Goldwasser–Micali cryptosystem, if the public key is the modulus and quadratic non-residue , then the encryption of a bit is , for some random . The homomorphic property is then
where denotes addition modulo 2, (i.e., exclusive-or).
Benaloh
In the Benaloh cryptosystem, if the public key is the modulus and the base with a blocksize of , then the encryption of a message is , for some random . The homomorphic property is then
Paillier
In the Paillier cryptosystem, if the public key is the modulus and the base , then the encryption of a message is , for some random . The homomorphic property is then
A cryptosystem that supports arbitrary computation on ciphertexts is known as fully homomorphic encryption (FHE). Such a scheme enables the construction of programs for any desirable functionality, which can be run on encrypted inputs to produce an encryption of the result. Since such a program need never decrypt its inputs, it can be run by an untrusted party without revealing its inputs and internal state. Fully homomorphic cryptosystems have great practical implications in the outsourcing of private computations, for instance, in the context of cloud computing.[44]
A list of open-source FHE libraries implementing second-generation (BGV/BFV), third-generation (FHEW/TFHE), and/or fourth-generation (CKKS) FHE schemes is provided below.
There are several open-source implementations of fully homomorphic encryption schemes. Second-generation and fourth-generation FHE scheme implementations typically operate in the leveled FHE mode (though bootstrapping is still available in some libraries) and support efficient SIMD-like packing of data; they are typically used to compute on encrypted integers or real/complex numbers. Third-generation FHE scheme implementations often bootstrap after each operation but have limited support for packing; they were initially used to compute Boolean circuits over encrypted bits, but have been extended to support integer arithmetics and univariate function evaluation. The choice of using a second-generation vs. third-generation vs fourth-generation scheme depends on the input data types and the desired computation.
In addition, FHE has been combined with zero knowledge proofs, the blockchain technology that proves that something is true, without revealing any private information. zkFHE enables data encryption throughout data processing, while the results of any processing are verified in a confidential manner.[45]
^R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, 1978.
^
Sander, Tomas; Young, Adam L.; Yung, Moti (1999). "Non-interactive cryptocomputing for NC/Sup 1/". 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039). pp. 554–566. doi:10.1109/SFFCS.1999.814630. ISBN978-0-7695-0409-4. S2CID1976588.
^D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In Theory of Cryptography Conference, 2005.
^Y. Ishai and A. Paskin. Evaluating branching programs on encrypted data. In Theory of Cryptography Conference, 2007.
^Gentry, Craig (2009). "Fully homomorphic encryption using ideal lattices". Proceedings of the forty-first annual ACM symposium on Theory of computing. pp. 169–178. doi:10.1145/1536414.1536440. ISBN978-1-60558-506-2.
^ ab
Cheon, Jung Hee; Kim, Andrey; Kim, Miran; Song, Yongsoo (2017). "Homomorphic encryption for arithmetic of approximate numbers". Takagi T., Peyrin T. (eds) Advances in Cryptology – ASIACRYPT 2017. ASIACRYPT 2017. Lecture Notes in Computer Science. Vol. 10624. Springer, Cham. pp. 409–437. doi:10.1007/978-3-319-70694-8_15. ISBN978-3-319-70693-1.
^Castagnos, Guilhem; Laguillaumie, Fabien (2015). "Linearly Homomorphic Encryption from DDH"(PDF). In Nyberg, Kaisa (ed.). Topics in Cryptology – CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Lecture Notes in Computer Science. Vol. 9048. Springer. pp. 487–505. doi:10.1007/978-3-319-16715-2_26. ISBN978-3-319-16714-5.
Old Washington County Courthouse in the village of West Kingston West Kingston is an unincorporated village and traditional county seat of Washington County, Rhode Island. It is the site of the Kingston Railroad Station Amtrak station, and is a part of the Town of South Kingstown. Overview Although unincorporated, West Kingston has a post office and recognized mailing address location. It shares ZIP code 02892 with much of western South Kingstown, a large portion of Richmond, Rhode Island to...
تحتاج هذه المقالة إلى الاستشهاد بمصادر إضافية لتحسين وثوقيتها. فضلاً ساهم في تطوير هذه المقالة بإضافة استشهادات من مصادر موثوق بها. من الممكن التشكيك بالمعلومات غير المنسوبة إلى مصدر وإزالتها. (يناير 2019) إرنست فون فايتسكر (بالألمانية: Ernst von Weizsäcker)[1] معلومات شخ�...
Словенская армия Югославского королевского войска / Матьяжева армиясловен. Slovenska armija Kraljeve Jugoslovanske vojske / Matjaževa vojska Годы существования 1945—1952 Страна Словения Тип партизанское движение Функция Ведение партизанской борьбы против коммунистической власти в Югославии и во�...
M. Yasin Limpo Bupati Maros ke-2Masa jabatan1962–1962PresidenIr. SoekarnoGubernurA. A. RifaiPendahuluH. Nurdin JohanPenggantiDrs. H. Muhammad Nur Tahir Informasi pribadiLahir(1924-04-17)17 April 1924Bontonompo, Gowa, Celebes, Hindia BelandaMeninggal4 Agustus 2009(2009-08-04) (umur 85)Makassar, Sulawesi Selatan, IndonesiaMakamTaman Makam Pahlawan Panaikang, Kelurahan Panaikang, Kecamatan Panakkukang, Kota MakassarPartai politikPartai Golongan KaryaSuami/istriHj. NurhayatiAnak1. Tenr...
Untuk lagu yang dinyanyikan ulang sekaligus diterjemahkan ke dalam Bahasa Indonesia oleh JKT48 dan dirilis pada tahun 2023, lihat Ponytail dan Shu-shu (versi 2023). Ponytail to ShushuSampul Tipe A menampilkan Atsuko Maeda, Jurina Matsui (SKE48), Yuko Oshima, Minami Takahashi, dan Mayu Watanabe.Singel oleh AKB48dari album Koko ni Ita KotoSisi-BNusumareta KuchibiruBoku no YellMajijo Teppen BluesDirilis26 Mei 2010 (2010-05-26)FormatCD Singel, unduh digitalGenreJ-popDurasi4:29LabelKing Recor...
此條目需要补充更多来源。 (2021年7月4日)请协助補充多方面可靠来源以改善这篇条目,无法查证的内容可能會因為异议提出而被移除。致使用者:请搜索一下条目的标题(来源搜索:美国众议院 — 网页、新闻、书籍、学术、图像),以检查网络上是否存在该主题的更多可靠来源(判定指引)。 美國眾議院 United States House of Representatives第118届美国国会众议院徽章 众议院旗...
Galaxy cluster in the constellation Auriga MACS J0717.5+3745MACS J0717.5+3745 taken by the combination of observations from the NASA/ESA Hubble Space Telescope, the NASA Chandra X-ray Observatory, and the NRAO Jansky Very Large Array.Observation data (Epoch J2000)Right ascension07h 17m 36.50s[1]Declination+37° 45′ 23″[1]Velocity dispersion1660[2]Redshift0.5458[1]Binding mass0 M☉Other designationsClG J0717+3745, MCS J0717.5...
PlayStation NetworkPengembangSony Interactive EntertainmentTipeLayanan daringTanggal diluncurkan11 Mei 2005; 19 tahun lalu (2005-05-11)PlatformKonsol permainan video PlayStation 3 PlayStation 4 PlayStation Vita PlayStation Portable PlayStation Mobile Perangkat sosial BRAVIA HDTV Sony Xperia Keanggotaan110 juta[1] (65 juta aktif per bulan[2])Situs webSitus web resmi PlayStation Network (PSN) adalah layanan hiburan media digital yang disediakan oleh Sony Interactive Enterta...
Daftar keuskupan di Lesotho adalah sebuah daftar yang memuat dan menjabarkan pembagian terhadap wilayah administratif Gereja Katolik Roma yang dipimpin oleh seorang uskup ataupun ordinaris di Lesotho. Konferensi para uskup Lesotho bergabung dalam Konferensi Waligereja Lesotho. Saat ini terdapat 4 buah yurisdiksi, di mana 1 merupakan keuskupan agung dan 3 lainnya merupakan keuskupan sufragan. Daftar keuskupan Provinsi Gerejawi Maseru Keuskupan Agung Maseru: Mgr. Gerard Tlali Lerotholi, O.M.I. ...
Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Desember 2022. Lothar WarnekeLahir(1936-09-15)15 September 1936Leipzig, JermanMeninggal5 Juni 2005(2005-06-05) (umur 68)Brandenburg, JermanPekerjaanSutradaraPenulis naskahPemeranTahun aktif1965–1998 Lothar Warneke (15 September 1936 – 5 J...
American TV series or program Fish PoliceFish Police characters and their voice actors from left to right: Angel Jones voiced by JoBeth Williams, Crabby voiced by Buddy Hackett, Chief Abalone voiced by Ed Asner, and Det. Catfish voiced by Robert GuillaumeGenreComedy Police proceduralBased onFish Policeby Steve MoncuseDeveloped byJeanne RomanoVoices of John Ritter Héctor Elizondo Ed Asner Jonathan Winters Tim Curry Robert Guillaume Buddy Hackett Megan Mullally JoBeth Williams Frank Welker Ge...
هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (يناير 2024) معركة المالكية جزء من حرب 1948 معلومات عامة التاريخ 5 – 6 يونيو 1948 البلد فلسطين الانتدابية الموقع المالكية، فلسطين33°05′54″N 35°30′40″E / 33.098197°N 35.511097°E...
ملعب ساوساليتومعلومات عامةالمنطقة الإدارية فينيا ديل مار البلد تشيلي التشييد والافتتاحالمقاول الرئيسي إيفرتون دي فينا ديل مار الاستعمالالرياضة كرة القدم المستضيف إيفرتون دي فينا ديل مارالمالك ميونكيبيو دي فينيا ديل مارالإدارة إيفرتون دي فينا ديل مار أحداث مهمة كأس ...
Footballer (born 1994) Yvon Mvogo Mvogo with Leipzig in 2019Personal informationFull name Yvon Landry Mvogo Nganoma[1]Date of birth (1994-06-06) 6 June 1994 (age 30)[1]Place of birth Yaoundé, CameroonHeight 1.87 m (6 ft 2 in)[1]Position(s) GoalkeeperTeam informationCurrent team LorientNumber 38Youth career0000–2012 Young BoysSenior career*Years Team Apps (Gls)2011–2017 Young Boys 124 (0)2017–2022 RB Leipzig 5 (0)2020–2022 → PSV (loan) 41 ...
Untuk film yang menampilkan Pokémon ini, lihat Pokémon: Arceus and the Jewel of Life. ArceusNomor PokédexNasional #493 Sebelumnya Selanjutnya Shaymin (#492) Victini (#494) Penampilan perdanaPermainanPokémon Diamond dan PearlAnimePokémon, episode: Arceus and the Jewel of Life.Info produksiGenerasiIV (Keempat) - 2006PenciptaKen SugimoriPengisi suaraInggrisTom WaylandJepangAkihiro Miwa Info Pokémon TipenormalSpesiesPokémon alphaKemampuanMultitype (Multijenis)Tinggi3,2 m (13...
Rê-Atoum assis Unicode C001 {{{trans}}} Version hiéroglyphique Rê-Atoum assis, en hiéroglyphes égyptiens, est classifié dans la section C « Divinités anthropomorphes » de la liste de Gardiner ; il y est noté C1. Représentation Il représente le dieu Rê sous forme humaine Atoum assis, portant la barbe postiche et le disque solaire accompagné de l'uræus (hiéroglyphe N6) sur sa tête. Il est translittéré Rˁ. Utilisation C'est un idéogramme ou déterminatif du t...
Claimant to the English throne in 1553 Jane Grey redirects here. For other uses, see Jane Grey (disambiguation). Lady Jane GreyThe Streatham portrait, discovered at the beginning of the 21st century, is believed to be based on a contemporary woodcut.Queen of England and Ireland (more...)(disputed) Reign10 July 1553 – 19 July 1553[1]PredecessorEdward VISuccessorMary IBorn1536 or 1537Possibly London or Bradgate Park, Leicestershire, EnglandDied12 February 1554 (aged 16 or 17)[2 ...