際際滷

際際滷Share a Scribd company logo
3
Most read
5
Most read
9
Most read
Homomorphic Encryption

    Craig Gentry scheme
Why homomorphic encryption?
 Proposed by Rivest, Adleman and Dertouzos
 Confidentiality problems
 Ability to compute over ciphertext instead of
  plaintext
 One could use information without knowing the
  content of that information
 Privacy garanteed
Homomorphic Encryption
 Crypto Magic

    5 * 6 = CT(5) * CT(6) -> D ( k, E(k,5) * E(k,6) ) = 5 * 6




                               Homomorphic Assumption

 Partially homomorphic/fully homomorphic
Homomorphic Encryption
 Partially homomorphic schemes
   RSA: CT(x)*CT(y) = (xe mod M) * (ye mod M) = xeye
    mod M = (xy)e mod M = CT(x*y), where e is the
    exponent key and M the modulus
        p=61;
        q=53;
        N=3233;
        陸(N)=60*52=3120;
        e=17;
        d=2753;
Homomorphic Encryption
 Partially homomorphic schemes
   RSA: Obtain 5*6 performing RSA(5)*RSA(6)
        RSA(5) = 517 (mod 3233) = 3086;
        RSA(6) = 617 (mod 3233) = 824;
        3068*824 = 2542864;
        RSA-1(2542864) = 25428642753 (mod 3233) = 30;
        5*6 = 30;
Homomorphic Encryption
 Fully homomorphic schemes
   Craig Gentry scheme
     Based on ideal lattices
   Zaryab Khan scheme
     Based on perfectly colorblind function
Craig Gentry scheme
 Suppose a scheme with a noise parameter
  attached to each CT;
 Encryption algorithm outputs a CT with a small noise
  parameter (say less than n);
 Decryption algorithm only works if noise is less than
  some parameter N >> n;
 To compute E(a+b) / E(a*b), include noise;
 This gives a somewhat homomorphic scheme.
Craig Gentry scheme
 Now suppose a new algorithm RECRYPT, such that:
    Input: E(a), with noise N < N
    Output: E(a), with noise N
 Somewhat homomorphic -> fully homomorphic!
 Apply RECRYPT to E(a) and E(b) to ensure that the
  noise in E(a*b) or E(a+b) is smaller than N
 Bootstrappable
Craig Gentry scheme (integers)
 Key: odd integer p > 2N
 Encryption algorithm: given a bit b -> E(b) = c = b +
  2x + kp, where x is in [-n/2,n/2] and k is an integer
  chosen from some range
 Decryption algorithm: b = (c mod p) mod 2, where (c
  mod p) is the noise and belongs to [-n,n]
 Decryption works if b + 2x  [-N,N] [-p/2,p/2]
Craig Gentry scheme (integers)
 Graig Gentry schemes homomorphic assumptions
    Addiction: c1 + c2 = b1+ b2 + 2(x1+x2) + (k1+k2)p =
     b1 xor b2 + 2x + kp
       Decryption works if (b1+2x1) + (b2+2x2) is in [-
        N,N]
    Multiplication: c1*c2 = b1*b2 + 2(b1x2 + b2x1 +
     2x1x2) + kp = b1*b2 + 2x + kp
       Decryption works if (b1+2x1) * (b2+2x2) is in [-
        N,N]
Craig Gentry scheme (integers)
 Addition example: 4+4
   CT(100):
                                          22 21 21
      CT(1) = 1 + 2*3 + 5*3 = 22
                                         +22 21 21
      CT(0) = 0 + 2*3 + 5*3 = 21
                                          44 42 42
      CT(0) = 0 + 2*3 + 5*3 = 21
   D(44 42 42):
      D(44) = 44 mod 3 = 2
      D(42) = 42 mod 3 = 0
                                    1000 = 8 = 4+4
      D(42) = 42 mod 3 = 0
Craig Gentry scheme (integers)
 Multiplication example: 4*4
   CT(100):
      CT(1) = 1 + 2*3 + 5*3 = 22
                                                22 21 21
      CT(0) = 0 + 2*3 + 5*3 = 21              22 21 21
      CT(0) = 0 + 2*3 + 5*3 = 21   484 924 1365 882 441
   D(484 924 1365 882 441):
        D(484) = 484 mod 3 = 1
        D(924) = 924 mod 3 = 0
        D(1365) = 1365 mod 3 = 0
                                    10000 = 16 = 4*4
        D(882) = 882 mod 3 = 0
        D(441) = 441 mod 3 = 0
Craig Gentry scheme (ideal lattices)
 Replace integers by ideal lattices
 Ideal lattices have many representations or
  bases
 Bases:
   Good: good to decrypt, bad to encrypt
   Bad: bad to decrypt, good to encrypt
 Public key scheme, where good bases are
  private keys and bad bases are public keys
Cryptography over lattices
 L = 龍(B) = {Bc : c  Zk}, B  Rnk, where the k
  columns of the basis are linearly independent
 NP-hard problems over lattices:
   SVP (shortest vector problem): given a basis for
    lattice L of size n, find the shortest nonzero vector
    v  L s.t. ||v|| = 了(L);
   CVP (closest vector problem): given a basis for
    lattice L of size n and a vector t  Rn, find a
    nonzero vector v  L s.t. ||t-v||  粒;
Cryptography over lattices
 NP-hard problems over lattices:
   SIVP (shortest independent vector problem): like
    the SVP, except the output are linearly
    independent vectors v1, , v2  L of length at
    most 了(L);
   BDDP (bounded distance decoding problem):
    same as CVP but with the promise that there is a
    unique solution.
Craig Gentry scheme
 Why inefficient?
   CT size and computation time increase sharply as
    the security level increases;
   2k security -> CT size and computation time are
    high-degree polynomials in k;
   Efforts are being made to reduce the
    computational requirements of Craig Gentry
    construction
Homomorphic Encryption
 Nowadays:
   Craig Gentry presented a working implementation
    of the fully homomorphic system, including the
    bootstrapping function
   Exists a practical application of homomorphic
    encryption to a hybrid wireless network
   Perform statistical tests over encrypted data such
    as temperature, humidity, etc.
   There are also some practical implementations of
    simplifications of this scheme over databases
Problems solved
 Cloud security
 Problems related to personal records like
  medical records
 Work with information stored in databases
 Querys to search engines
My Project
 Design an API and include it on a Web Service
  that will work over CLOUD platforms
 The API should provide homomorphic
  encryption functions to be used
 Create a prototype that will work under the
  constructed API
QUESTIONS?
Ad

Recommended

Homomorphic Encryption
Homomorphic Encryption
G旦ktu Serez
Homomorphic encryption
Homomorphic encryption
Namit Sinha
Homomorphic encryption
Homomorphic encryption
Cysinfo Cyber Security Community
Introduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
Christoph Matthies
Homomorphic Encryption
Homomorphic Encryption
Vipin Tejwani
Homomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain Principles
Johann H旦chtl
Elliptical curve cryptography
Elliptical curve cryptography
Barani Tharan
Cryptography
Cryptography
Jens Patel
Fundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
MLG College of Learning, Inc
Cryptography ppt
Cryptography ppt
Anubhav Sokhal
Cryptography - 101
Cryptography - 101
n|u - The Open Security Community
I mage encryption using rc5
I mage encryption using rc5
Suramrit Singh
Cryptography
Cryptography
gueste4c97e
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Samdish Arora
Unit 3
Unit 3
KRAMANJANEYULU1
Rsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
MAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
Steganography
Steganography
Daksh Verma
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Introduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
How to Share a Secret
How to Share a Secret
Kelum Senanayake
Cryptographie
Seifallah Jardak
Elgamal digital signature
Elgamal digital signature
MDKAWSARAHMEDSAGAR
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attack
Ankita Kapratwar
Class3
Class3
ankitasinghbsc
Computing on Encrypted Data
Computing on Encrypted Data
New York Technology Council

More Related Content

What's hot (20)

Fundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
MLG College of Learning, Inc
Cryptography ppt
Cryptography ppt
Anubhav Sokhal
Cryptography - 101
Cryptography - 101
n|u - The Open Security Community
I mage encryption using rc5
I mage encryption using rc5
Suramrit Singh
Cryptography
Cryptography
gueste4c97e
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Samdish Arora
Unit 3
Unit 3
KRAMANJANEYULU1
Rsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
MAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
Steganography
Steganography
Daksh Verma
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Introduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
How to Share a Secret
How to Share a Secret
Kelum Senanayake
Cryptographie
Seifallah Jardak
Elgamal digital signature
Elgamal digital signature
MDKAWSARAHMEDSAGAR
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attack
Ankita Kapratwar
I mage encryption using rc5
I mage encryption using rc5
Suramrit Singh
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Samdish Arora
MAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
Steganography
Steganography
Daksh Verma
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Introduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
Cryptographie
Seifallah Jardak
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attack
Ankita Kapratwar

Similar to Homomorphic Encryption (20)

Class3
Class3
ankitasinghbsc
Computing on Encrypted Data
Computing on Encrypted Data
New York Technology Council
Number Theory and Its Applications in Cryptography
Number Theory and Its Applications in Cryptography
kapilhande1
Dynamic Programming Matrix Chain Multiplication
Dynamic Programming Matrix Chain Multiplication
KrishnakoumarC
Public_Key_Cryptography in crypto analysis.ppt
Public_Key_Cryptography in crypto analysis.ppt
ImmanImman6
"Mesh of Periodic Minimal Surfaces in CGAL."
"Mesh of Periodic Minimal Surfaces in CGAL."
Vissarion Fisikopoulos
parameterized complexity for graph Motif
parameterized complexity for graph Motif
AMR koura
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proof
Nimish Joseph
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
module 4 ppt on crypography and network security
module 4 ppt on crypography and network security
PoornimaGn3
Quantum factorization.pdf
Quantum factorization.pdf
ssuser8b461f
Rsa in CTF
Rsa in CTF
SoL ymx
Digital Fingerprinting
Digital Fingerprinting
santhu652
Bch codes
Bch codes
Gaurav Thakur
implementing the encryption in the JAVA.ppt
implementing the encryption in the JAVA.ppt
MuhammadAbdullah311866
Introduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
hubx
lec20111111111111111111111111111111111111.pptx
lec20111111111111111111111111111111111111.pptx
ssuser8cd160
Codes and Isogenies
Codes and Isogenies
Priyanka Aash
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Ferdin Joe John Joseph PhD
Asymptotic Notation
Asymptotic Notation
sohelranasweet
Number Theory and Its Applications in Cryptography
Number Theory and Its Applications in Cryptography
kapilhande1
Dynamic Programming Matrix Chain Multiplication
Dynamic Programming Matrix Chain Multiplication
KrishnakoumarC
Public_Key_Cryptography in crypto analysis.ppt
Public_Key_Cryptography in crypto analysis.ppt
ImmanImman6
"Mesh of Periodic Minimal Surfaces in CGAL."
"Mesh of Periodic Minimal Surfaces in CGAL."
Vissarion Fisikopoulos
parameterized complexity for graph Motif
parameterized complexity for graph Motif
AMR koura
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proof
Nimish Joseph
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
module 4 ppt on crypography and network security
module 4 ppt on crypography and network security
PoornimaGn3
Quantum factorization.pdf
Quantum factorization.pdf
ssuser8b461f
Rsa in CTF
Rsa in CTF
SoL ymx
Digital Fingerprinting
Digital Fingerprinting
santhu652
implementing the encryption in the JAVA.ppt
implementing the encryption in the JAVA.ppt
MuhammadAbdullah311866
Introduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
hubx
lec20111111111111111111111111111111111111.pptx
lec20111111111111111111111111111111111111.pptx
ssuser8cd160
Codes and Isogenies
Codes and Isogenies
Priyanka Aash
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Ferdin Joe John Joseph PhD
Asymptotic Notation
Asymptotic Notation
sohelranasweet
Ad

Homomorphic Encryption

  • 1. Homomorphic Encryption Craig Gentry scheme
  • 2. Why homomorphic encryption? Proposed by Rivest, Adleman and Dertouzos Confidentiality problems Ability to compute over ciphertext instead of plaintext One could use information without knowing the content of that information Privacy garanteed
  • 3. Homomorphic Encryption Crypto Magic 5 * 6 = CT(5) * CT(6) -> D ( k, E(k,5) * E(k,6) ) = 5 * 6 Homomorphic Assumption Partially homomorphic/fully homomorphic
  • 4. Homomorphic Encryption Partially homomorphic schemes RSA: CT(x)*CT(y) = (xe mod M) * (ye mod M) = xeye mod M = (xy)e mod M = CT(x*y), where e is the exponent key and M the modulus p=61; q=53; N=3233; 陸(N)=60*52=3120; e=17; d=2753;
  • 5. Homomorphic Encryption Partially homomorphic schemes RSA: Obtain 5*6 performing RSA(5)*RSA(6) RSA(5) = 517 (mod 3233) = 3086; RSA(6) = 617 (mod 3233) = 824; 3068*824 = 2542864; RSA-1(2542864) = 25428642753 (mod 3233) = 30; 5*6 = 30;
  • 6. Homomorphic Encryption Fully homomorphic schemes Craig Gentry scheme Based on ideal lattices Zaryab Khan scheme Based on perfectly colorblind function
  • 7. Craig Gentry scheme Suppose a scheme with a noise parameter attached to each CT; Encryption algorithm outputs a CT with a small noise parameter (say less than n); Decryption algorithm only works if noise is less than some parameter N >> n; To compute E(a+b) / E(a*b), include noise; This gives a somewhat homomorphic scheme.
  • 8. Craig Gentry scheme Now suppose a new algorithm RECRYPT, such that: Input: E(a), with noise N < N Output: E(a), with noise N Somewhat homomorphic -> fully homomorphic! Apply RECRYPT to E(a) and E(b) to ensure that the noise in E(a*b) or E(a+b) is smaller than N Bootstrappable
  • 9. Craig Gentry scheme (integers) Key: odd integer p > 2N Encryption algorithm: given a bit b -> E(b) = c = b + 2x + kp, where x is in [-n/2,n/2] and k is an integer chosen from some range Decryption algorithm: b = (c mod p) mod 2, where (c mod p) is the noise and belongs to [-n,n] Decryption works if b + 2x [-N,N] [-p/2,p/2]
  • 10. Craig Gentry scheme (integers) Graig Gentry schemes homomorphic assumptions Addiction: c1 + c2 = b1+ b2 + 2(x1+x2) + (k1+k2)p = b1 xor b2 + 2x + kp Decryption works if (b1+2x1) + (b2+2x2) is in [- N,N] Multiplication: c1*c2 = b1*b2 + 2(b1x2 + b2x1 + 2x1x2) + kp = b1*b2 + 2x + kp Decryption works if (b1+2x1) * (b2+2x2) is in [- N,N]
  • 11. Craig Gentry scheme (integers) Addition example: 4+4 CT(100): 22 21 21 CT(1) = 1 + 2*3 + 5*3 = 22 +22 21 21 CT(0) = 0 + 2*3 + 5*3 = 21 44 42 42 CT(0) = 0 + 2*3 + 5*3 = 21 D(44 42 42): D(44) = 44 mod 3 = 2 D(42) = 42 mod 3 = 0 1000 = 8 = 4+4 D(42) = 42 mod 3 = 0
  • 12. Craig Gentry scheme (integers) Multiplication example: 4*4 CT(100): CT(1) = 1 + 2*3 + 5*3 = 22 22 21 21 CT(0) = 0 + 2*3 + 5*3 = 21 22 21 21 CT(0) = 0 + 2*3 + 5*3 = 21 484 924 1365 882 441 D(484 924 1365 882 441): D(484) = 484 mod 3 = 1 D(924) = 924 mod 3 = 0 D(1365) = 1365 mod 3 = 0 10000 = 16 = 4*4 D(882) = 882 mod 3 = 0 D(441) = 441 mod 3 = 0
  • 13. Craig Gentry scheme (ideal lattices) Replace integers by ideal lattices Ideal lattices have many representations or bases Bases: Good: good to decrypt, bad to encrypt Bad: bad to decrypt, good to encrypt Public key scheme, where good bases are private keys and bad bases are public keys
  • 14. Cryptography over lattices L = 龍(B) = {Bc : c Zk}, B Rnk, where the k columns of the basis are linearly independent NP-hard problems over lattices: SVP (shortest vector problem): given a basis for lattice L of size n, find the shortest nonzero vector v L s.t. ||v|| = 了(L); CVP (closest vector problem): given a basis for lattice L of size n and a vector t Rn, find a nonzero vector v L s.t. ||t-v|| 粒;
  • 15. Cryptography over lattices NP-hard problems over lattices: SIVP (shortest independent vector problem): like the SVP, except the output are linearly independent vectors v1, , v2 L of length at most 了(L); BDDP (bounded distance decoding problem): same as CVP but with the promise that there is a unique solution.
  • 16. Craig Gentry scheme Why inefficient? CT size and computation time increase sharply as the security level increases; 2k security -> CT size and computation time are high-degree polynomials in k; Efforts are being made to reduce the computational requirements of Craig Gentry construction
  • 17. Homomorphic Encryption Nowadays: Craig Gentry presented a working implementation of the fully homomorphic system, including the bootstrapping function Exists a practical application of homomorphic encryption to a hybrid wireless network Perform statistical tests over encrypted data such as temperature, humidity, etc. There are also some practical implementations of simplifications of this scheme over databases
  • 18. Problems solved Cloud security Problems related to personal records like medical records Work with information stored in databases Querys to search engines
  • 19. My Project Design an API and include it on a Web Service that will work over CLOUD platforms The API should provide homomorphic encryption functions to be used Create a prototype that will work under the constructed API