Araştırma Makalesi
BibTex RIS Kaynak Göster

A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM

Yıl 2016, Cilt: 4 Sayı: 1, 122 - 129, 01.04.2016

Öz

The Fully Homomorphic Encryption (FHE) was an open problem up to 2009. In 2009, Gentry solved the problem. After Gentry's solution, a lot of work have made on FHE. In 2012, Xiao et al suggested a new FHE scheme with symmetric keys. They proved that security of their scheme depends on large integer factorization. In their scheme, they used 2m prime numbers in keygen algorithm and they used Chinese Remainder Theorem (CRT) in encryption algorithm. In 2014, Vaudenay et al broken this scheme. In this paper we present a new FHE scheme with symmetric keys which is a little di erent from Xiao et al scheme. We extend the approach with using General Chinese Remainder Theorem (GCRT). With using GCRT, we obtained a new FHE scheme and also we achieved to avoid choosing 2m prime/mutually prime numbers. Our scheme works with random numbers.

Kaynakça

  • [1] R. Rivest, L. Adleman and M. L. Dertouzos, On data banks and privacy homomorphisms Foundations of Secure Computation, 169-170, 1978.
  • [2] A. Silverberg, Fully Homomorphc Encrypton for Mathematcans sponsored by DARPA under agreement numbers FA8750-11-1-0248 and FA8750- 13-2-0054. 2013.
  • [3] S. Goldwasser and S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information in proceedings of the 14th ACM Symposium on Theory of Computing, 365-377, 1982.
  • [4] P. Pailler, Public-Key Cryptosystems Based on Composite degree Residuosity Classes in Advances in Cryptology, EUROCRYPT, 223-238, 1999.
  • [5] C. Gentry, A Fully Homomorphc Encrypton Scheme phd thesis, Stanford University, 2009.
  • [6] V. Vaikuntanathan, Computing Blindfolded: New Developments in Fully Homomorphic En- cryption 52nd Annual Symposium on Foundations of Computer Science,5-16, 2011.
  • [7] L. Xiao, O. Bastani and I-Ling Yen, An Ecent Homomorphic Encryption Protocol for Multi-User Systems iacr.org, 2012.
  • [8] C. P. Gupta and I. Sharma, Fully Homomorphic Encryption Scheme with Symmetric Keys Master of Technology in Department of Computer Science & Engineering, Rajasthan Technical University, Kota, August - 2013.
  • [9] C. P. Gupta and I. Sharma, A Fully Homomorphic Encryption scheme with Symmetric Keys with Application to Private Data Processing in Clouds, Network of the Future (NOF) Fourth International Conference on the Digital Object Identi er: 10.1109/NOF.2013.6724526, Page(s): 1 - 4 IEEE CONFERENCE PUBLICATIONS, 2013.
  • [10] H. E. Rose, A Course n Number Theory School of Mathematics , niversity of Bristol,1988.
  • [11] W. J. Leveque, Topics in Number Theory Addison-Wesley Publishing Company, University of Michigan, 35-35, 1965.
  • [12] D. Vizar and S. Vaudenay, Cryptanalysis of Chosen Symmetric Homomorphic Schemes EPFL CH-1015 Lausanne, Switzerland, 2014.
Yıl 2016, Cilt: 4 Sayı: 1, 122 - 129, 01.04.2016

Öz

Kaynakça

  • [1] R. Rivest, L. Adleman and M. L. Dertouzos, On data banks and privacy homomorphisms Foundations of Secure Computation, 169-170, 1978.
  • [2] A. Silverberg, Fully Homomorphc Encrypton for Mathematcans sponsored by DARPA under agreement numbers FA8750-11-1-0248 and FA8750- 13-2-0054. 2013.
  • [3] S. Goldwasser and S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information in proceedings of the 14th ACM Symposium on Theory of Computing, 365-377, 1982.
  • [4] P. Pailler, Public-Key Cryptosystems Based on Composite degree Residuosity Classes in Advances in Cryptology, EUROCRYPT, 223-238, 1999.
  • [5] C. Gentry, A Fully Homomorphc Encrypton Scheme phd thesis, Stanford University, 2009.
  • [6] V. Vaikuntanathan, Computing Blindfolded: New Developments in Fully Homomorphic En- cryption 52nd Annual Symposium on Foundations of Computer Science,5-16, 2011.
  • [7] L. Xiao, O. Bastani and I-Ling Yen, An Ecent Homomorphic Encryption Protocol for Multi-User Systems iacr.org, 2012.
  • [8] C. P. Gupta and I. Sharma, Fully Homomorphic Encryption Scheme with Symmetric Keys Master of Technology in Department of Computer Science & Engineering, Rajasthan Technical University, Kota, August - 2013.
  • [9] C. P. Gupta and I. Sharma, A Fully Homomorphic Encryption scheme with Symmetric Keys with Application to Private Data Processing in Clouds, Network of the Future (NOF) Fourth International Conference on the Digital Object Identi er: 10.1109/NOF.2013.6724526, Page(s): 1 - 4 IEEE CONFERENCE PUBLICATIONS, 2013.
  • [10] H. E. Rose, A Course n Number Theory School of Mathematics , niversity of Bristol,1988.
  • [11] W. J. Leveque, Topics in Number Theory Addison-Wesley Publishing Company, University of Michigan, 35-35, 1965.
  • [12] D. Vizar and S. Vaudenay, Cryptanalysis of Chosen Symmetric Homomorphic Schemes EPFL CH-1015 Lausanne, Switzerland, 2014.
Toplam 12 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Articles
Yazarlar

Emin Aygün

Erkan Lüy Bu kişi benim

Yayımlanma Tarihi 1 Nisan 2016
Gönderilme Tarihi 10 Temmuz 2014
Yayımlandığı Sayı Yıl 2016 Cilt: 4 Sayı: 1

Kaynak Göster

APA Aygün, E., & Lüy, E. (2016). A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp Journal of Mathematics, 4(1), 122-129.
AMA Aygün E, Lüy E. A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp J. Math. Nisan 2016;4(1):122-129.
Chicago Aygün, Emin, ve Erkan Lüy. “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”. Konuralp Journal of Mathematics 4, sy. 1 (Nisan 2016): 122-29.
EndNote Aygün E, Lüy E (01 Nisan 2016) A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp Journal of Mathematics 4 1 122–129.
IEEE E. Aygün ve E. Lüy, “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”, Konuralp J. Math., c. 4, sy. 1, ss. 122–129, 2016.
ISNAD Aygün, Emin - Lüy, Erkan. “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”. Konuralp Journal of Mathematics 4/1 (Nisan 2016), 122-129.
JAMA Aygün E, Lüy E. A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp J. Math. 2016;4:122–129.
MLA Aygün, Emin ve Erkan Lüy. “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”. Konuralp Journal of Mathematics, c. 4, sy. 1, 2016, ss. 122-9.
Vancouver Aygün E, Lüy E. A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp J. Math. 2016;4(1):122-9.
Creative Commons License
The published articles in KJM are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.