Research Article
BibTex RIS Cite

A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM

Year 2016, Volume: 4 Issue: 1, 122 - 129, 01.04.2016

Abstract

The Fully Homomorphic Encryption (FHE) was an open problem up to 2009. In 2009, Gentry solved the problem. After Gentry's solution, a lot of work have made on FHE. In 2012, Xiao et al suggested a new FHE scheme with symmetric keys. They proved that security of their scheme depends on large integer factorization. In their scheme, they used 2m prime numbers in keygen algorithm and they used Chinese Remainder Theorem (CRT) in encryption algorithm. In 2014, Vaudenay et al broken this scheme. In this paper we present a new FHE scheme with symmetric keys which is a little di erent from Xiao et al scheme. We extend the approach with using General Chinese Remainder Theorem (GCRT). With using GCRT, we obtained a new FHE scheme and also we achieved to avoid choosing 2m prime/mutually prime numbers. Our scheme works with random numbers.

References

  • [1] R. Rivest, L. Adleman and M. L. Dertouzos, On data banks and privacy homomorphisms Foundations of Secure Computation, 169-170, 1978.
  • [2] A. Silverberg, Fully Homomorphc Encrypton for Mathematcans sponsored by DARPA under agreement numbers FA8750-11-1-0248 and FA8750- 13-2-0054. 2013.
  • [3] S. Goldwasser and S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information in proceedings of the 14th ACM Symposium on Theory of Computing, 365-377, 1982.
  • [4] P. Pailler, Public-Key Cryptosystems Based on Composite degree Residuosity Classes in Advances in Cryptology, EUROCRYPT, 223-238, 1999.
  • [5] C. Gentry, A Fully Homomorphc Encrypton Scheme phd thesis, Stanford University, 2009.
  • [6] V. Vaikuntanathan, Computing Blindfolded: New Developments in Fully Homomorphic En- cryption 52nd Annual Symposium on Foundations of Computer Science,5-16, 2011.
  • [7] L. Xiao, O. Bastani and I-Ling Yen, An Ecent Homomorphic Encryption Protocol for Multi-User Systems iacr.org, 2012.
  • [8] C. P. Gupta and I. Sharma, Fully Homomorphic Encryption Scheme with Symmetric Keys Master of Technology in Department of Computer Science & Engineering, Rajasthan Technical University, Kota, August - 2013.
  • [9] C. P. Gupta and I. Sharma, A Fully Homomorphic Encryption scheme with Symmetric Keys with Application to Private Data Processing in Clouds, Network of the Future (NOF) Fourth International Conference on the Digital Object Identi er: 10.1109/NOF.2013.6724526, Page(s): 1 - 4 IEEE CONFERENCE PUBLICATIONS, 2013.
  • [10] H. E. Rose, A Course n Number Theory School of Mathematics , niversity of Bristol,1988.
  • [11] W. J. Leveque, Topics in Number Theory Addison-Wesley Publishing Company, University of Michigan, 35-35, 1965.
  • [12] D. Vizar and S. Vaudenay, Cryptanalysis of Chosen Symmetric Homomorphic Schemes EPFL CH-1015 Lausanne, Switzerland, 2014.
Year 2016, Volume: 4 Issue: 1, 122 - 129, 01.04.2016

Abstract

References

  • [1] R. Rivest, L. Adleman and M. L. Dertouzos, On data banks and privacy homomorphisms Foundations of Secure Computation, 169-170, 1978.
  • [2] A. Silverberg, Fully Homomorphc Encrypton for Mathematcans sponsored by DARPA under agreement numbers FA8750-11-1-0248 and FA8750- 13-2-0054. 2013.
  • [3] S. Goldwasser and S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information in proceedings of the 14th ACM Symposium on Theory of Computing, 365-377, 1982.
  • [4] P. Pailler, Public-Key Cryptosystems Based on Composite degree Residuosity Classes in Advances in Cryptology, EUROCRYPT, 223-238, 1999.
  • [5] C. Gentry, A Fully Homomorphc Encrypton Scheme phd thesis, Stanford University, 2009.
  • [6] V. Vaikuntanathan, Computing Blindfolded: New Developments in Fully Homomorphic En- cryption 52nd Annual Symposium on Foundations of Computer Science,5-16, 2011.
  • [7] L. Xiao, O. Bastani and I-Ling Yen, An Ecent Homomorphic Encryption Protocol for Multi-User Systems iacr.org, 2012.
  • [8] C. P. Gupta and I. Sharma, Fully Homomorphic Encryption Scheme with Symmetric Keys Master of Technology in Department of Computer Science & Engineering, Rajasthan Technical University, Kota, August - 2013.
  • [9] C. P. Gupta and I. Sharma, A Fully Homomorphic Encryption scheme with Symmetric Keys with Application to Private Data Processing in Clouds, Network of the Future (NOF) Fourth International Conference on the Digital Object Identi er: 10.1109/NOF.2013.6724526, Page(s): 1 - 4 IEEE CONFERENCE PUBLICATIONS, 2013.
  • [10] H. E. Rose, A Course n Number Theory School of Mathematics , niversity of Bristol,1988.
  • [11] W. J. Leveque, Topics in Number Theory Addison-Wesley Publishing Company, University of Michigan, 35-35, 1965.
  • [12] D. Vizar and S. Vaudenay, Cryptanalysis of Chosen Symmetric Homomorphic Schemes EPFL CH-1015 Lausanne, Switzerland, 2014.
There are 12 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Emin Aygün

Erkan Lüy This is me

Publication Date April 1, 2016
Submission Date July 10, 2014
Published in Issue Year 2016 Volume: 4 Issue: 1

Cite

APA Aygün, E., & Lüy, E. (2016). A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp Journal of Mathematics, 4(1), 122-129.
AMA Aygün E, Lüy E. A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp J. Math. April 2016;4(1):122-129.
Chicago Aygün, Emin, and Erkan Lüy. “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”. Konuralp Journal of Mathematics 4, no. 1 (April 2016): 122-29.
EndNote Aygün E, Lüy E (April 1, 2016) A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp Journal of Mathematics 4 1 122–129.
IEEE E. Aygün and E. Lüy, “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”, Konuralp J. Math., vol. 4, no. 1, pp. 122–129, 2016.
ISNAD Aygün, Emin - Lüy, Erkan. “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”. Konuralp Journal of Mathematics 4/1 (April 2016), 122-129.
JAMA Aygün E, Lüy E. A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp J. Math. 2016;4:122–129.
MLA Aygün, Emin and Erkan Lüy. “A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM”. Konuralp Journal of Mathematics, vol. 4, no. 1, 2016, pp. 122-9.
Vancouver Aygün E, Lüy E. A SYMMETRIC KEY FULLY HOMOMORPHIC ENCRYPTION SCHEME USING GENERAL CHINESE REMAINDER THEOREM. Konuralp J. Math. 2016;4(1):122-9.
Creative Commons License
The published articles in KJM are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.