Advertisement

Improved Efficiency of a Linearly Homomorphic Cryptosystem

  • Parthasarathi DasEmail author
  • Michael J. JacobsonJr.
  • Renate Scheidler
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11445)

Abstract

We present an extended version of the Castagnos and Laguillaumie linearly homomorphic cryptosystem [5] in which the non-maximal imaginary quadratic order is allowed to have conductor equal to a product of prime powers as opposed to a single prime. Numerical results obtained with an optimized C implementation demonstrate that this variation improves performance when large messages and exponents are used. When compared to the cryptosystems of Paillier [11] and Bresson et al. [3] at the same security levels, the basic version of Castagnos and Laguillaumie is the fastest at high security levels for small messages.

Keywords

Linearly homomorphic encryption Public key cryptography Ideal class group Electronic voting Encryption switching protocol 

References

  1. 1.
    Biasse, J.-F., Jacobson Jr., M.J., Silvester, A.K.: Security estimates for quadratic field based cryptosystems. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 233–247. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-14081-5_15CrossRefGoogle Scholar
  2. 2.
    Bosma, W., Stevenhagen, P.: On the computation of quadratic \(2\)-class groups. J. Théor. Nombres Bordeaux 8(2), 283–313 (1996). http://jtnb.cedram.org/item?id=JTNB_1996__8_2_283_0
  3. 3.
    Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37–54. Springer, Heidelberg (2003).  https://doi.org/10.1007/978-3-540-40061-5_3CrossRefGoogle Scholar
  4. 4.
    Castagnos, G., Imbert, L., Laguillaumie, F.: Encryption switching protocols revisited: switching modulo p. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 255–287. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-63688-7_9CrossRefGoogle Scholar
  5. 5.
    Castagnos, G., Laguillaumie, F.: Linearly homomorphic encryption from \(\sf {DDH-DL}\). In: Topics in Cryptology - CT-RSA 2015, The Cryptographer’s Track at the RSA Conference 2015, San Francisco, CA, USA, 20–24 April 2015. Proceedings, pp. 487–505 (2015).  https://doi.org/10.1007/978-3-319-16715-2_26
  6. 6.
    Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, vol. 138. Springer, Berlin (1993). https://doi.org/10.1007/978-3-662-02945-9
  7. 7.
    Hamdy, S., Möller, B.: Security of cryptosystems based on class groups of imaginary quadratic orders. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 234–247. Springer, Heidelberg (2000).  https://doi.org/10.1007/3-540-44448-3_18CrossRefGoogle Scholar
  8. 8.
    Hühnlein, D., Jacobson Jr., M.J., Paulus, S., Takagi, T.: A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 294–307. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0054134CrossRefGoogle Scholar
  9. 9.
    Jacobson Jr., M.J., Williams, H.C.: Solving the Pell Equation. CMS Books in Mathematics/Ouvrages de Mathématiques de la SMC. Springer, New York (2009).  https://doi.org/10.1007/978-0-387-84923-2CrossRefzbMATHGoogle Scholar
  10. 10.
    Koshiba, T., Kurosawa, K.: Short exponent Diffie-Hellman Problems. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 173–186. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24632-9_13CrossRefGoogle Scholar
  11. 11.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48910-X_16CrossRefGoogle Scholar
  12. 12.
    Sayles, M.: Optarith and qform libraries for fast binary quadratic forms arithmetic (2013). http://github.com/maxwellsayles

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Parthasarathi Das
    • 1
    Email author
  • Michael J. JacobsonJr.
    • 1
  • Renate Scheidler
    • 2
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada
  2. 2.Department of Mathematics and StatisticsUniversity of CalgaryCalgaryCanada

Personalised recommendations