Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme
Conference paper
Abstract
A key problem with the original implementation of the Gentry Fully Homomorphic Encryption scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclotomic fields. We present an extension of the Gentry–Halevi key generation technique for arbitrary cyclotomic fields. Our new method is roughly twice as efficient as the previous best methods. Our estimates are backed up with experimental data.
Keywords
Fast Fourier Transform Discrete Fourier Transform Homomorphic Encryption Fast Fourier Transform Algorithm Defense Advance Research Project Agency
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Cohen, H.: A Course in Computational Algebraic Number Theory, vol. 138. Springer GTM (1993)Google Scholar
- 2.Apostol, T.M.: Introduction to Analytic Number Theory. Springer, New York (1976)MATHGoogle Scholar
- 3.Brakerski, Z., Vaikuntanathan, V.: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 4.Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Symposium on Theory of Computing – STOC 2009, pp. 169–178. ACM (2009)Google Scholar
- 5.Gentry, C.: A fully homomorphic encryption scheme. PhD, Stanford University (2009)Google Scholar
- 6.Gentry, C., Halevi, S.: Implementing Gentry’s Fully-Homomorphic Encryption Scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 7.Good, I.J.: The interaction algorithm and practical Fourier analysis. J.R. Stat. Soc. 20, 361–372 (1958)MATHMathSciNetGoogle Scholar
- 8.Ogura, N., Yamamoto, G., Kobayashi, T., Uchiyama, S.: An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 70–83. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 9.Rader, C.M.: Discrete Fourier transforms when the number of data samples is prime. Proc. IEEE 56, 1107–1108 (1968)CrossRefGoogle Scholar
- 10.Smart, N.P., Vercauteren, F.: Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 11.Smart, N.P., Vercauteren, F.: Fully Homomorphic SIMD Operations. IACR e-print, 133 (2011)Google Scholar
- 12.Thomas, L.H.: Using a computer to solve problems in physics. Application of Digital Computers (1963)Google Scholar
- 13.Trench, W.F.: An algorithm for the inversion of finite Toeplitz matrices. J. SIAM 12, 515–522 (1964)MATHMathSciNetGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2011