Lattice-Based Multi-Key Homomorphic Encryption Scheme Without Common Random Strings
Abstract
:1. Introduction
- In order to avoid excessive reliance on public parameters, this paper proposes a multi-key homomorphic encryption scheme based on a distributed key generation protocol. Each user independently generates his or her own public and private key pair, and enhances the security and decentralization of the scheme. Based on ciphertext expansion technology, this paper proposes a distributed ciphertext decryption method suitable for multi-key scenarios. By expanding the ciphertext structure, multiple users can collaboratively participate in the decryption process.
- In order to further protect the plaintext privacy from each user, by embedding the specified target user into the ciphertext, this paper proposes an enhanced multi-key homomorphic encryption scheme that allows the target user to decrypt.
- By applying the proposed lattice-based multi-key homomorphic encryption scheme into the data submission stage, a crowd-sensing scheme is proposed, protecting the privacy of the users. This ensures that the data are not leaked during transmission and processing, and all entities except the data requester cannot obtain the perception results.
2. Materials and Methods
2.1. Symbols and Definitions
2.2. Multi-Key Homomorphic Encryption
- -
- : Input security parameter and output public parameter .
- -
- : Input public parameters and output the user’s public key and private key .
- -
- : Input complex vector and scaling factor , output encoded plaintext polynomial .
- -
- : For the plaintext that needs to be encrypted, input the public key and output a ciphertext .
- -
- : Input the public keys of users and the ciphertext encrypted by the -th public key , and output the expanded ciphertext .
- -
- : Given a function , input extended ciphertexts , and output the ciphertext after homomorphic operation.
- -
- : Input the private keys of users and the homomorphic operation ciphertext , and output the plaintext . The decryption process is divided into two steps, as follows:
- : Input the private key of the -th user and the homomorphic operation ciphertext , and output the partial decryption result .
- : Input the partial decryption results of users and output the plaintext .
- -
- : Input plaintext , output decoded complex vector .
3. Lattice-Based Multi-Key Homomorphic Encryption Scheme Without CRSs
3.1. Security Model
- Initialization phase: Input the security parameter , runs algorithm to generate system public parameter . runs the algorithm to generate key pairs for users and key pair for target user , and sends , to .
- Query phase: maintains a query record table , which is empty at initialization and records all ciphertext query indexes initiated by during the entire query process. can adaptively select any plaintext and initiate a query request. runs the algorithm to generate the ciphertext and returns it to . This phase allows to perform a polynomial number of queries.
- Challenge phase: After finishes the query, it requests the challenge ciphertext. selects two plaintexts , of equal length and the target public key set , and sends them to . randomly selects a bit , calculates the challenge ciphertext , and returns to .
- Guessing stage: outputs a guess bit based on . If , wins and the game output is 1; otherwise, the output is 0.
3.2. Scheme Construction
- System Initialization
- 2.
- Key generation algorithm
- 3.
- Coding
- 4.
- Encryption algorithm
- 5.
- Ciphertext expansion algorithm
- 6.
- Homomorphic operation algorithm
- 7.
- Partial decryption algorithm
- 8.
- Final decryption algorithm
- 9.
- Decoding
3.3. Correctness Analysis
3.4. Security Analysis
3.5. Comparison
4. Crowd-Sensing Scheme with Privacy Preservation
4.1. System Model
- Sensing users
- 2.
- Sensing platform
- 3.
- Data requester
4.2. Construction of a Crowd-Sensing Scheme Based on Multi-Key Homomorphic Encryption
4.2.1. Initialization Phase
4.2.2. Perception Data Submission Phase
4.2.3. Ciphertext Aggregation Phase
4.2.4. Perception Result Decryption Phase
5. Security Analysis of a Crowd-Sensing Scheme Based on Multi-Key Homomorphic Encryption
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Liu, L.; Zhang, J.; Song, S.H. Client-edge-cloud hierarchical federated learning. In Proceedings of the ICC 2020–2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [Google Scholar] [CrossRef]
- Kim, M.; Harmanci, A.O.; Bossuat, J.P. Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation. Cell Syst. 2021, 12, 1108–1120.e4. [Google Scholar] [CrossRef] [PubMed]
- Kim, H.I.; Kim, H.J.; Chang, J.W. A secure kNN query processing algorithm using homomorphic encryption on outsourced database. Data Knowl. Eng. 2019, 123, 101602. [Google Scholar] [CrossRef]
- Yang, Y.; Huang, X.; Liu, X. A comprehensive survey on secure outsourced computation and its applications. IEEE Access 2019, 7, 159426–159465. [Google Scholar] [CrossRef]
- Sun, J.; Xu, G.; Zhang, T. Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds. IEEE Trans. Inf. Forensics Secur. 2022, 18, 683–698. [Google Scholar] [CrossRef]
- Kadykov, V.; Levina, A.; Voznesensky, A. Homomorphic encryption within lattice-based encryption system. Procedia Comput. Sci. 2021, 186, 309–315. [Google Scholar] [CrossRef]
- Chen, H.; Dai, W.; Kim, M. Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 395–412. [Google Scholar] [CrossRef]
- Xu, K.; Tan, B.H.M.; Wang, L.P. Multi-key fully homomorphic encryption from NTRU and (R) LWE with faster bootstrapping. Theor. Comput. Sci. 2023, 968, 114026. [Google Scholar] [CrossRef]
- Biswas, C.; Dutta, R. Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption. J. Ambient Intell. Humaniz. Comput. 2023, 14, 16451–16464. [Google Scholar] [CrossRef]
- Zhou, T.; Chen, L.; Che, X. Multi-Key Fully Homomorphic Encryption Scheme with Compact Ciphertexts. Cryptology ePrint Archive. 2021. Available online: https://eprint.iacr.org/2021/1131 (accessed on 26 April 2025).
- Luo, F.; Wang, H.; Saif, A.K. Multi-key fully homomorphic encryption without CRS from RLWE. Comput. Stand. Interfaces 2023, 86, 103742. [Google Scholar] [CrossRef]
- Ma, J.; Naas, S.A.; Sigg, S. Privacy-preserving federated learning based on multi-key homomorphic encryption. Int. J. Intell. Syst. 2022, 37, 5880–5901. [Google Scholar] [CrossRef]
- Ganesh, B.; Palmieri, P. Secure Search over Multi-key Homomorphically Encrypted Data. In Proceedings of the 2023 7th International Conference on Cryptography, Security and Privacy (CSP), London, UK, 18–20 July 2023; pp. 145–151. [Google Scholar] [CrossRef]
- Li, X.; Li, H.; Gao, J. Privacy preserving via multi-key homomorphic encryption in cloud computing. J. Inf. Secur. Appl. 2023, 74, 103463. [Google Scholar] [CrossRef]
- Chen, Y.; Dong, S.; Li, T. Dynamic multi-key FHE in asymmetric key setting from LWE. IEEE Trans. Inf. Forensics Secur. 2021, 16, 5239–5249. [Google Scholar] [CrossRef]
- Antwi-Boasiako, E.; Zhou, S.; Liao, Y. An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning. In Proceedings of the 2021 IEEE 23rd International Conference on High Performance Computing & Communications, Haikou, China, 20–22 December 2021; pp. 533–542. [Google Scholar] [CrossRef]
- Che, X.; Zhou, H.; Yang, X. Efficient multi-key homomorphic encryption scheme on ring LWE. J. Xidian Univ. 2023, 48, 87–95. [Google Scholar] [CrossRef]
- Li, N.; Zhou, T.; Che, X. Research on multi-key homomorphic encryption. J. Cryptologic Res. 2020, 7, 713–734. [Google Scholar] [CrossRef]
- Pathak, V. Lattices, homomorphic encryption, and ckks. Computing Research Repository. arXiv 2022, arXiv:2205.03511. [Google Scholar] [CrossRef]
- Qiu, F.; Yang, H.; Zhou, L. Privacy preserving federated learning using ckks homomorphic encryption. In International Conference on Wireless Algorithms, Systems, and Applications; Springer Nature Switzerland: Cham, Switzerland, 2022; pp. 427–440. [Google Scholar] [CrossRef]
- Li, H.; Li, X.; Gao, J. Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model. In International Symposium on Cyberspace Safety and Security; Springer International Publishing: Cham, Switzerland, 2022; pp. 342–357. [Google Scholar] [CrossRef]
- Li, J.; Zhu, Y.; Hua, Y. Crowdsourcing sensing to smartphones: A randomized auction approach. IEEE Trans. Mob. Comput. 2017, 16, 2764–2777. [Google Scholar] [CrossRef]
- Zheng, X.; Cui, L.; Zhang, L. The perception results based on encryption technology can verify the privacy preservation group intelligence perception scheme. J. Beijing Inst. Technol. (Nat. Ed.) 2024, 44, 413–420. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, H.; Shang, M.; Liu, H.; Zhang, D. Lattice-Based Multi-Key Homomorphic Encryption Scheme Without Common Random Strings. Symmetry 2025, 17, 722. https://doi.org/10.3390/sym17050722
Zhang H, Shang M, Liu H, Zhang D. Lattice-Based Multi-Key Homomorphic Encryption Scheme Without Common Random Strings. Symmetry. 2025; 17(5):722. https://doi.org/10.3390/sym17050722
Chicago/Turabian StyleZhang, Hongyi, Mengxue Shang, Hanzhuo Liu, and Dandan Zhang. 2025. "Lattice-Based Multi-Key Homomorphic Encryption Scheme Without Common Random Strings" Symmetry 17, no. 5: 722. https://doi.org/10.3390/sym17050722
APA StyleZhang, H., Shang, M., Liu, H., & Zhang, D. (2025). Lattice-Based Multi-Key Homomorphic Encryption Scheme Without Common Random Strings. Symmetry, 17(5), 722. https://doi.org/10.3390/sym17050722