Abstract
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling algorithm, an improved lattice MIBFHE scheme was proposed. Firstly, we combined MP12 trapdoor function with dual LWE algorithm to construct a new IBE scheme under the standard model, and prove that the scheme is IND-sID-CPA security under the selective identity. Secondly, we used the eigenvector method to eliminate the evaluation key, and transform the above efficient IBE scheme into a single identity IBFHE scheme to satisfy the homomorphic operation. Finally, we improved the ciphertext extension method of CM15 and constructed a new Link-mask system that supports the transformation of IBFHE scheme under the standard model, and then, converted the above IBFHE scheme into MIBFHE scheme based on this system. The comparative analysis results showed that the efficiency of this scheme is improved compared with similar schemes in the trapdoor generation and preimage sampling, and the dimension of lattice and ciphertext size are significantly shortened.
1. Introduction
With the continuous development of cloud computing, cloud computing faces the security problem of how to ensure data privacy in the process of implementing applications. In 1978, Rivest et al. [1] proposed the idea of homomorphic encryption to protect data security. Homomorphic encryption has special properties that it can perform effective operations on ciphertext without decryption in the phase of processing data ciphertext, which is equivalent to encrypting the plaintext after corresponding operations. Therefore, how to construct a scheme with homomorphic properties became a difficult problem for cryptographers. Until 2009, Gentry [2] proposed the first FHE (full homomorphic encryption) scheme based on ideal lattice. Since then, FHE became a research hotspot in the field of cryptography. Cryptographers proposed a series of FHE schemes based on different theoretical foundations, including integer-based FHE schemes (such as [DGHV10] scheme [3]), RLWE-based (Ring Learning with Errors, RLWE) FHE schemes (such as [BV11a] scheme [4]), LWE-based FHE schemes (such as [BV11b, BGV12] scheme [5,6]) and FHE scheme with eigenvector (such as [GSW13] scheme [7]).
As an important extension of the public key encryption systems, FHE needs to consider the problem of identity authentication in the cloud computing environment. The general method is to introduce public key certificates for authentication. However, the existence of public key certificates brought additional costs to the entire cryptosystem in all aspects such as computing, storage, communication and management. Additionally, the existing FHE systems generally have the problem of large public key size.
In 1984, Shamir [8] first proposed the IBE (identity-based encryption) scheme. Its central idea is to generate a public key from the user’s unique identity (such as e-mail address, mobile phone number, etc.) and public parameters, so that there is no need to issue an additional public key for each user. The user’s secret key can be generated by the trusted third party center (Key Generate Center, KGC) using the identity and the system’s master secret key. It eliminates the additional overhead associated with public key certificates and can manage keys more efficiently. Therefore, scholars began to study how to combine homomorphic encryption and identity-based encryption to construct the scheme of IBFHE (identity-based full homomorphic encryption), which has the advantages of FHE and IBE at the same time. It can not only perform access control and homomorphic operation on identity ciphertext, but also effectively manage the key. In 2010, Naccache [9] first proposed the open issue of how to construct identity-based full homomorphic encryption scheme at the CRYPTO’2010 conference. In 2013, Gentry et al. [7] constructed the first IBFHE scheme based on the LWE problem with the method of eigenvectors, and also proposed a transformation mechanism that can transform the IBE scheme satisfying the corresponding conditions into the related IBFHE scheme, which solved the above open problem to some extent. However, it is only applicable to single-identity encryption scenarios. It can only perform homomorphic operations on ciphertext encrypted under the same identity, and cannot perform homomorphic operations on ciphertext encrypted based on different identities. However, in many real-world scenarios, homomorphic-encrypted ciphertexts are usually encrypted under different identities.
In 2014, Clear and McGoldrick [10] constructed a multi-identity based full homomorphic encryption (MIBFHE) scheme. However, the construction largely depended on indistinguishable obfuscation [11]. Since it is difficult to realize indistinguishable obfuscation at present, the current efficiency is very low, and the security of the scheme cannot be based on a recognized computational problem. In 2015, Clear and McGoldrick [12] extended the FHE scheme constructed by Gentry et al. [7] to the first MIBFHE scheme based on the standard LWE problem (this scheme is called CM15 scheme), but the process of ciphertext expansion is complex and the noise growth is too fast. In 2019, TU et al. [13] made use of the transformation mechanism of [12] and combined with the hierarchical identity-based encryption scheme proposed by Cash et al. [14] to construct a hierarchical multi-identity full homomorphic encryption scheme. In the same year, Shen et al. [15] proposed a hierarchical multi-identity fully homomorphic encryption scheme based on the multi-key scheme of Mukherjee et al. [16]. In 2020, Pal and Dutta [17] constructed a multi-identity multi-attribute MIBFHE scheme with chosen ciphertext security on the basis of multi-key full homomorphism, but their extension process uses Witness Pseudorandom Function (WPRF), which is a non-standard assumption. In 2021, Shen et al. [18] constructed a compressible multi-key and multi-identity fully homomorphic encryption based on the compressible FHE scheme proposed by Gentry et al. [19]. In 2022, Liu et al. [20] constructed a hierarchical multi-hop MIBFHE scheme based on the IBE scheme proposed by Gentry et al. [21] and the hierarchical multi-hop multi-key FHE scheme proposed by Peikert et al. [22].
The trapdoor generation of the above scheme is quite complex and too inefficient in terms of both operation and output’s quality, which is not suitable for practice. It mainly used the trapdoor generation algorithm of [23,24], which involves the calculation of complex HNF (Hermite Normal Forms) and matrix inversion operations. Although the dimension and quality of its output are asymptotically optimal, the hidden constant factor is quite large. In addition, the preimage sampling algorithm of [21] needs to perform high-precision real number orthogonalization iterative operation during the sampling process, resulting in high complexity of the preimage sampling.
In 2012, Micciancio et al. [25] proposed a new trapdoor generation algorithm and corresponding preimage sampling algorithm (this scheme is called MP12 scheme). Compared with the structure of [23,24], it is essentially equivalent to one-time multiplication operation of two random matrices, which does not involve the calculation of complex HNF and matrix inversion operations. Its terms are chosen independently in the appropriate probability distribution, so it is more efficient. At the same time, Micciancio also pointed out that MP12 trapdoor can be used to optimize all lattice-based IBE schemes, but no specific scheme is given.
Our Contribution. In view of the above problems, in order to make the lattice MIBFHE scheme more practical, solving the problem of inefficient trapdoor generation must be considered. In this paper, we proposed an improved scheme using the transformation mechanism of [12]. First, based on the trapdoor function designed by Micciancio et al. [25] and the IBE scheme of Agrawal et al. [26], we proposed a new IBE scheme under the standard model, and proved that the scheme is IND-sID-CPA security under selective identity. Then, based on the above efficient IBE scheme and the eigenvector method proposed by Gentry et al. [7], which eliminate the evaluation key, the IBE scheme in this paper is transformed into a single-identity IBFHE scheme that satisfies homomorphic operation. Finally, a Link–Mask system was reconstructed based on the ciphertext extension method of [12], and IBFHE was converted into MIBFHE using the reconstructed extended ciphertext method and the masking scheme.
Organization. The second chapter introduces some notation we need to use throughout the paper, and reviews important definitions, including the trapdoor generation algorithm and LWE hardness problem. The third chapter firstly constructs an efficient IBE scheme, and proves the correctness and security of the IBE scheme. The parameter setting of the scheme and the parameter comparison of other schemes are introduced. The fourth chapter introduces how to use the approximate eigenvector to transform the IBE scheme constructed in the third chapter into the IBFHE scheme, and proves the correctness and security of the scheme. The fifth chapter uses the algorithm constructed in this paper to transform the IBFHE scheme in the fourth chapter into MIBFHE scheme, and also gives the correctness and security proof of the scheme, as well as the efficiency comparison analysis of the scheme. The sixth chapter is a summary.
2. Preliminaries
Notation. There are some notations that we will use throughout this paper. We denote as and its elements are in the range of . We use bold uppercase letters (e.g., ) to represent matrices, and bold lowercase letters (e.g., ) to represent vectors. All vectors in this paper are default column vectors. For a vector , denotes the i-th component scalar. For a matrix , denotes the -th row and the -th column element of . Let denote the Euclidean norm of a vector as and represent the maximum singular value of matrix . We denote as the concatenation of two matrices.
Let denote the security parameter. We define for any positive integer . Let denote a negligible function that grows slower than for any constant and any sufficiently large value of . We say that an event happens with overwhelming probability if it happens with probability at least for some negligible . Let denotes the degree of asymptotic when . That is for any positive integer and a positive integer satisfy , .
2.1. Relevant Definitions of Lattice
Definition 1.
(Lattice) Let be linearly independent vectors on the n-dimensional Euclidean space . Set , and lattice can be expressed linearly by the integer coefficients of all these vectors of , as defined follows:
where the linear independent vector which is a basis of the lattice form a lattice space, with dimension and rank , for . When , the is a full-rank lattice, the scheme is usually constructed with the full-rank lattice. Here, we are interested in integer lattices, i.e., when is contained in .
Definition 2.
(-Module Lattice) For , where is prime, and , define:
where is the coset of . is a shift of which satisfies , for .
2.2. Discrete Gaussian Distribution
Definition 3.
(Gaussian-Shaped Function [27]) For any real number , any vector , and the standard deviation , where . Gaussian-shaped function is defined as
Definition 4.
(Discrete Gaussian Distribution [27]) Let lattice
, for any real number
, any vector
, the standard deviation
, where
. The discrete Gaussian distribution with distribution center
is defined as
For convenience, we abbreviate
and
as
and
. When
, we use
to express
. Distribution
is usually defined over the lattice
for a matrix
or over a coset
, where
.
2.3. LWE Hardness Problem
The security of all our structures is reduced to the LWE problem, which was first defined by Regev [27] in 2005. It proved to be a non-deterministic polynomial (NP) problem with polynomial complexity.
Definition 5.
(LWE Hardness Problem [27]) Consider a positive integer n, a prime q, a noise distribution over , and uniformly random secret key . An problem include accessing an unspecified challenge oracle
, that is, the oracle can be a noisy pseudo-random sampler
with some constant random secret key , or it can be a truly random sampler . The behaviors of the two kinds of samplers are as follows.
: outputs sample of the form , where is a randomly uniform and invariant secret vector, is a randomly uniformly selected vector, and is fresh sample from .
: outputs truly uniform random samples from .
The problem allows repeated queries to the challenge oracle . For a random , if is non-negligible, we say that algorithm can solve the problem, where .represents the advantage of algorithm in solving the problem.
Regev [27] showed that for some noise distributions , denoted . The LWE problem is as difficult as the worst-case SIVP and GapSVP under quantum reduction (see also [28]).
Definition 6.
([27]) Consider a positive integer , a real parameter , and a prime . Denote as the normal distribution on with the mean 0 as the Gaussian center and the standard deviation , whose corresponding discrete distribution is .
Lemma 1.
([27]) Consider positive integer and , if there is an efficient, possibly quantum, algorithm to solve the problem for , then in the worst case, there is an efficient polynomial quantum algorithm to solve the SIVP and the GapSVP problems with an approximate factor of .
2.4. Preimage Matrix
Lemma 2.
([25]) Consider an odd prime and a positive integer . For any , there exists a fixed efficiently computable preimage matrix and an efficiently computable deterministic “short preimage” function that satisfies the following conditions. For any , when matrix is input, the function outputs a bit-matrix such that .
We can regard as a special matrix. For those familiar with GSW13 [7] encryption, multiplication is the operation, and the function is called . Note that itself is not a matrix, but rather an efficiently computable function.
Let be vectors of some dimension over . Let and . Let be the -dimension vector , where is the -th bit in ’s binary representation. bits ordered least significant to most significant. Let 𝒙 be the inverse of , but well-defined even when the input is not a vector. Let , a -dimension vector with coefficients. , , or be the matrix formed by applying the operation to each column of separately. Finally, let . Has the following properties:
- (1)
- .
- (2)
- .
2.5. Trapdoor Function and Trapdoor Generation Algorithm
Definition 7.
(MP12 Trapdoor [25]) For any integer , , , , , , . Set matrices and , and the corresponding -trapdoor matrix of is , which satisfies , where is an invertible matrix, and is called label of the trapdoor. The trapdoor’s quality depends on the maximum singular value .
Lemma 3.
(Trapdoor Generation Algorithm [25]) For ,,,,,, modulus , invertible matrix , construct a gadget matrix , where . Randomly choose uniform matrix . There exists a trapdoor generation algorithm , outputs matrix and its trapdoor matrix where is statistically indistinguishable from and the size of trapdoor is .
Lemma 4.
(Sampling Algorithm [25]) As same as the parameter of Lemma 3, let be an -dimensional random vector, Gaussian parameter , and there exists a PPT (probability polynomial time) algorithm , output a vector closing to the discrete Gaussian distribution , satisfying , where .
3. Identity-Based Encryption Scheme
In order to construct a more efficient IBFHE scheme, we first need to construct an IBE scheme with better performance. Next, we improve the IBE scheme of Agrawal et al. [26] based on the MP12 trapdoor generation algorithm and sampling algorithm to make the parameters of the scheme more compact.
3.1. Construction
The basic parameter definition of the scheme: Let as security parameter, as modulus, , randomly uniform matrix and its corresponding trapdoor , where ; Construct a gadget matrix for and is an identity matrix; encoding function with FRD (full-rank differences) .
- -
- Input the security parameter and generate the basic parameter . Randomly and uniformly choose a matrix and an n-dimensional vector . Run the trapdoor generation algorithm to generate matrix and its trapdoor matrix . Output master public key and master secret key .
- -
- Input the master public key , master secret key , and user’s identity vector . Using FRD encoding function , map each user’s to an invertible matrix . Let , run the sampling algorithm to generate secret key corresponding to each user’s , satisfying . Set . Output secret key , satisfying .
- -
- Input the master public key , user’s identity vector and encrypted plaintext message . Let . Randomly choose a uniform vector and an error vector according to the LWE error distribution. Output ciphertext vector .
- -
- Input the master public key , user’s secret key and ciphertext to decrypt. Compute . If , output ; If , output .
3.2. Correctness and Parameters
Theorem 1.
([21]) When , , , the IBE scheme constructed in Section 3.1 is successfully decrypted with great probability.
Proof.
It can be obtained from the decryption formula
According to [21], when , can satisfy with a great probability. Due to , when , if , then ; If , then , obviously the decryption algorithm can successfully decrypt with great probability.
According to the above analysis and Lemma 1, when and reach the extreme value, respectively, there is , satisfying the security requirements of LWE problem, that is . To meet the above requirements, set scheme parameter : ,,,.□
3.3. Security Reduction
Theorem 2.
When , if the hardness assumption holds, the basic IBE scheme given in this section is IND-sID-CPA (Indistinguishable from Random, Select-Identity, Chosen-Plaintext Attachment) security.
Proof.
For the IBE scheme proposed in this paper, we use a series of IND-sID-CPA security games proposed by Agrawal et al. [26] under the standard model to prove the security. The security model is established by a sequence game between adversary and challenger .The steps are as follows:
Game0 Game0 is a standard original IND-sID-CPA game between adversary and challenger .
Game1 Let be the identity of adversary who plans to attack. Compared with Game0, the challenger changes the way to generate matrix , and randomly generates . From lemma 3, we can see that algorithm in Game0 generates matrix . From the Left over Hash lemma [29], distribution and distribution are statistically indistinguishable, for . Therefore, in the view of adversary , the matrix in Game0 and in Game1 are statistically indistinguishable, and adversary cannot distinguish Game0 and Game1 with negligible advantages.
Game2 The difference between Game2 and Game1 is that Challenger changes the corresponding way to query secret key. Game2 uses algorithm to generate matrix and lattice trapdoor matrix . Keeping the form of in Game1. According to the definition of FRD encoding function, is nonsingular. Challenger can respond to the secret key query of adversary through the trapdoor matrix to sample the preimage. Run sampling algorithm and output secret key to adversary . If , then is a singular matrix, and the game ends. The distribution of in Game2 and in Game1 are statistically indistinguishable, so adversary cannot distinguish Game1 and Game2 with negligible advantages.
Game3 The difference between Game3 and Game2 is that the challenge ciphertext is always selected as a random independent element of in the ciphertext space, so the advantage of adversary is zero.
For PPT adversary , it is still necessary to prove that the adversary cannot distinguish Game2 and Game3 in computation through the hardness of the LWE problem. Assuming adversary has non-negligible advantage in distinguishing Game2 and Game3, we use adversary to construct an LWE algorithm . Recall from definition 5 that an LWE problem instance is provided as a sampling which can be either truly random or noise pseudo-random . Challenger uses the adversary to distinguish the two. The steps are as follows:
Instance Challenger requests from and receives samples , for .
Target Adversary declares to challenger the target identity of the planned attack .
Setup Challenger sets according to the target identity .
- (1)
- Challenger uses the known samples to construct matrix .
- (2)
- Take as a common random vector .
- (3)
- Select from the distribution and construct the matrix .
- (4)
- Send the common parameter to the adversary .
From Left over Hash lemma [29], for an adversary , matrix is uniformly indistinguishable.
Queries1 Similar to Game2, Challenger responds to each secret key query of adversary .
Challenge The adversary submits challenge plaintext to challenger , and challenger outputs challenge ciphertext for target identity :
- (1)
- Let .
- (2)
- Hide plaintext message through constructing .
- (3)
- Let ,for .
- (4)
- Select random bit . When , send to the adversary ; when , randomly and uniformly select to pass to the adversary .
Attention: When , the distribution of is indistinguishable from the challenge ciphertext in Game2. From the definition of the LWE problem, we can know that .Thus
The right side of the equation is the challenge ciphertext in Game 2; is the challenge ciphertext in Game2, for . Thus is a valid ciphertext of corresponding to identity .
When , and are then uniformly selected. According to the Left over Hash lemma [29], obeys the discrete random distribution, so the also obeys the discrete random distribution. Therefore, the distribution of challenge ciphertext is indistinguishable from Game3, and is randomly selected by the challenger from . Queries2 The adversary can continue to query the secret key in the same way as Queries1.
Guess The adversary distinguishes whether the ciphertext is a random independent vector on or a valid ciphertext of plaintext message , and the challenger answers whether the samples in the LWE problem are from or according to the guess results.
In summary, when , the view of the adversary is the same as Game2; when , adversary has the same view as Game3. Because the advantage of algorithm in solving the LWE problem is the same as that of adversary in distinguishing Game2 and Game3, and because there is no PPT algorithm that can effectively solve the LWE problem; thus, the scheme is IND-sID-CPA secure, and the proof is over.
□
3.4. Efficiency Analysis of IBE Scheme
We compared the parameters of the proposed IBE scheme with the ABB-IBE scheme proposed by Agrawal et al. [26] with the same security as this scheme. See Table 1 for comparison results.
Table 1.
Comparison of main parameters of IBE scheme.
From the analysis in Table 1, it can be seen that the main efficiency parameters of the IBE scheme in this paper were significantly optimized. Compared with the ABB10-IBE trapdoor generation algorithm based on [23], this scheme uses the MP12 trapdoor generation algorithm to reduce the lattice security dimension from to , and the size of the master secret keys is selected from a short vector in a reasonable Gaussian distribution, so the scale of the public parameters, key size, and ciphertext size of this scheme are reduced.
4. Identity-Based Full Homomorphic Encryption Scheme
Based on the efficient IBE scheme proposed above, a new identity-based fully homomorphic encryption scheme was further constructed. We used the gadget matrix to replace Powersoft2, BitDecomp and Flatten to obtain new encryption and decryption forms. At the same time, we use the “approximate eigenvector” technology to eliminate the evaluation key in homomorphic encryption to obtain a more concise identity-based full homomorphic encryption scheme.
4.1. Construction
The basic parameter definition of the scheme: Let as security parameter, represents the maximum depth of homomorphic calculation allowed for the circuit, is a sufficiently large prime, and and FRD encoding function are the same as the definitions in the above IBE encryption scheme. Define . We construct another gadget matrix , where and is a identity matrix. According to Lemma 2, for any matrix , there exists a function such that , satisfying .
- -
- Input the security parameter and the maximum depth that the circuit allows homomorphic operations. Run the algorithm to generate matrix . Output the master public key and the master secret key .
- -
- Input the master public key , master secret key , and user’s identity vector . Run the algorithm to generate matrix . Output secret key , satisfying .
- -
- Input the master public key , user’s identity vector and encrypted plaintext message . Randomly choose uniform vectors and error vectors according to the LWE error distribution. N vectors are connected to form the matrix , and N vectors are connected to form the matrix , where . Output the ciphertext matrix .
- -
- Input the master public key , Boolean circuit , and ciphertext which are the different ciphertext of the same with secret key . Output the operation ciphertext , where the homomorphic addition is and the homomorphic multiplication is . According to the definitions of addition and multiplication, the homomorphic NAND gate operation is defined as .
- -
- Input the master public key , user’s secret key and ciphertext to decrypt. Set the vector .Compute and output .
4.2. Correctness and Parameters
Theorem 3.
When ,,, the IBFHE scheme constructed in Section 4.1 is successfully decrypted with great probability.
Proof.
For the initial ciphertext and secret key of the , there are
It can be obtained from Equation (1) and decryption formula
In order to enable the decryption effective, it is necessary to ensure the ciphertext’s noise , where , that is , satisfying . The ciphertext can be successfully decrypted. To meet the above requirements, set scheme parameters : ,,,.□
4.3. Homomorphic Property
Definition 8.
Let be the ciphertext matrix corresponding to plaintext of the identity , and the secret key is . If where , is called the -noise ciphertext of plaintext .
Proof.
Let and be the ciphertexts of identity corresponding to plaintexts and respectively, namely , , where , , .
- (1)
- Homomorphic addition: , satisfy , where . Obviously is noise ciphertext, that is, after one-time homomorphic addition, the error increases by two times the factor.
- (2)
- Homomorphic multiplication: , satisfy , where . Obviously , is noise ciphertext. The same calculation is also applicable to NAND gates.□
4.4. Security Reduction
Theorem 4.
If the hardness assumption holds, the IBFHE scheme given in this section is IND-sID-CPA secure.
Proof.
The security of the IBFHE scheme proposed in this section can be proved based on the IBE scheme constructed in the previous section, because the homomorphic algorithm in the IBFHE scheme is public and has no effect on the security of the scheme. Under the LWE assumption, let be the ciphertext obtained by encrypting the plaintext message 0 in the IBFHE scheme, which can be regarded as the concatenation of the N ciphertexts of a bit 0 in the IBE scheme. It can be seen from theorem 2 that and any random uniform matrices in are indistinguishable. Therefore, according to the definition of the IND-sID-CPA security model, the IBFHE scheme proposed in this section is IND-sID-CPA security.□
5. Multi-Identity Based Full Homomorphic Encryption Scheme
5.1. Link-Mask Scheme
Based on the above IBFHE scheme, we constructed an efficient multi-identity fully homomorphic encryption scheme by using the extended ciphertext method and the masking scheme, which is denoted as mIBFHE.
Firstly, we introduce the general method of converting single identity IBFHE scheme into multi identity scheme. For the convenience of description, we describe our scheme as a simple example. Assuming that there are two parties , any polynomial number of parties can be extended by this method.
Let and be the ciphertexts of the plaintext messages and corresponding to the parties’ identities and in the IBFHE scheme, respectively, and the identities and correspond to the secret keys and , respectively, which satisfy ,. By extending ciphertext according to the number of parties to “extended” ciphertext , those satisfy
In this paper, the general method of converting single-identity IBFHE scheme into multi-identity mIBFHE scheme is to convert the encrypted ciphertext matrix under single identity into a -dimensional general extended matrix, and the scale of extended ciphertext is expanded by . In this way, ciphertexts and corresponding to different identities can be input into the same Boolean circuit for homomorphic operation.
In order to perform the above ciphertext expansion, we need to construct a masking scheme: this scheme allows each party to independently generate key pairs, which are respectively. Run the algorithm to encrypt plaintext message under , and then use and its own randomness to extend its ciphertext. In the ciphertext expansion step, runs the masking algorithm twice (the number of parties) to use to create matrices , where , , and . Then, we randomly chose a matrix and set a matrix such that . Therefore, the final multi-identity extended ciphertext form of is
where is a single identity IBFHE ciphertext of , and . There is
Similarly, the ciphertext is extended to , which can perform homomorphic operations on ciphertext and encrypted under different identities.
Before constructing a specific masking scheme, we need to reconstruct the ciphertext extension of CM15 on the basis of [30]. The operation is as follows.
Link–Mask. Let be a 0-1 matrix, and be a IBFHE ciphertext of (-th row and -th column of , ) under . Let be another IBFHE key pair. There exists a polynomial-time deterministic algorithm , input and encryptions , return a matrix , satisfying , where . The algorithm is as follows (Algorithm 1).
| Algorithm 1 . |
| Input: and Output:
|
Proof.
Since is a IBFHE ciphertext of under , we have . Hence, it holds that
where has a norm .
Now it suffices to show that . Note that has -th column of on the -th column and 0 elsewhere.
where denotes the -th row of and denotes the -th column of .
To sum up,
where has norm .
□
5.2. Construction
The basic parameter definition of the scheme: Let as security parameter, denote the maximum depth of homomorphic calculation allowed for the circuit, be a sufficiently large prime, denote the maximum number of distinct identities supported by the scheme, and FRD encoding function are the same as the definitions in the above IBFHE encryption scheme. According to the notation in [16], the gadget matrix is extended to . According to lemma 2, it is known that for any matrix , there exists a function such that , satisfying .
- -
- Input the security parameter , the maximum depth that the circuit allows homomorphic operations, and the maximum number of different identities supported by the scheme. Run the algorithm and output the master public key and the master secret key .
- -
- Input the master public key , master secret key , and user’s identity vector . Run the algorithm to generate secret key corresponding to identity and the related public key , and construct the joint secret key by horizontally appending all the secret-keys in sequence . Output the public key and the joint secret key vector .
- -
- Input the master public key , the user’s identity vector and its corresponding public key , the encrypted plaintext message and the identity that needs to be extended. Run the algorithm to output the extended ciphertext corresponding to identity . The specific operation steps are as follows:
- 1.
- Single identity encryption step: Run to generate identity single identity IBFHE ciphertext . In this step, the party (here the -th party) keeps its for the next step;
- 2.
- Multi-identity ciphertext expansion step: Input a single-identity ciphertext , the public keys of the other parties, and a randomness selected from . Execute steps (a)–(d) as follows:
- (a)
- for .for , where was chosen in the single identity encryption step and is randomly chosen from .
- (b)
- Compute..
- (c)
- Choose . Set the matrix having the last row and the rest rows zero, where is the secret key of the party , is chosen from , .
- (d)
- Define the extended ciphertext matrix of the initial ciphertext asWhich is concatenated by number of sub-matrices. The diagonal sub-matrices of are for and the -th diagonal sub-matrix is . Lastly, is on the -th row and zero matrix is elsewhere.
- -
- Input the master public key , Boolean circuit , and the extended ciphertext which are the ciphertext encrypted under different identities . Output the operation ciphertext , where the homomorphic addition is and the homomorphic multiplication is . According to the definitions of addition and multiplication, the homomorphic NAND operation is defined as .
- -
- : Input the master public key , the joint secret key and the extended ciphertext to be decrypted. Set a vector , compute , and output .
Correctness. Let be the multi-identity ciphertext of a bit by -th user from the algorithm:
where is a single identity IBFHE ciphertext. For the joint secret key and the gadget matrix , if satisfies the relation , then we can naturally generalize the arguments of the scheme in [7]. The correctness of encryption and evaluation can be realized, and an effective mIBFHE scheme can be obtained.
Now, we are ready to prove the correctness of multi-identity ciphertext. We recall that for a valid output from with respect to a 0-1 matrix , we have for . By the definition, we have
Let’s see how the bit message is correctly recovered and check the error bound by using the following properties.
- (1)
- ;
- (2)
- ;
- (3)
- ;
- (4)
- ;
- (5)
- ;
Therefore, we have where and . In the decryption procedure, this error is multiplied by By our choice of the parameter, .
Homomorphic property. The homomorphic property of the mIBFHE scheme follows directly from the IBFHE scheme in the fourth chapter, because the algorithm is basically the same as the algorithm except for the dimension expansion, the matrix and the randomization function . The following is the homomorphism analysis of the mIBFHE scheme:
Definition 9.
Let be an extended ciphertext matrix corresponding to plaintext , respectively, and the secret key is , satisfying , , where , , .
- (1)
- Homomorphic addition: , satisfy ,where . Obviously is noise ciphertext, that is, after one-time homomorphic addition, the error increases by 2 times the factor.
- (2)
- Homomorphic multiplication: , satisfy , where . Obviously , is noise ciphertext. The same calculation is also applicable to NAND gates.
Multi-identity ciphertext security. If the IBE scheme constructed in this paper is IND-sID-CPA secure, then the mIBFHE scheme proposed in this paper is also IND-sID-CPA secure.
By using constructive proof, the masking scheme constructed by algorithm is IND-sID-CPA security. From theorem 2, it can be seen that the IBFHE scheme is IND-sID-CPA security. In summary, the mIBFHE scheme is also IND-sID-CPA security.
5.3. Efficiency Analysis of MIBFHE Scheme
The mIBFHE scheme proposed in this paper is compared with the CM15 scheme proposed by Clear et al. [12]. The comparison results are shown in Table 2.
Table 2.
Comparison of main parameters of mIBFHE scheme.
From the analysis in Table 2, it can be seen that compared with the CM15 scheme based on the trapdoor generation algorithm in [21], the mIBFHE scheme in this paper used the MP12 trapdoor generation algorithm and the preimage matrix for encryption. The scheme is more concise and the encryption algorithm is simpler. Therefore, the main efficiency parameters of the mIBFHE scheme in this paper are significantly optimized. The lattice security dimension is reduced from to , the size of the joint secret key is reduced from to , and the size of extended ciphertext is reduced from to .
6. Conclusions
Aiming at the problem that low efficiency of trapdoor function and sampling algorithm in lattice-based multi-identity fully homomorphic encryption scheme, this paper first constructed an efficient and transformable IBE scheme based on MP12 trapdoor, which solves the problem that the trapdoor of IBE scheme is difficult to realize and the preimage sampling is complex. Based on the LWE hardness problem, it is proved that the scheme is IND-sID-CPA security under the standard model. Then, the IBE scheme is transformed into IBFHE scheme by using the approximate eigenvector to eliminate the evaluation key and the preimage matrix. This IBFHE scheme satisfies the homomorphism operation. Finally, the constructed masking scheme and the extended ciphertext method are used to transform the IBFHE scheme into mIBFHE scheme. Compared with similar schemes, our scheme is more concise and efficient, and the parameters are more compact.
Author Contributions
Conceptualization, H.F. and R.H.; formal analysis, H.F.; funding acquisition, R.H.; methodology, H.F.; validation, H.F., R.H. and F.L.; writing—original draft, H.F.; writing—review & editing, H.F. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the National Natural Science Foundation Project of China under Grant No. 62062009 and the Guangxi Innovation-driven Development Project under Grant Nos. AA17204058-17 and AA18118047-7.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Rivest, R.L.; Adleman, L.; Dertouzos, M.L. On data banks and privacy homomorphisms. Found. Secur. Comput. 1978, 4, 169–180. [Google Scholar]
- Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 169–178. [Google Scholar]
- Van Dijk, M.; Gentry, C.; Halevi, S.; Vaikuntanathan, V. Fully homomorphic encryption over the integers. In Advances in Cryptology–EUROCRYPT 2010, Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques; French Riviera, France, 30 May–3 June 2010, Proceedings 29; Springer: Berlin/Heidelberg, Germany, 2010; pp. 24–43. [Google Scholar]
- Brakerski, Z.; Vaikuntanathan, V. Fully homomorphic encryption from ring-LWE and security for key dependent messages. In Advances in Cryptology–CRYPTO 2011, Proceedings of the 31st Annual Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2011; Proceedings 31. Springer: Berlin/Heidelberg, Germany, 2011; pp. 505–524. [Google Scholar]
- Brakerski, Z.; Vaikuntanathan, V. Efficient Fully Homomorphic Encryption from (Standard) LWE. In Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, CA, USA, 22–25 October 2011; pp. 97–106. [Google Scholar]
- Brakerski, Z.; Gentry, C.; Vaikuntanathan, V. (Leveled) Fully homomorphic encryption without bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, Berkeley, CA, USA, 31 January–3 February 2012; pp. 309–325. [Google Scholar]
- Gentry, C.; Sahai, A.; Waters, B. Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In Advances in Cryptology–CRYPTO 2013, Proceedings of the 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2013; Proceedings, Part I.. Springer: Berlin/Heidelberg, Germany, 2013; pp. 75–92. [Google Scholar]
- Shamir, A. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology-Crypto’84, Santa Barbara, CA, USA, 19–22 August 1984; pp. 341–349. [Google Scholar]
- Naccache, D. Is Theoretical Cryptography Any Good in Practice [OL]. Invited Talk at Crypto/CHES 2010. Available online: http://www.iacr.org/workshops/ches/ches2010 (accessed on 18 August 2010).
- Clear, M.; McGoldrick, C. Bootstrappable identity-based fully homomorphic encryption. In Cryptology and Network Security, Proceedings of the 13th International Conference, CANS 2014, Heraklion, Greece, 22–24 October 2014; Proceedings 13. Springer International Publishing: Cham, Switzerland, 2014; pp. 1–19. [Google Scholar]
- Garg, S.; Gentry, C.; Halevi, S.; Raykova, M.; Sahai, A.; Waters, B. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits. In Proceedings of the 2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), Berkeley, CA, USA, 26–29 October 2013; pp. 40–49. [Google Scholar]
- Clear, M.; McGoldrick, C. Multi-identity and multi-key leveled FHE from learning with errors. In Advances in Cryptology—CRYPTO 2015, Proceedings of the 35th Annual Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2015; Proceedings, Part II 35. Springer: Berlin/Heidelberg, Germany, 2015; pp. 630–656. [Google Scholar]
- TU, G.; Yang, X.; Zhou, T. Efficient identity-based multi-identity fully homomorphic encryption scheme. J. Comput. Appl. 2019, 39, 750. [Google Scholar]
- Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C. Bonsai trees, or how to delegate a lattice basis. In Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May–3 June 2010; pp. 523–552. [Google Scholar]
- Shen, T.; Wang, F.; Chen, K.; Wang, K.; Li, B. Efficient leveled (multi) identity-based fully homomorphic encryption schemes. IEEE Access 2019, 7, 79299–79310. [Google Scholar] [CrossRef]
- Mukherjee, P.; Wichs, D. Two round multiparty computation via multi-key FHE. In Advances in Cryptology–EUROCRYPT 2016, Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, 8–12 May 2016; Proceedings, Part II 35. Springer: Berlin/Heidelberg, Germany, 2016; pp. 735–763. [Google Scholar]
- Pal, T.; Dutta, R. Chosen-ciphertext secure multi-identity and multi-attribute pure FHE. In Cryptology and Network Security, Proceedings of the 19th International Conference, CANS 2020, Vienna, Austria, 14–16 December 2020; Proceedings 19. Springer International Publishing: Cham, Switzerland, 2020; pp. 387–408. [Google Scholar]
- Shen, T.; Wang, F.; Chen, K.; Shen, Z.; Zhang, R. Compressible multikey and multi-identity fully homomorphic encryption. Secur. Commun. Netw. 2021, 2021, 1–14. [Google Scholar] [CrossRef]
- Gentry, C.; Halevi, S. Compressible FHE with applications to PIR. In Theory of Cryptography, Proceedings of the 17th International Conference, TCC 2019, Nuremberg, Germany, 1–5 December 2019; Proceedings, Part II.. Springer International Publishing: Cham, Switzerland, 2019; pp. 438–464. [Google Scholar]
- Liu, W.; Wang, F.; Jin, X.; Chen, K.; Shen, Z. Leveled Multi-Hop Multi-Identity Fully Homomorphic Encryption. Secur. Commun. Netw. 2022, 2022, 1023439. [Google Scholar] [CrossRef]
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Columbia, BC, Canada, 17–20 May 2008; pp. 197–206. [Google Scholar]
- Peikert, C.; Shiehian, S. Multi-key FHE from LWE, revisited. In Theory of Cryptography, Proceedings of the 14th International Conference, TCC 2016-B, Beijing, China, 31 October–3 November 2016; Proceedings, Part II.. Springer: Berlin/Heidelberg, Germany, 2016; pp. 217–238. [Google Scholar]
- Ajtai, M. Generating hard instances of the short basis problem. In Automata, Languages and Programming, Proceedings of the 26th International Colloquium, ICALP’99, Prague, Czech Republic, 11–15 July 1999; Proceedings 26. Springer: Berlin/Heidelberg, Germany, 1999; pp. 1–9. [Google Scholar]
- Alwen, J.; Peikert, C. Generating Shorter Bases for Hard Random Lattices. In Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science STACS 2009, Freiburg, Germany, 26–28 February 2009; IBFI Schloss Dagstuhl: London, UK, 2009; pp. 75–86. [Google Scholar]
- Micciancio, D.; Peikert, C. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. Eurocrypt 2012, 7237, 700–718. [Google Scholar]
- Agrawal, S.; Boneh, D.; Boyen, X. Efficient lattice (h) ibe in the standard model. Eurocrypt 2010, 6110, 553–572. [Google Scholar]
- Regev, O. On lattices, learning with errors, random linear codes, and cryptography. In Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, 22–24 May 2005; pp. 84–93. [Google Scholar]
- Peikert, C. Public-key cryptosystems from the worst-case shortest vector problem. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 333–342. [Google Scholar]
- Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 2008, 38, 97–139. [Google Scholar] [CrossRef]
- Kim, E.; Lee, H.S.; Park, J. Towards round-optimal secure multiparty computations: Multikey FHE without a CRS. In Information Security and Privacy, Proceedings of the 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, 11–13 July 2018; Proceedings 23. Springer International Publishing: Cham, Switzerland, 2018; pp. 101–113. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).