Abstract

Internet of Thing (IoT) systems usually have less storage and computing power than desktop systems. This paper proposes an efficient BGV-type homomorphic encryption scheme in order fit for secure computing on IoT system. Our scheme reduces the storage space for switch keys and ciphertext evaluation time comparing with previous BGV-type cryptosystems. Specifically, the switch key in homomorphic computations can be a constant but no longer one for each level. Moreover, the product of two ciphertexts can be at the same sublayer as them and the multiplication operations can be repeated between two sublayers. As a result, the multiplication times will not be limited by L in an L-level circuit and, thus, the ciphertext evaluation time will decrease significantly. We implement the scheme with the C language. The performance test shows that the efficiency of the improved scheme is better than Helib in same configurations.

Highlights

  • The Internet of Thing (IoT) systems have been widely used in people’s daily life [1,2]

  • In a breakthrough work [12], Gentry demonstrated that fully homomorphic encryption was theoretically possible based on ideal lattices

  • KeyGen: given the public parameters, first, the key generation algorithm selects a random vector s as the secret key. It computes b = −( a·s +p·e) mod q L−1, where a is a random element in Rq L−1, e is sampled from χ, and p is the plaintext modulu, and let ( a, b) be the public key

Read more

Summary

Introduction

The Internet of Thing (IoT) systems have been widely used in people’s daily life [1,2]. Homomorphic encryption allows a device to perform arbitrary computations on encrypted data without user secret key. Following Gentry’s work, many researchers tried to improve the performance of homomorphic encryption. (BGV) dramatically improved the performance of the BV-type homomorphic encryption. Gentry and Halevi and Smart reduced the size of public keys and ciphertexts [18] of the BGV-type scheme at the cost of increasing the probability of key recovery attack. They optimized the execution times of fast Fourier transform (FFT) and Chinese reminder theorem (CRT) by reducing the.

Plaintext Encoding
Ciphertext Encoding
Security Assumption of BGV
Principle of BGV
Introduction of BGV
Modifications on BGV-type Cryptosystems
Scheme Description
Implementation and Performance Analysis
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.