Paper 2012/637

Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification

Aviad Kipnis and Eliphaz Hibshoosh

Abstract

We present high performance non-deterministic fully-homomorphic methods for practical randomization of data (over commutative ring), and symmetric-key encryption of random mod-N data (over ring of reidues mod-N) well suited for crypto applications. These methods secure, for example, the multivariate input or the coefficients of a polynomial function running in an open untrusted environment. We show that random plaintext is the sufficient condition for proof of security for the homomorphic encryption. The efficient nature of the methods - one large-numbers multiplication per encryption and six for the product of two encrypted values - motivates and enables the use of low cost collaborative security platforms for crypto applications such as keyed-hash or private key derivation algorithms. Such a platform is comprised of a low-cost and low performance security element supported by an untrusted high performance server running the homomorpic algorithms. The methods employed may also provide enhanced protection for some existing crypto algorithms against certain attacks. Specifically, it is shown how to secure OSS public-key signature against Pollard attack. Further, we demonstrate how the homomorphic randomization of data can offer protection for an AES-key against side-channel attacks. Finally, the methods provide both fault detection and verification of computed-data integrity.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
OSS digital signatureHMACverification of computation
Contact author(s)
akipnis @ nds com
History
2012-11-11: received
Short URL
https://ia.cr/2012/637
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/637,
      author = {Aviad Kipnis and Eliphaz Hibshoosh},
      title = {Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification},
      howpublished = {Cryptology ePrint Archive, Paper 2012/637},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/637}},
      url = {https://eprint.iacr.org/2012/637}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.