Paper 2013/198

On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes

Zhizhou Li and Ten H. Lai

Abstract

We consider the problem of evaluating circuits whose inputs are encrypted with possibly different encryption schemes. Let $\mathcal{C}$ be any circuit with input $x_1, \dots, x_t \in \{0,1\}$, and let $\mathcal{E}_i$, $1 \le i \le t$, be (possibly) different fully homomorphic encryption schemes, whose encryption algorithms are $\Enc_i$. Suppose $x_i$ is encrypted with $\mathcal{E}_i$ under a public key $pk_i$, say $c_i \leftarrow \Enc_i({pk_i}, x_i)$. Is there any algorithm $\Evaluate$ such that $\Evaluate(\mathcal{C}, \langle \mathcal{E}_1, pk_1, c_1\rangle, \dots, \langle \mathcal{E}_t, pk_t, c_t\rangle)$ returns a ciphertext $c$ that, once decrypted, equals $\mathcal{C}(x_1, \dots, x_t)$? We propose a solution to this seemingly impossible problem with the number of different schemes and/or keys limited to a small value. Our result also provides a partial solution to the open problem of converting any FHE scheme to a multikey FHE scheme.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. under review in a iacr conference.
Keywords
Fully Homomorphic EncryptionMulti-Scheme FHETrivial EncryptionsCiphertext TreesMultiparty Computations.
Contact author(s)
lizh @ cse ohio-state edu
lai @ cse ohio-state edu
History
2013-04-09: received
Short URL
https://ia.cr/2013/198
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/198,
      author = {Zhizhou Li and Ten H.  Lai},
      title = {On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2013/198},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/198}},
      url = {https://eprint.iacr.org/2013/198}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.