In previous schemes, the homomorphic evaluator needs to obtain the user's "evaluation key", which consists of a chain of encrypted secret keys. Our scheme has no evaluation key. The evaluator can do homomorphic operations without knowing the user's public key at all, except for some basic parameters. This fact helps us construct the first identity-based FHE scheme. Using similar techniques, we show how to compile a recent attribute-based encryption scheme for circuits by Gorbunov et al. into an attribute-based FHE scheme that permits data encrypted under the same index to be processed homomorphically.
Category / Keywords: public-key cryptography / homomorphic encryption, identity-based encryption, attribute-based encryption, learning with errors, LWE, approximate gcd Publication Info: Full version of Crypto 2013 paper Date: received 8 Jun 2013, last revised 8 Jun 2013 Contact author: craigbgentry at gmail com Available format(s): PDF | BibTeX Citation Version: 20130609:025939 (All versions of this report) Short URL: ia.cr/2013/340 Discussion forum: Show discussion | Start new discussion