Cryptology ePrint Archive: Report 2018/794

Blending FHE-NTRU keys – The Excalibur Property

Louis Goubin and Francisco Vial-Prado

Abstract: Can Bob give Alice his decryption secret and be convinced that she will not give it to someone else? This is achieved by a proxy re-encryption scheme where Alice does not have Bob’s secret but instead she can transform ciphertexts in order to decrypt them with her own key. In this article, we answer this question in a different perspective, relying on a property that can be found in the well-known modified NTRU encryption scheme. We show how parties can collaborate to one-way-glue their secret-keys together, giving Alice’s secret-key the additional ability to decrypt Bob’s ciphertexts. The main advantage is that the proto cols we propose can be plugged directly to the modified NTRU scheme with no post-key-generation space or time costs, nor any modification of ciphertexts. In addition, this property translates to the NTRU-based multikey homomorphic scheme, allowing to equip a hierarchic chain of users with automatic re-encryption of messages and supporting homomorphic operations of ciphertexts. To achieve this, we propose two-party computation protocols in cyclotomic polynomial rings. We base the security in presence of various types of adversaries on the RLWE and DSPR assumptions, and on two new problems in the modified NTRU ring.

Category / Keywords: public-key cryptography / cryptographic protocols, multiparty computaion, fully homomorphic encryption

Original Publication (in the same form): Progress in Cryptology – INDOCRYPT 2016 pp 3-24
DOI:
10.1007/978-3-319-49890-4_1

Date: received 30 Aug 2018

Contact author: fvialp at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20180901:122117 (All versions of this report)

Short URL: ia.cr/2018/794


[ Cryptology ePrint archive ]