Homomorphic Secret Sharing:Low-End HSS from OWF、HSS for Branching Programs from DDH、The HSS Construction

Homomorphic Secret Sharing Yuval Isha Technion European Research erc council Crypto Innovation School, November 2018
Homomorphic Secret Sharing Yuval Ishai Technion Crypto Innovation School, November 2018

1970 Primitives Assumptions PKE 1980 Signatures ZK OT Factoring Discrete Log 1990 Secure computation 2000 RILP 2010 CRYPTO
1970 1980 1990 2000 2010 PKE Secure Computation ZK Primitives Signatures Assumptions OT Factoring Discrete Log

1970 Primitives Assumptions PKE 1980 Signatures ZK OT Factoring Discrete Log 1990 Secure computation 2000 Minimize communication? Minimize interaction? 2010 Minimize local computation?
1970 1980 1990 2000 2010 PKE Secure Computation ZK Primitives Signatures Assumptions OT • Minimize communication? • Minimize interaction? • Minimize local computation? Factoring Discrete Log

1970 Primitives Assumptions PKE 1980 Signatures ZK OT Factoring Discrete Log 1990 Secure computation 2000 IBE ABE Bilinear Maps 2010 FHE Lattices FE
1970 1980 1990 2000 2010 Secure Computation ZK Primitives Signatures Assumptions OT Factoring Discrete Log FE IO IBE ABE Bilinear Maps FHE Lattices PKE

Fully Homomorphic encryption [RAD79, Gen09 (x) Function sk Dec Priva [P(X) Compactness Eval Dec<< P E Enc
Fully Homomorphic Encryption [RAD79,Gen09] Dec P(x) sk [x] Enc x pk Eval [P(x)] P Compactness: |Dec|<< |P| Function Privacy sk

State of the fhe The good Huge impact on the field -Solid 1 Given a generic group G Unconditionally secure PKE and even secure computation -Major. Not known to be helpful for FHE The not so goo Narrow set of assumptions and underlying structures all related to lattices Susceptible to lattice reduction attacks and other attacks Concrete efficiency still leaves much to be desired
State of the FHE • The good – Huge impact on the field – Solid foundations [BV11,GSW13,…] – Major progress on efficiency [BGV12,HS15,DM15,CGGI16,…] • The not so good – Narrow set of assumptions and underlying structures, all related to lattices • Susceptible to lattice reduction attacks and other attacks – Concrete efficiency still leaves much to be desired Given a generic group G: • Unconditionally secure PKE and even secure computation • Not known to be helpful for FHE

THERE HAS GOT TOBEA IN SOME SENSE FFERENT WAY
IN SOME SENSEDIFFERENT

Recall: ehe (x) sk Dec [P(x)] Eval E Enc
Recall: FHE Dec P(x) sk [x] Enc x pk Eval [P(x)] P

“1/2FHE sk Dec [P(x)]1 [P(×)]2 Eval Eval computationally computationally hi Ides x hides x Enc
“1/2 FHE” Dec P(x) sk [x]1 Enc x pk Eval [P(x)]1 P Eval [P(x)]2 P [x]2 computationally hides x computationally hides x

2-Party) Homomorphic Secret Sharing [P(x)]1 [P(×)]2 Eval Eval Share
(2-Party) Homomorphic Secret Sharing Dec P(x) [x]1 Share x Eval [P(x)]1 P Eval [P(x)]2 P [x]2
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 四川大学:软件设计工具(PPT课件讲稿)Software design tool.ppt
- 《图像处理与计算机视觉 Image Processing and Computer Vision》课程教学资源(PPT课件讲稿)Chapter 02 Image processing and computer vision(Camera models and parameters).pptx
- 《数据结构》课程教学资源(PPT课件讲稿)第九章 排序.ppt
- 福建工程学院:《软件工程》课程教学资源(实验指导书).doc
- 香港中文大学:Adaboost for building robust classifiers(PPT讲稿).pptx
- 《软件测试》课程教学资源(PPT讲稿)集成测试.pptx
- 《大学计算机基础》课程教学资源(PPT课件讲稿)第三章 字处理软件 Word2003.ppt
- 《现代操作系统 Modern Operating Systems》课程教学资源(PPT课件讲稿,Third Edition)Chapter 10 Case Study 1 LINUX.ppt
- 《微机原理与接口技术》课程教学资源(PPT课件讲稿)第1章 微型计算机基础概论.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第八章 因特网上的音频/视频服务.ppt
- PARALLELISM IN HASKELL(Kathleen Fisher).pptx
- 南京大学:《数据结构 Data Structures》课程教学资源(PPT课件讲稿)第九章 排序.ppt
- 厦门大学:《大数据技术原理与应用》课程教学资源(PPT课件讲稿,2017)第9章 Spark.ppt
- 中国科学技术大学:《嵌入式系统设计》课程教学资源(PPT课件讲稿)第2章 ARM微处理器概述与编程模型(王行甫).ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第二章 物理层.ppt
- 南京大学:可信软件(PPT讲稿)认识、度量与评估.ppt
- 《C语言程序设计》课程电子教案(PPT课件讲稿)第六章 函数.ppt
- “互联网+”与“+互联网”(PPT讲稿).pptx
- 《Computer Networking:A Top Down Approach》英文教材教学资源(PPT课件讲稿,6th edition)Chapter 6 无线和移动网络 Wireless and Mobile Networks.ppt
- 面向服务的业务流程管理(PPT讲稿)Introduction to Business Process Management(BPM).pptx
- 清华大学:《计算机网络》课程教学资源(PPT课件讲稿)Lecture 4 Routing.pptx
- 北京航空航天大学:Graph Search - a New Paradigm for Social Computing.pptx
- 西南民族大学:《软件需求分析与总体设计》课程教学资源(PPT课件讲稿)软件总体(概要)设计.ppt
- 东南大学:《数据结构》课程教学资源(PPT课件讲稿)第五章 树(主讲:方效林).ppt
- 中国科学技术大学:《网络信息安全 NETWORK SECURITY》课程教学资源(PPT课件讲稿)第十章 入侵检测系统(主讲:肖明军).ppt
- 中国科学技术大学:QuickPass系统的排队问题(PPT讲座,谢瑶).ppt
- 《工程计算软件》课程教学资源(PPT课件讲稿)第四章 Maple简介.ppt
- 山东大学:《微机原理及单片机接口技术》课程教学资源(PPT课件讲稿)第六章 中断(主讲:刘忠国).ppt
- 中国传媒大学(北京广播学院):《计算机网络》课程教学资源(PPT课件讲稿)第五章 网络层 The Network Layer.ppt
- Introduction to XML IR(PPT讲稿).ppt
- 《计算机系统》课程教学资源(PPT课件讲稿)第六章 设备管理 Devices Management.ppt
- 《Excel实用技术基础》课程教学资源(PPT课件讲稿)Excel 技术基础、数据管理.ppt
- 南京航空航天大学:《C++程序设计》课程教学资源(PPT课件)第1章 C++程序设计基础(主讲:陈哲).ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第6章 总线结构.ppt
- 四川大学:Object-Oriented Design and Programming(Java,PPT课件)Advanced Class Design.ppt
- 香港科技大学:Latent Tree Models Part III:Learning Algorithms.pptx
- 《多媒体教学软件设计》课程教学资源(PPT课件讲稿)第3章 多媒体教学软件开发平台(Authorware).ppt
- 河南中医药大学(河南中医学院):《网络技术实训》课程教学资源(PPT课件讲稿)第9讲 通过VPN访问企业网内部服务器设计讨论.pptx
- 四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 2 Operating System Overview.ppt
- 《数据结构 Data Structure》课程教学资源(PPT课件讲稿)第三章 栈和队列.ppt