中国高校课件下载中心 》 教学资源 》 大学文库

Homomorphic Secret Sharing:Low-End HSS from OWF、HSS for Branching Programs from DDH、The HSS Construction

文档信息
资源类别:文库
文档格式:PPSX
文档页数:76
文件大小:7.31MB
团购合买:点击进入团购
内容简介
Homomorphic Secret Sharing:Low-End HSS from OWF、HSS for Branching Programs from DDH、The HSS Construction
刷新页面文档预览

Homomorphic Secret Sharing Yuval Isha Technion European Research erc council Crypto Innovation School, November 2018

Homomorphic Secret Sharing Yuval Ishai Technion Crypto Innovation School, November 2018

1970 Primitives Assumptions PKE 1980 Signatures ZK OT Factoring Discrete Log 1990 Secure computation 2000 RILP 2010 CRYPTO

1970 1980 1990 2000 2010 PKE Secure Computation ZK Primitives Signatures Assumptions OT Factoring Discrete Log

1970 Primitives Assumptions PKE 1980 Signatures ZK OT Factoring Discrete Log 1990 Secure computation 2000 Minimize communication? Minimize interaction? 2010 Minimize local computation?

1970 1980 1990 2000 2010 PKE Secure Computation ZK Primitives Signatures Assumptions OT • Minimize communication? • Minimize interaction? • Minimize local computation? Factoring Discrete Log

1970 Primitives Assumptions PKE 1980 Signatures ZK OT Factoring Discrete Log 1990 Secure computation 2000 IBE ABE Bilinear Maps 2010 FHE Lattices FE

1970 1980 1990 2000 2010 Secure Computation ZK Primitives Signatures Assumptions OT Factoring Discrete Log FE IO IBE ABE Bilinear Maps FHE Lattices PKE

Fully Homomorphic encryption [RAD79, Gen09 (x) Function sk Dec Priva [P(X) Compactness Eval Dec<< P E Enc

Fully Homomorphic Encryption [RAD79,Gen09] Dec P(x) sk [x] Enc x pk Eval [P(x)] P Compactness: |Dec|<< |P| Function Privacy sk

State of the fhe The good Huge impact on the field -Solid 1 Given a generic group G Unconditionally secure PKE and even secure computation -Major. Not known to be helpful for FHE The not so goo Narrow set of assumptions and underlying structures all related to lattices Susceptible to lattice reduction attacks and other attacks Concrete efficiency still leaves much to be desired

State of the FHE • The good – Huge impact on the field – Solid foundations [BV11,GSW13,…] – Major progress on efficiency [BGV12,HS15,DM15,CGGI16,…] • The not so good – Narrow set of assumptions and underlying structures, all related to lattices • Susceptible to lattice reduction attacks and other attacks – Concrete efficiency still leaves much to be desired Given a generic group G: • Unconditionally secure PKE and even secure computation • Not known to be helpful for FHE

THERE HAS GOT TOBEA IN SOME SENSE FFERENT WAY

IN SOME SENSEDIFFERENT

Recall: ehe (x) sk Dec [P(x)] Eval E Enc

Recall: FHE Dec P(x) sk [x] Enc x pk Eval [P(x)] P

“1/2FHE sk Dec [P(x)]1 [P(×)]2 Eval Eval computationally computationally hi Ides x hides x Enc

“1/2 FHE” Dec P(x) sk [x]1 Enc x pk Eval [P(x)]1 P Eval [P(x)]2 P [x]2 computationally hides x computationally hides x

2-Party) Homomorphic Secret Sharing [P(x)]1 [P(×)]2 Eval Eval Share

(2-Party) Homomorphic Secret Sharing Dec P(x) [x]1 Share x Eval [P(x)]1 P Eval [P(x)]2 P [x]2 

刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档