Fully homomorphic encryption (FHE) allows arbitrary computations on encrypted data. The standard security requirement, IND-CPA security, ensures that the encrypted data remain private. However, it does not guarantee privacy for the computation performed on the encrypted data. Statistical circuit privacy offers a strong privacy guarantee for the computation process, namely that a homomorphically evaluated ciphertext does not leak any information on how the result of the computation was obtained. Malicious statistical circuit privacy requires this to hold even for maliciously generated keys and ciphertexts. Ostrovsky, Paskin and Paskin (CRYPTO 2014) constructed an FHE scheme achieving malicious statistical circuit privacy.
Their construction, however, makes non-black-box use of a specific underlying FHE scheme, resulting in a circuit-private scheme with inherently high overhead.
This work presents a conceptually different construction of maliciously circuit-private FHE from simple information-theoretical principles. Furthermore, our construction only makes black-box use of the underlying FHE scheme, opening the possibility of achieving practically efficient schemes. Finally, in contrast to the OPP scheme in our scheme, pre- and post-homomorphic ciphertexts are syntactically the same, enabling new applications in multi-hop settings.
History
Preferred Citation
Nico Döttling and Jesko Dujmovic. Maliciously Circuit-Private FHE from Information-Theoretic Principles. In: Conference on Information-Theoretic Cryptography (ITC). 2022.
Primary Research Area
Algorithmic Foundations and Cryptography
Name of Conference
Conference on Information-Theoretic Cryptography (ITC)
Legacy Posted Date
2022-05-09
Open Access Type
CC
BibTeX
@inproceedings{cispa_all_3677,
title = "Maliciously Circuit-Private FHE from Information-Theoretic Principles",
author = "Döttling, Nico and Dujmovic, Jesko",
booktitle="{Conference on Information-Theoretic Cryptography (ITC)}",
year="2022",
}