On constructing homomorphic encryption schemes from coding theory

  • Frederik Armknecht
  • , Daniel Augot
  • , Ludovic Perret
  • , Ahmad Reza Sadeghi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We introduce a generic construction principle for homomorphic encryption schemes based on coding theory These possess several non-standard positive features. First, they are not restricted to linear homomorphism but allow for evaluating multivariate polynomials up to a fixed (but arbitrary) degree μ on encrypted field elements. Second, they can be instantiated with various error correcting codes, even for codes with poor correcting capabilities. Third, depending on the deployed code, one can achieve very efficient schemes. As a concrete example, we present an instantiation based on Reed-Muller codes where for μ = 2 and μ = 3 and security levels between 80 and 128 bits, all operations take less than a second (after some pre-computation). However, our analysis reveals also limitations on this approach. For structural reasons, such schemes cannot be public-key, allow for a limited number of fresh encryptions only, and cannot be combined with the bootstrapping technique. We argue why such schemes are nonetheless useful in certain application scenarios and discuss possible directions on how to overcome these issues.

Original languageEnglish
Title of host publicationCryptography and Coding - 13th IMA International Conference, IMACC 2011, Proceedings
Pages23-40
Number of pages18
DOIs
Publication statusPublished - 23 Dec 2011
Externally publishedYes
Event13th IMA International Conference on Cryptography and Coding, IMACC 2011 - Oxford, United Kingdom
Duration: 12 Dec 201115 Dec 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7089 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th IMA International Conference on Cryptography and Coding, IMACC 2011
Country/TerritoryUnited Kingdom
CityOxford
Period12/12/1115/12/11

Keywords

  • Coding Theory
  • Efficiency
  • Homomorphic Encryption
  • Provable Security

Fingerprint

Dive into the research topics of 'On constructing homomorphic encryption schemes from coding theory'. Together they form a unique fingerprint.

Cite this