Computer Science ›› 2018, Vol. 45 ›› Issue (11): 169-175.doi: 10.11896/j.issn.1002-137X.2018.11.026

• Information Security • Previous Articles     Next Articles

Homomorphic Evaluation of Lightweight Block Cipher over Integers

MAO He-feng, HU Bin   

  1. (Information Engineering University,Zhengzhou 450001,China)
  • Received:2017-10-16 Published:2019-02-25

Abstract: Based on the fully homomorphic encryption DGHV scheme proposed by Gentry et al.in EUROCRYPT 2010 and the technology of batch,this paper presented a homomorphic evaluation method of lightweight block cipher SIMON circuit by state-wise bitslicing,and proposed a representation called half-byte-wise bitslicing.On this basis,this paper provided the implementation method of half-byte-wise bitslicing homomorphic evaluation of PRINCE circuit.Lastly,this paper compared PRINCE,SIMON-64/128,SIMON-128/256 with AES-128 with respect to the homomorphic operations,and analyzed the counts of homomorphic evaluation of different block cipher circuits and different implementation methods.

Key words: Fully homomorphic encryption, Homomorphic evaluation, PRINCE circuit, SIMON circuit

CLC Number: 

  • TN918.1
[1]RIVEST R L,ADLEMAN L,DERTOUZOS M L.On data banks and privacy homomorphisms [J].Foundations of Secure Computation,1978,4(11):169-180.
[2]GENTRY C.Fully homomorphic encryption using ideal lattices [C]∥Proc. of the 41st ACM Symposium on Theory of Computing.New York:ACM Press,2009:169-178.
[3]BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le- veled) fully homomorphic encryption without bootstrapping [J].ACM Transactions on Computation Theory(TOCT),2014,6(3):13.
[4]VAN DIJK M,GENTRY C,HALEVI S,et al.Fully homomorphic encryption over the integers [M]∥Advances in Cryptology-EUROCRYPT 2010.Berlin:Springer,2010:24-43.
[5]GENTRY C,SAHAI A,WATERS B.Homomorphic encryption from learning with errors:Conceptually-simpler,asymptotically-faster,attribute-based [M]∥Advances in Cryptology—CRYPTO 2013.Berlin:Springer,2013:75-92.
[6]NAEHRIG M,LAUTER K,VAIKUNTANATHAN V.Can homomorphic encryption be practical? [C]∥Proc. of the 3rd ACM Workshop on Cloud Computing Security Workshop.New York:ACM Press,2011:113-124.
[7]GENTRY C,HALEVI S,SMART N.Homomorphic evaluation of the AES circuit [M]∥Advances in Cryptology-CRYPTO 2012.Berlin:Springer,2012:850-867.
[8]CORON J S,LEPOINT T,TIBOUCHI M,et al.Batch fully homomorphic encryption over the integers [C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2013:315-335.
[9]CORON J S,LEPOINT T,TIBOUCHI M.Scale-invariant fully homomorphic encryption over the integers [J].IIar Journal,2014,50(4):361-372.
[10]BIHAM E.A fast new DES implementation in software [C]∥International Conference Fast Software Encryption.1997:260-271.
[11]KASPER E,SCHWABE P.Faster and timing-attack resistant AES-GCM∥Cryptographic Hardware and Embedded Systems-CHES.2009:1-17.
[12]BEAULIEU R,SHORS D,SMITH J,et al.The SIMON and SPECK families of lightweight block ciphers [EB/OL].IACR Cryptology ePrint Archive.http://eprint.iacr.org/2013/404.pdf.
[13]SMART N P,VERCAUTEREN F.Fully homomorphic SIMD operations [J].Designs,Codes and Cryptography,2014,71(1):1-25.
[14]BORGHOFF J,CANTEAUT A,GüNEYSU T,et al.PRINCE-A Low-latency Block Cipher for Pervasive Computing Applications [C]∥International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2012:208-225.
[1] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[2] LI Meng-tian, HU Bin. RLWE-based Fully Homomorphic Encryption Scheme with Batch Technique [J]. Computer Science, 2019, 46(3): 209-216.
[3] SHI Jing-qi, YANG Geng, SUN Yan-jun, BAI Shuang-jie and MIN Zhao-e. Efficient Parallel Algorithm of Fully Homomorphic Encryption Supporting Operation of Floating-point Number [J]. Computer Science, 2018, 45(5): 116-122.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!