Additively Homomorphic Encryption with d-Operand Multiplications [chapter]

Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
2010 Lecture Notes in Computer Science  
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rivest, Adleman and Dertouzos in 1978. In this work we define a theoretical object, chained encryption schemes, which allow an efficient evaluation of polynomials of degree d over encrypted data. Chained encryption schemes are generically constructed by concatenating cryptosystems with the appropriate homomorphic
more » ... s; such schemes are common in lattice-based cryptography. As a particular instantiation we propose a chained encryption scheme whose IND-CPA security is based on a worst-case/average-case reduction from uSVP.
doi:10.1007/978-3-642-14623-7_8 fatcat:6bcz3p22ybdq3authmbdufs4gu