Netinfo Security ›› 2023, Vol. 23 ›› Issue (4): 51-60.doi: 10.3969/j.issn.1671-1122.2023.04.006

Previous Articles     Next Articles

An Efficient Versatile Homomorphic Encryption Framework Based on Ciphertext Conversion Technique

DU Weidong1,2, LI Min1(), HAN Yiliang2, WANG Xu’an2   

  1. 1. College of War Support, Rocket Force University of Engineering, Xi’an 710025, China
    2. College of Cryptography, Engineering University of PAP, Xi’an 710086, China
  • Received:2022-12-16 Online:2023-04-10 Published:2023-04-18
  • Contact: LI Min E-mail:proflimin@163.com

Abstract:

Designing homomorphic encryption schemes to match the specific characteristics of different application algorithms is a key way to design efficient algorithms with privacy-preserving features. Firstly, the article designed a coefficient encoding-based RLWE homomorphic encryption scheme for deep learning prediction in which polynomial operations require only ciphertext-ciphertext addition and constant-ciphertext multiplication, using the polynomial vector space as the plaintext space Then a general homomorphic encryption framework supporting both polynomial and non-polynomial operations was constructed based on this scheme, which can perform polynomial operations on the RLWE ciphertext, extract the LWE ciphertext from the RLWE ciphertext, and perform non-polynomial operations by the looking up method. Finally, the LWE ciphertext was repackaged into RLWE ciphertext using the ciphertext conversion method to facilitate subsequent polynomial operations. The verification experimental results show that the RLWE ciphertext message capacity of the proposed framework is increased by a factor of 1 and the polynomial operation efficiency is increased by a factor of 1 compared with the newly proposed general homomorphic encryption framework PEGASUS. Besides, it does not need to convert the encodings in the ciphertext in non-polynomial evaluations, and it can repack LWE ciphertexts by only performing automorphism operations. Thus, our framework is more efficient in communication and computation.

Key words: polynomial operations, non-polynomial operations, homomorphic encryption framework, privacy protection

CLC Number: