Homomorphic encryption: From private-key to public-key

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We show how to transform any additively homomorphic private-key encryption scheme that is compact, into a public-key encryption scheme. By compact we mean that the length of a homomorphically generated encryption is independent of the number of ciphertexts from which it was created. We do not require anything else on the distribution of homomorphically generated encryptions (in particular, we do not require them to be distributed like real ciphertexts). Our resulting public-key scheme is homomorphic in the following sense. If the private-key scheme is i+1-hop homomorphic with respect to some set of operations then the public-key scheme we construct is i-hop homomorphic with respect to the same set of operations.

Original languageEnglish
Title of host publicationTheory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Proceedings
Pages219-234
Number of pages16
DOIs
StatePublished - 2011
Externally publishedYes
Event8th Theory of Cryptography Conference, TCC 2011 - Providence, RI, United States
Duration: 28 Mar 201130 Mar 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6597 LNCS

Conference

Conference8th Theory of Cryptography Conference, TCC 2011
Country/TerritoryUnited States
CityProvidence, RI
Period28/03/1130/03/11

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Homomorphic encryption: From private-key to public-key'. Together they form a unique fingerprint.

Cite this