Ijcnis V9 N5 6
Ijcnis V9 N5 6
Homomorphic Cryptosystem
Alisha Rohilla
Department of Computer Science and Engineering & Information Technology, the NorthCap University Gurugram,
122002, India
E-mail: alisha15csp001@ncuindia.edu
=[ ]
Where is a real number, then is a homomorphism Now using the equation (1), can be
of rings, written as
=[ ]=[ ]+[ ]
= (1)
Example 2:
The above expression shows that preserves additive Consider a set of natural numbers with
homomorphism. multiplication operation.
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51
Homomorphic Cryptosystem 45
Encryption
With Public key Bob follows the following
Any function which preserves multiplication
steps to encrypt plain text.
homomorphism should have the property stated in
Chooses a random , calculates
equation (2)
(6)
}
Calculates a shared secret
Now using the equation (2), can be written
as (7)
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51
46 Homomorphic Cryptosystem
,
(12)
(13)
Decryption We have
(14) .
Key Generation
Let
Where C. Additive Homomorphic Encryption
Thus,
Let , where 1) Paillier Encryption Scheme: Paillier Cryptosystem
is a probabilistic asymmetric key encryption
scheme which uses different pairs of public and
private key to encrypt and decrypt any plaintext.
Public Key: Paillier cryptosystem depends on a random element
Private Key: for encryption per message bit.
Key Generation
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51
Homomorphic Cryptosystem 47
Calculate
Decryption
(16)
( )
Select generator , such that ,
Calculate
Homomorphic Property
,
Paillier Cryptosystem holds the property of additive
where . homomorphism.
This function is only used on input values u that The product of two ciphers gives the sum of their
actually satisfy u = 1 mod n [6]. corresponding plaintexts on decryption.
Public Key: ( )
Private Key: (20)
Encryption
Plaintext, where III. FULLY HOMOMORPHIC ENCRYPTION
Select random where Let (P,C,K,E,D) be an encryption scheme where [2][11]
Compute cipher text as:
P: Plaintext
(18) C: Ciphertext
Decryption K: Keyspace
E: Encryption Algorithm
As implied from equation (18), D: Decryption Algorithm.
Cipher text
Compute message: Assume that the plaintexts form a ring
and the ciphertexts form a ring
(19) the encryption algorithm is a map from
the ring to , i.e. ,
Paillier Encryption Scheme can be illustrated using the
following example (5). ,
Example 5:
where is either a secret key or a public key .
Key Generation For all and in and k in , if
Let
(21)
(22)
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51
48 Homomorphic Cryptosystem
The classification of fully homomorphic encryption is in equation (24) can be considered an image of
depicted in Fig. 2. Corresponding definitions and evaluation.
explanation about each classification can be found in the
a) Strict Decryption
following subheadings.
1) – Evaluation Policy Any –evaluation policy (
is said to correctly decrypt if for all ,
Let be a set of circuits. A –evaluation policy for
is a tuple of probabilistic polynomial–time algorithms
such that: [ ] , (25)
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51
Homomorphic Cryptosystem 49
( ) And
(28)
=
Example 6:
Suppose p ; bit to encrypt ,
Then ,
where
Now to decrypt it back to m, However, it has been seen that while using the fully
homomorphic property to evaluate a Boolean function
where , given , the
encryption of , for
As the number of the additions and multiplications in
the Boolean function grow so does the size of the noise
Property of Fully Homomorphic Encryption component in the resultant cipher text. Consequently
Suppose we have two cipher texts, the size of the noise component is proportional to the
number of operations.
And hence only low-degree Boolean functions
(circuits) can be evaluated over encrypted data.
This is the reason this scheme is termed Somewhat
Homomorphic.
a) Compactness
And
Now, (34)
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51
50 Homomorphic Cryptosystem
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51
Homomorphic Cryptosystem 51
How to cite this paper: Alisha Rohilla, Mehak Khurana, Meena Kumari,"Homomorphic Cryptosystem", International
Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.5, pp. 44-51, 2017.DOI:
10.5815/ijcnis.2017.05.06
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 5, 44-51