Ilaria Chillotti , Emmanuela Orsini , Peter Scholl , Barry Van Leeuwen
{"title":"Scooby:基于 FHE 的改进型多方同态秘密共享","authors":"Ilaria Chillotti , Emmanuela Orsini , Peter Scholl , Barry Van Leeuwen","doi":"10.1016/j.ic.2023.105133","DOIUrl":null,"url":null,"abstract":"<div><p>In this paper we present new constructions of multi-party homomorphic secret sharing (HSS) based on a new primitive that we call <em>homomorphic encryption with decryption to shares</em> (HEDS). Our first scheme, which we call <span><math><mi>Scooby</mi></math></span>, is based on many popular fully homomorphic encryption (FHE) schemes with a linear decryption property. <span><math><mi>Scooby</mi></math></span> achieves an <em>n</em>-party HSS for general circuits with complexity <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>F</mi><mo>|</mo><mo>+</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span>, as opposed to <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>⋅</mo><mo>|</mo><mi>F</mi><mo>|</mo><mo>)</mo></math></span> for the prior best construction based on multi-key FHE. <span><math><mi>Scooby</mi></math></span> relies on a trusted setup procedure, and can be based on (ring)-LWE with a super-polynomial modulus-to-noise ratio. In our second construction, <span><math><mi>Scrappy</mi></math></span>, assuming any generic FHE plus HSS for NC1-circuits, we obtain a HEDS scheme which does not require a super-polynomial modulus. While these schemes all require FHE, in another instantiation, <span><math><mi>Shaggy</mi></math></span>, we show how it is also possible to obtain multi-party HSS without FHE, instead relying on the DCR assumption to obtain 4-party HSS for constant-degree polynomials.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105133"},"PeriodicalIF":0.8000,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Scooby: Improved multi-party homomorphic secret sharing based on FHE\",\"authors\":\"Ilaria Chillotti , Emmanuela Orsini , Peter Scholl , Barry Van Leeuwen\",\"doi\":\"10.1016/j.ic.2023.105133\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>In this paper we present new constructions of multi-party homomorphic secret sharing (HSS) based on a new primitive that we call <em>homomorphic encryption with decryption to shares</em> (HEDS). Our first scheme, which we call <span><math><mi>Scooby</mi></math></span>, is based on many popular fully homomorphic encryption (FHE) schemes with a linear decryption property. <span><math><mi>Scooby</mi></math></span> achieves an <em>n</em>-party HSS for general circuits with complexity <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>F</mi><mo>|</mo><mo>+</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span>, as opposed to <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>⋅</mo><mo>|</mo><mi>F</mi><mo>|</mo><mo>)</mo></math></span> for the prior best construction based on multi-key FHE. <span><math><mi>Scooby</mi></math></span> relies on a trusted setup procedure, and can be based on (ring)-LWE with a super-polynomial modulus-to-noise ratio. In our second construction, <span><math><mi>Scrappy</mi></math></span>, assuming any generic FHE plus HSS for NC1-circuits, we obtain a HEDS scheme which does not require a super-polynomial modulus. While these schemes all require FHE, in another instantiation, <span><math><mi>Shaggy</mi></math></span>, we show how it is also possible to obtain multi-party HSS without FHE, instead relying on the DCR assumption to obtain 4-party HSS for constant-degree polynomials.</p></div>\",\"PeriodicalId\":54985,\"journal\":{\"name\":\"Information and Computation\",\"volume\":\"297 \",\"pages\":\"Article 105133\"},\"PeriodicalIF\":0.8000,\"publicationDate\":\"2023-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information and Computation\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0890540123001360\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information and Computation","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0890540123001360","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Scooby: Improved multi-party homomorphic secret sharing based on FHE
In this paper we present new constructions of multi-party homomorphic secret sharing (HSS) based on a new primitive that we call homomorphic encryption with decryption to shares (HEDS). Our first scheme, which we call , is based on many popular fully homomorphic encryption (FHE) schemes with a linear decryption property. achieves an n-party HSS for general circuits with complexity , as opposed to for the prior best construction based on multi-key FHE. relies on a trusted setup procedure, and can be based on (ring)-LWE with a super-polynomial modulus-to-noise ratio. In our second construction, , assuming any generic FHE plus HSS for NC1-circuits, we obtain a HEDS scheme which does not require a super-polynomial modulus. While these schemes all require FHE, in another instantiation, , we show how it is also possible to obtain multi-party HSS without FHE, instead relying on the DCR assumption to obtain 4-party HSS for constant-degree polynomials.
期刊介绍:
Information and Computation welcomes original papers in all areas of theoretical computer science and computational applications of information theory. Survey articles of exceptional quality will also be considered. Particularly welcome are papers contributing new results in active theoretical areas such as
-Biological computation and computational biology-
Computational complexity-
Computer theorem-proving-
Concurrency and distributed process theory-
Cryptographic theory-
Data base theory-
Decision problems in logic-
Design and analysis of algorithms-
Discrete optimization and mathematical programming-
Inductive inference and learning theory-
Logic & constraint programming-
Program verification & model checking-
Probabilistic & Quantum computation-
Semantics of programming languages-
Symbolic computation, lambda calculus, and rewriting systems-
Types and typechecking