Journal on Communications ›› 2021, Vol. 42 ›› Issue (3): 11-22.doi: 10.11959/j.issn.1000-436x.2021023

• Papers • Previous Articles     Next Articles

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

Ruiqi LI1,2, Chunfu JIA1,2, Yafei WANG1,2   

  1. 1 College of Cyber Science, Nankai University, Tianjin 300350, China
    2 Tianjin Key Laboratory of Network and Data Security Technology, Tianjin 300350, China
  • Revised:2020-12-16 Online:2021-03-25 Published:2021-03-01
  • Supported by:
    The National Key Research and Development Program of China(2018YFA0704703);The National Natural Science Foundation of China(61972215);The National Natural Science Foundation of China(61702399);The National Natural Science Foundation of China(61972073);The Natural Science Foundation of Tianjin(20JCZDJC00640)

Abstract:

To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was proposed based on the idea of ciphertext extension, and the corresponding homomorphic operations and relinearization procedure were designed on the basis of this new ciphertext form, so that a NTRU-based multi-key homomorphic encryption (MKHE) scheme which supported distributed decryption was constructed.Then, resorting to the idea of key switching, the re-encryption key and re-encryption procedure were put forward such that the functionality of proxy re-encryption (PRE) was integrated to this new NTRU-based MKHE scheme.The MKH-PRE scheme preserved the properties of MKHE and PRE, and had a better performance on the client side.The scheme was applied to the privacy-preserving problems in federated learning and an experiment of the application was carried out.The results demonstrate that the accuracy of learning is scarcely affected by the encryption procedure and the computational overhead of this MKH-PRE scheme is acceptable.

Key words: homomorphic encryption, proxy re-encryption, multi-key, cloud computing, federated learning

CLC Number: 

No Suggested Reading articles found!