On the Homomorphic Computation of Symmetric Cryptographic Primitives

作者: Silvia Mella , Ruggero Susella

DOI: 10.1007/978-3-642-45239-0_3

关键词:

摘要: We present an analysis on the homomorphic computability of different symmetric cryptographic primitives, with goal understanding their characteristics respect to evaluation according BGV scheme. Specifically, we start from framework presented by Gentry, Halevi and Smart for evaluating AES. provide improvement it, then perform a detailed computation algorithms families Salsa20 stream cipher, SHA-256 hash function Keccak sponge function. After analysis, report performance results primitives have implemented using recently released HElib. In conclusions discuss our findings analyzed draw general conclusion primitives.

参考文章(29)
Stefan Lucks, Jon Callas, The Skein Hash Function Family ,(2009)
Ronald L Rivest, Len Adleman, Michael L Dertouzos, ON DATA BANKS AND PRIVACY HOMOMORPHISMS ,(1978)
Jean-Philippe Aumasson, Willi Meier, Luca Henzen, Raphael C.-W. Phan, SHA-3 proposal BLAKE ,(2009)
Zvika Brakerski, Vinod Vaikuntanathan, Fully homomorphic encryption from ring-LWE and security for key dependent messages international cryptology conference. pp. 505- 524 ,(2011) , 10.1007/978-3-642-22792-9_29
Daniel J. Bernstein, The Salsa20 Family of Stream Ciphers New Stream Cipher Designs. ,vol. 4986, pp. 84- 97 ,(2008) , 10.1007/978-3-540-68351-3_8
Carolyn Whitnall, Elisabeth Oswald, A comprehensive evaluation of mutual information analysis using a fair evaluation framework international cryptology conference. ,vol. 2011, pp. 316- 334 ,(2011) , 10.1007/978-3-642-22792-9_18
Jens Groth, Aggelos Kiayias, Helger Lipmaa, Multi-query computationally-private information retrieval with constant communication rate public key cryptography. pp. 107- 123 ,(2010) , 10.1007/978-3-642-13013-7_7
Joan Daemen, Vincent Rijmen, The Block Cipher Rijndael Lecture Notes in Computer Science. pp. 277- 284 ,(2000) , 10.1007/10721064_26
N. P. Smart, F. Vercauteren, Fully homomorphic encryption with relatively small key and ciphertext sizes public key cryptography. pp. 420- 443 ,(2010) , 10.1007/978-3-642-13013-7_25