Homomorphic Encryption for Multiplications and Pairing Evaluation
hal.structure.identifier | Arithmetic and Computing [ARIC] | |
dc.contributor.author | LAGUILLAUMIE, Fabien | |
hal.structure.identifier | Institut de Mathématiques de Bordeaux [IMB] | |
dc.contributor.author | CASTAGNOS, Guilhem | |
dc.contributor.editor | Ivan Visconti and Roberto De Prisco | |
dc.date.accessioned | 2024-04-04T02:23:42Z | |
dc.date.available | 2024-04-04T02:23:42Z | |
dc.date.issued | 2012 | |
dc.date.conference | 2012-09 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/189756 | |
dc.description.abstractEn | We propose a generic approach to design homomorphic encryption schemes, which extends Gj\o steen's framework. From this generic method, we deduce a new homomorphic encryption scheme in a com\-posite-order subgroup of points of an elliptic curve which admits a pairing $e: \G\times \G \rightarrow \G_t$. This scheme has some interesting theoretical and practical properties: it allows an arbitrary number of multiplications in the groups $\G$ \emph{and} $\G_t$, \emph{as well as} a pairing evaluation on the underlying plaintexts. We prove the semantic security under chosen plaintext attack of our scheme under a generalized subgroup membership assumption, and we also prove that it \emph{cannot} achieve {\sf ind-cca1} security. We eventually propose an original application to shared decryption. On the theoretical side, this scheme is an example of cryptosystem which can be naturally implemented with groups of prime order, as the homomorphic properties require only a \emph{projecting} pairing using Freeman's terminology. However the application to shared decryption also relies on the fact that the pairing is \emph{cancelling} and therefore does not survive this conversion. | |
dc.language.iso | en | |
dc.title.en | Homomorphic Encryption for Multiplications and Pairing Evaluation | |
dc.type | Communication dans un congrès | |
dc.subject.hal | Informatique [cs]/Cryptographie et sécurité [cs.CR] | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.conference.title | Security and Cryptography for Networks - 8th International Conference, SCN 2012 | |
bordeaux.country | IT | |
bordeaux.conference.city | Amalfi | |
bordeaux.peerReviewed | oui | |
hal.identifier | hal-00763110 | |
hal.version | 1 | |
hal.invited | non | |
hal.proceedings | oui | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//hal-00763110v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2012&rft.au=LAGUILLAUMIE,%20Fabien&CASTAGNOS,%20Guilhem&rft.genre=unknown |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |