Encryption Switching Protocols Revisited: Switching Modulo $p$
Langue
en
Communication dans un congrès
Ce document a été publié dans
37th International Cryptology Conference, 37th International Cryptology Conference, CRYPTO 2017, 2017-08-20, Santa Barbara. 2017, vol. LNCS, n° 10401, p. 255-287
Résumé en anglais
At CRYPTO 2016, Couteau, Peters and Pointcheval introduced a new primitive called encryption switching protocols, allowing to switch ciphertexts between two encryption schemes. If such an ESP is built with two schemes that ...Lire la suite >
At CRYPTO 2016, Couteau, Peters and Pointcheval introduced a new primitive called encryption switching protocols, allowing to switch ciphertexts between two encryption schemes. If such an ESP is built with two schemes that are respectively additively and multiplica-tively homomorphic, it naturally gives rise to a secure 2-party computation protocol. It is thus perfectly suited for evaluating functions, such as multivariate polynomials, given as arithmetic circuits. Couteau et al. built an ESP to switch between Elgamal and Paillier encryptions which do not naturally fit well together. Consequently, they had to design a clever variant of Elgamal over Z/nZ with a costly shared decryption. In this paper, we first present a conceptually simple generic construction for encryption switching protocols. We then give an efficient instantiation of our generic approach that uses two well-suited protocols, namely a variant of Elgamal in Z/pZ and the Castagnos-Laguillaumie encryption which is additively homomorphic over Z/pZ. Among other advantages, this allows to perform all computations modulo a prime p instead of an RSA modulus. Overall, our solution leads to significant reductions in the number of rounds as well as the number of bits exchanged by the parties during the interactive protocols. We also show how to extend its security to the malicious setting.< Réduire
Mots clés en anglais
Malicious adversary
Homomorphic encryption
Encryption switching protocols
Two-party computation
Project ANR
AppLicAtions de la MalléaBIlité en Cryptographie - ANR-16-CE39-0006
Origine
Importé de halUnités de recherche