Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing

  • Conference paper
  • First Online:
Web Information Systems and Applications (WISA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12999))

Included in the following conference series:

Abstract

Cloud computing, a modern application that is very commonly utilized, has garnered considerable interest from researchers and developers. Data privacy security is the most urgent issue related to cloud computing. Studies have shown that fully homomorphic encryption (FHE) technology, which is related to traditional encryption and ciphertext evaluation, is an effective way of securing privacy in the cloud. This study proposes a policy-based, multi-user, FHE algorithm (PB-MUFHE) that accounts for user diversity in the cloud environment, in which, the encrypted data is set under an appropriate access policy, the key to which is a set attribute. Not only is homomorphic evaluation supported for ciphertexts among several users, but also fine-grained access control and sharing between users are supported. The security of the PB-MUFHE scheme was tested based on learning with errors (LWE) problems, and IND-CPA security analysis in the generic bilinear group random oracle model further verified the proposed algorithm’s effectiveness. Performance assessment demonstrated that, PB-MUFHE can efficiently implement fully homomorphic evaluation of ciphertext, and effectively support access control and shared multi-user capability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 79.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 99.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wu, Y., Lin, N., Song, W., et al.: Adaptive authorization access method for medical cloud data based on attribute encryption. In: Ni, W., Wang, X., Song, W., Li, Y. (eds.) WISA 2019. LNCS, vol. 11817, pp. 361–367. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30952-7_36

    Chapter  Google Scholar 

  2. Craig, G.C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Syposium on Theory of Computing, pp. 169–178. ACM, New York (2009)

    Google Scholar 

  3. Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_29

    Chapter  Google Scholar 

  4. Coron, J.S., Lepoint, T., Tibouchi, M.: Batch fully homomorphic encryption over the integers. In: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 315–335, Springer Verlag, Athens (2013). https://doi.org/10.1007/978-3-642-38348-9_20

  5. Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard)LWE. In: Proceedings of the 52nd Annual Symposium on Foundations of Computer Science, pp. 97–106, IEEE, Washington (2011)

    Google Scholar 

  6. Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme. In: Stam, Martijn (ed.) IMACC 2013. LNCS, vol. 8308, pp. 45–64. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45239-0_4

    Chapter  Google Scholar 

  7. Feng, Y.S., Ma, H., Chen, X.F.: Efficient and verifiable outsourcing scheme of sequence comparisons. Intellig. Automat. Soft Comput. 21(1), 51–63 (2015)

    Article  Google Scholar 

  8. Lin, H.X.: Leveled certificateless fully homomorphic encryption schemes from learning with errors. IEEE Access 8, 26749–26763 (2020)

    Article  Google Scholar 

  9. Peikert, C., Shiehian, S.: Multi-key FHE from LWE, revisited. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9986, pp. 217–238. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53644-5_9

    Chapter  Google Scholar 

  10. Li, Z., Ma, C., Zhou, H.: Multi-key FHE for multi-bit messages. Sci. China Inf. Sci. 61(2), 029101:1-029101:3 (2018)

    MathSciNet  Google Scholar 

  11. Clear, M., McGoldrick, C.: Multi-identity and multi-key leveled FHE from learning with errors. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 630–656. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48000-7_31

    Chapter  Google Scholar 

  12. Clear, M., McGoldrick, C.: Bootstrappable identity-based fully homomorphic encryption. cryptology and network security. In: 13th International Conference on Cryptology and Network Security, pp. 1–14, Springer Verlag, Heraklion (2014)

    Google Scholar 

  13. Wang, F., Wang, K., Li, B.: An Efficient Leveled Identity-Based FHE. LNCS, pp. 303–315. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25645-0_20

    Book  Google Scholar 

  14. Hu, M., Ye, Q., Tang, Y.: Efficient batch identity-based fully homomorphic encryption scheme in the standard model. IET Inf. Secur. 12(6), 475–483 (2018)

    Article  Google Scholar 

  15. Luo, F., Wang, K., Lin, C.: Leveled hierarchical identity-based fully homomorphic encryption from learning with rounding. In: 14th International Conference on Information Security Practice and Experience, pp. 101–115, Springer Verlag, Tokyo (2018)

    Google Scholar 

  16. Shen, T., Wang, F., Chen, K., et al.: Efficient leveled (multi) identity-based fully homomorphic encryption schemes. IEEE Access 7, 79299–79310 (2019)

    Article  Google Scholar 

  17. Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40041-4_5

    Chapter  Google Scholar 

  18. Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology – CRYPTO 2012, pp. 868–886. Springer Berlin Heidelberg, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_50

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taoshen Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, T., Liu, Q., Huang, R. (2021). Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing. In: **ng, C., Fu, X., Zhang, Y., Zhang, G., Borjigin, C. (eds) Web Information Systems and Applications. WISA 2021. Lecture Notes in Computer Science(), vol 12999. Springer, Cham. https://doi.org/10.1007/978-3-030-87571-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87571-8_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87570-1

  • Online ISBN: 978-3-030-87571-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation