1IntroductionFullyHomomorphicEncryptionThediscoveryoffullyhomomorphicencryptionschemesFHEhasbeenakeydevelopmentinmoderncryptographyFHEschemesallowarbitrarycomputationonencrypteddatawithoutdecryp ID: 127776
Download Pdf The PPT/PDF document "ObfuscatingMany-to-oneFunctionalRe-encry..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
ObfuscatingMany-to-oneFunctionalRe-encryption,anditsConnectiontoFully-HomomorphicEncryptionStefanoTessaroMITCSAILDavidA.WilsonMITCSAILftessaro,dwilsong@mit.eduAbstractFollowinguponitsrstconstructionbyGentry(STOC2009),fully-homomorphicencryption(FHE)hasgeneratedamultitudeofdierentworks,seekingbothfornewtheoreticalapproachesaswellasformoreecientinstantiations.AllexistingFHEschemes,however,aretightlyconnectedtospecicassumptions,andnogenericconstructionsareknown.Inthispaper,weinvestigategenericconstructionsofFHE.Specically,weintroduceanewprimitive,calledMany-to-OneFunctionalRe-encryption,whichallows,givenmultiplemessagesencryptedunderapublickeyforoneencryptionscheme,toproduceanencryptionofafunc-tionofthesemessagesunderanotherkey|possiblyforadierentencryptionscheme.Weintroduceanewnotionofobfuscationformany-to-onefunctionalre-encryption,andshowthatsuchobfuscationyieldsagenerictransformationfromasemantically-secureencryptionschemetoleveledFHE.WefurtherdemonstratethatexistingFHEschemes(boththosethatemploybootstrappingandrelinearization)canbeviewedasinstantiationsofthisparadigm. 1IntroductionFully-HomomorphicEncryption.Thediscoveryoffully-homomorphicencryptionschemes(FHE)hasbeenakeydevelopmentinmoderncryptography.FHEschemesallowarbitrarycomputationonencrypteddatawithoutdecrypting.ThenotionwasrstproposedbyRivest,Adleman,andDertouzos[ RAD78 ],butittookmorethanthreedecadesfortherstschemestobedeveloped.SeveralFHEschemeshavenowbeendeveloped,rstundersomewhatnonstandardlatticeassump-tions[ Gen09 , SV10 ],thenunderhardnessassumptionsforapproximateGCD[ vDGHV10 , CMNT11 , CNT12 ],andnallyundervariousformsoftheLearningWithErrorsassumption[ BV11b , BV11a , BGV11 , Bra12 , GHS12b , GHS12a , GSW13 ]orotherlattice-basedassumptions[ GH11 ].Atthesametime,nogeneralconstructionisknownfromsmallerprimitives,evenforthecaseofleveledFHEschemes.Ad-leveledFHEschemeallowscomputationofdepth-dcircuitsonencrypteddata,allowingitspublickeysizetobeapolynomialfunctionind.Inthispaper,weaddressthequestionofndingaprimitivewhichallowsagenericconstructionofFHEontopofasuitableencryptionscheme,andrevisitexistingworksintermsofinstantiationsofthisblueprint.Obfuscatingre-encryption.Ourapproachreliesonthenotionofobfuscatedre-encryption,whichhasbeendevelopedinparalleltoFHE.Whileobfuscationofgeneralfunctionsisimpos-sible[ BGI+01 ],therehavebeenseveralpositiveresultsdetailingfunctionfamiliesthatcanbeobfuscated(e.g.[ Wee05 , DS05 , CRV10 ],amongmanyothers).Inparticular,therehasbeenalineofresearchonobfuscationthatissecureonaverage(thatis,forarandomfunctionfromafamily),ratherthanforanyfunctioninthefamily([ GK05 , AW07 ],andothers);thisdenitionisparticularlyrelevanttocryptographicapplicationsthatuserandomizedfunctions.Hohenbergeretal[ HRSV07 ]showamethodtoobfuscateare-encryptionfunctionality{thatis,afunctionalitywhichallowsfordecryptionunderonekeyandencryptionunderasecond{suchthatthere-encryptionprocedurecanbedelegatedtoathirdpartywhodoesnotlearnanythingaboutthere-encryptedmessages.Chandranetal[ CCV12 ]extendedthisworkevenfurther,andconsiderfunctionalre-encryption,inwhichthesecondencryptionkeyisafunctionoftheunderlyingmessage,inthecontextofobfus-cationofthefunction(andhidingthemessage).However,suchfunctionalitieshavegenerallyonlybeendenedforsingle-inputfunctions.Many-to-onefunctionalre-encryption.Ourrstcontributionistointroduceanddenethenotionofmany-to-onefunctionalre-encryptionanditsobfuscation.Morespecically,forafunctionf,thisfunctionalityallowsanevaluatortotakemultipleciphertextsc1;:::;cqencryptingmessagesm1;:::;mqunderthesamekeypkforsomepublic-keycryptosystemPKE,andcomputesanencryptionoff(m1;:::;mq)underadierentkeyforsomepossiblydierentcryptosystemPKE0.Clearly,thisfunctionalityisbyitselfuninteresting,asitcanbetriviallyrealizedbydecryptingtheinputmessages,computingthefunction,andencryptingtheresult.However,thisfunctionalitybecomesinterestingifitcanbeobfuscatedandhencedelegatedtoauserwithoutrevealingthecorrespondingsecretkey.Forthisreason,wealsodeneanotionofobfuscationforthisfunction-ality,whichissubstantiallydierentthantheoneproposedbypreviousworksonre-encryption,despiteitssimilar\average-case"perspective:Atahighlevel,ourrstdenitionstatesthatforarandomcircuitcomputingthere-encryptionandforanobserverwhoknowsthepublickeyofthesourcescheme,theobfuscationofthatcircuitandthepublickeyofthetargetschemeareindis-tinguishablefromtheoutputofasimulatorthatonlyknowsthepublic-keyofthesourcescheme.Wealsoconsiderastrongernotion,wherethesimulatordoesnotsimulatethepublickeyofthetargetscheme,butobtainsitexternally.Weshowthatthelatterdenitionisinfactimpliedby2 thedenitionfrom[ HRSV07 ].FHEfrommany-to-onefunctionalre-encryption.Asoneapplicationofmany-to-onefunc-tionalencryption,oursecondcontributionistoshowagenericconstructionofleveledFHEgivenasemantically-secureencryptionschemesuchthatthecorrespondingmulti-inputfunctionalre-encryptionfunctionalitiesforacompletesetofoperations(e.g.,fortheNANDoperation)canbeobfuscatedwithrespecttothenewnotionsintroducedinthispaper.Asanapplication,weshowthatRegev-styleencryption[ Reg05 ]admitssuchobfuscatedre-encryptionformultiplication,which,combinedwithourmainresultandtheexistingadditivehomomorphismoftheencryptionyieldsalevelFHEscheme.ThisschemecorrespondstotheonerecentlyproposedbyBrakerski[ Bra12 ],forwhichweprovideamoremodularabstraction.Wealsoreinterpretthetechniqueof\bootstrapping"([ Gen09 ]andfollowupwork)asspecicimplementa-tionsofourgenericconstruction.2Preliminaries2.1Public-KeyEncryptionandSemanticSecurityWestartbyintroducingournotationtodescribepublic-keyencryptionschemes.Specically,apublic-keyencryptionschemeisatripleofalgorithmsPKE=(Gen;Enc;Dec),where:-therandomizedalgorithmGenisthekeygenerationalgorithm,whichtakesasinputthesecurityparameter1k,andoutputsapublic-key/secret-keypair(pk;sk)$ Gen(1k).-Encistherandomizedencryptionalgorithm,andDecisthedeterministicdecryptionalgo-rithm.WeassumethatPKEiscorrectifforallvalidpublic-key/secret-keypairs(pk;sk),andallmessagesm,theprobability[Dec(sk;Enc(pk;m))=m]isnegligible,wheretheprobabilityistakenovertherandomcoinsoftheencryptionalgorithmEnc.Moreover,wesaythatPKEissemanticallysecureifforallPPTdistinguishersDandallmessagesm,wehaveh(pk;sk)$ Gen(1n):D(pk;Enc(pk;m)))=1i h(pk;sk)$ Gen(1n):D(pk;Enc(pk;0)))=1inegl(n):2.2Fully-HomomorphicEncryptionAfullyhomomorphicencryption(FHE)schemeisanencryptionschemewhichallowsforarbitrarycomputationonencrypteddata.Namely,itconsistsofatupleFHE=(Gen;Enc;Dec;Eval)suchthatGenoutputsatripleofkeys(pk;sk;evk),whereevkistheadditionalevaluationkey.Thecorrectnessrequirementsfor(Gen;Enc;Dec)areasintraditionalpublic-keyencryption.Moreover,Evalistheevaluationalgorithmandissuchthatforeverycircuitfwithqinputs,andmessagesm1;:::;mq,wehaveDec(sk;Eval(evk;f;Enc(pk;m1);:::;Enc(pk;mq)))=f(m1;:::;mq);where(pk;sk;evk)$ Gen.Informally,wesaythatFHEisleveled(withdlevels),ifitonlyevaluatescircuitsofdepthd(insomewelldenedcircuitmodel),andtheparametersareallowedtodepend3 ond.Finally,wesaythatFHEissemanticallysecure,ifforallPPTdistinguishersDandallmessagesm,wehaveh(pk;sk;evk)$ Gen(1n):D(pk;evk;Enc(pk;m)))=1i h(pk;sk;evk)$ Gen(1n):D(pk;evk;Enc(pk;0)))=1inegl(n):FHEconstructionsintheliteratureinclude[ Gen09 , SV10 , vDGHV10 , CMNT11 , BV11b , BV11a , GH11 , BGV11 , Bra12 , GHS12b , CNT12 , GHS12a , GSW13 ].3Many-to-oneFunctionalRe-encryptionanditsObfuscationInthissection,weintroducethenotionofmany-to-onefunctionalre-encryption,aswellasanewnotionofobfuscationforthisfunctionalitywhich,whiletailoredatourapplications,exhibitsnaturalconnectionstopreviousnotions.3.1Many-to-oneFunctionalRe-encryptionWestartbydeningcircuitsprovidingmany-to-onefunctionalre-encryption.Inthemostgen-eralcase,wearegiventwopublic-keyencryptionschemesPKEandPKE0(wherepotentially,butnotnecessarily,PKE=PKE0).Weareinterestedinfamiliesofcircuitsfsk;pk0indexedbyvalidsecretkeysskforPKEandvalidpublickeyspk0forPKE0which,givenencryptionsofmessagesm1;:::;mqunderPKE,produceanencryptionoff(m1;:::;mq)forPKE0.Ofcourse,acanonicalimplementationofsuchcircuitsimplydecryptsc1;:::;cq,andthenre-encryptsf(m1;:::;mq)withfreshrandomness.However,wewillnotmakeanyfurtherassumptionsonthesecircuits,i.e.,theymayberandomizedornot,andwerequirethemtoworkinamoregeneralsense,whereanyqciphertextsc1;:::;cqdecryptingtom1;:::;mqunderskwillresultinaciphertextdecryptingtof(m1;:::;mq).Denition.LetPKE=(Gen;Enc;Dec)andPKE0=(Gen0;Enc0;Dec0)bepublic-keyencryptionschemes.LetMandM0bethemessagespacesofPKEandPKE0,respectively,andletf:Mq!M0beafunction.Af-re-encryptionfunctionalityfromPKEtoPKE0isafamilyof(possiblyrandomized)circuitsf=nfsk;pk0o(sk;pk0)indexedbysecretkeysskofPKEandpublickeyspk0ofPKE0suchthatforallvalidciphertextsc1;:::;cqforPKE,Dec0(sk0;Rfsk;pk0(c1;:::;cq))=f(m1;:::;mq);withoverwhelmingprobabilityovertherandomchoicesof(pk;sk)$ Gen,(pk0;sk0)$ Gen0,andf,wheremi=Dec(sk;ci)fori=1;:::;q.Withoutlossofgenerality,itwillbeconvenienttoassumethatthedescriptionofthecircuitfsk;pk0allowsonetorecoverthevalueofskandpk0eciently.Notethatinthecasewhereq=1andfistheidentity,thisnotioncorrespondstothetraditionalsettingofre-encryptionintroducedbyHohenbergeretal[ HRSV07 ].Incontrast,themoregeneralsettingoffunctionalre-encryptionintroducedbyChandranetal[ CCV12 ]isdierent,inthatitconsidersmultiplerecipientswithdierentkeypairs,andafunctionappliedtoanattributeassociatedwiththeciphertextdeterminestherecipientoftheencryption.Intheirsetting,however,notransformationisappliedtotheplaintextitself.4 3.2ObfuscationforMany-to-oneFunctionalRe-encryptionWenowdeneournewnotionofsecureobfuscationasspecicallyappliedtothemany-to-onere-encryptionregime,i.e.,toaf-re-encryptionfunctionalityffromasourceschemePKEtoatargetschemePKE0.Followingearlierworkonobfuscation[ Wee05 , DS05 , AW07 , HRSV07 , CRV10 ],wewanttheobfuscatedcircuittoperformthesamecomputationastheoriginalcircuit.However,atthesametime,wewanttoarguethatanadversarydoesnotlearnanyusefulinformationfromtheobfuscatedcircuitbeyondwhatitwouldlearnbyevaluatingitsfunctionalityinpurelyblack-boxmanner.Thislatterrequirementisdenedusingasimulation-basedapproach,incontrasttoindistinguishability-basedobfuscationasine.g.[ AW07 ].Wenotethatforthecaseofone-argumentfunctions,ournotionwilldierfromtheoneproposedbyChaseetal[ CCV12 ],whilestillfollowingthesameaverage-caseviewpoint.Intuitively,ournotionattemptstocaptureatthesametimethefactthattheobfuscatedre-encryptionfunctionalitydoesnotrevealanyinformationbeyondblack-boxaccesstothefunctionalityandthefactthatblack-boxaccesstothefunctionalitydoesnotrevealanyinformationaboutthemessagesbeingencrypted.Still,ournotionisconnectedto(andinmanycasesimpliedby)thenotiondenedintheseearlierwork,asweexplainbelow.Fornow,moreconcretely,letObfbeaPPTalgorithmwhoseinputandoutputarebothcircuits.Obfisasecureobfuscatorforre-encryptioncircuitfamilyfifthefollowingdenitionissatised.Denition(Re-encryptionObfuscation).WesaythatObfsecurelyobfuscatesthef-re-encryptionfunctionalityffromPKEtoPKE0ifthefollowingtwopropertieshold:-Correctness:ForanyC=fsk;pk02Rf,thestatisticaldistance(Obf(C)(x);C(x))isnegligibleforallinputsx.-Simulatability:ThereexistsaPPTsimulatorSsuchthatforallPPTdistinguishersDandsecurityparametern,j[(sk;pk)$ Gen(1n);(pk0;sk0)$ Gen0(1n):D(pk;pk0;Obf(fsk;pk0))=1] [(sk;pk)$ Gen(1n):D(pk;S(pk))=1]jnegl(n)wheretheprobabilitiesaretakenoverthecoinsofGenandS.Thisnotionissomewhatdierentthanthosefoundintheexistingliteratureonobfuscation;letusdiscussthisnotionalittlebitfurther.Generally,onedenesobfuscatorsasbeingsecurewhenevertheresultingobfuscationdoesnothelpmoreincomputingthefunctionimplementedbytheunderlyingcircuitthanblack-boxaccesstothefunctionitself.Wenotethatthedenitionprovidesaverystrongguarantee,inthatitsaysthatanattacker,givenpk;pk0andtheobfuscationObf(fsk;pk0)doesnotlearnanythingbeyondthepublickeypkofthesourcescheme.Notethattheobfuscationmaybearandomizedcircuititself,andthatthecorrectnessrequirementsassumeshonestevaluationofthecircuit,i.e.,usinghonestlygeneratedrandomcoins.Westressthatthesimulatorisrequiredtosimulatethepublic-keypk0togetherwiththeobfusca-tionObf(fsk;pk).Wealsodiscussastrongernotionofobfuscationwherethesimulatorisrestrictedtouseanexternallygeneratepublickeypk0forthetargetscheme.Denition(StrongRe-encryptionObfuscation).WesaythatObfstronglysecurelyobfus-catesthef-re-encryptionfunctionalityffromPKEtoPKE0ifcorrectnessasaboveholds,andadditionally,thefollowingstrongersimulatabilityrequirementholds:5 -StrongSimulatability:ThereexistsaPPTsimulatorSsuchthatforallPPTdistinguishersDandsecurityparametern,j[(pk;sk)$ Gen(1n);(pk0;sk0)$ Gen0(1n):D(pk;pk0;Obf(fsk;pk0))=1] [(pk;sk)$ Gen(1n);(pk0;sk0)$ Gen0(1n):D(pk;pk0;S(pk;pk0))=1]jnegl(n)wheretheprobabilitiesaretakenoverthecoinsofGenandS.Relationtoearlierdefinitions.Asmentionedabove,previousworksonre-encryption[ HRSV07 , CCV12 ]consideredadierentnotionofaverage-caseobfuscationwhichappearsatrstincompara-bletoours,inwhichthesimulatormustsimulateObf(fsk;pk0),givenblack-boxaccesstofsk;pk0andknowingthepublickeyspk;pk0.Formally,whentranslatedtooursettingofmulti-inputfunctionalre-encryption,therequirementoftheseearlierworksisasfollows:-VirtualBlack-boxness:ThereexistsaPPTsimulatorSsuchthatforallPPTdistinguish-ersDandsecurityparametern,j[(pk;sk)$ Gen(1n);(pk0;sk0)$ Gen0(1n):DRfsk;pk0(pk;pk0;Obf(fsk;pk0))=1] [(pk;sk)$ Gen(1n);(pk0;sk0)$ Gen(1n):DRfsk;pk0(pk;pk0;SRfsk;pk0(pk;pk0)=1]jnegl(n)wheretheprobabilitiesaretakenoverthecoinsofGenandS.Wewillnowprovethatstrongvirtualblack-boxnessimpliesourstrongobfuscationnotionabovefornaturalre-encryptionfunctionalities,hencemakingitasomewhatstrongernotion.Moreconcretely,wesaythatthef-re-encryptionfunctionalityf=ffsk;pk0gissimulatableifthereexistsasimulatorS0suchthatforallPPTdistinguishersD,wehavej[(pk;sk)$ Gen(1n);(pk0;sk0)$ Gen0(1n):DRfsk;pk0(pk;pk0)=1] [(pk;sk)$ Gen(1n);(pk0;sk0)$ Gen0(1n):DS0(pk;pk0)(pk;pk0)=1]jnegl(n):Forexample,thecanonicalre-encryptionfunctionalityissimulatablebysemanticsecurity,providedwecanecientlytestifaciphertextinputtothefunctionalityisdecryptablegivenpkonly.Then,wecanshowthefollowing:Lemma.Assumethattheobfuscatorsatisesthevirtualblack-boxnesspropertyandthef-reencryptionfunctionalityfisprivate.Then,theobfuscatorsatisesthestrongsimulatabilityproperty.Proof.Asournewsimulator^Sforthestrongsimulatabilityproperty,weusethesimulatorSforvirtualblack-boxness,takingpkandpk0asinputs,anduseS0guaranteedtoexistbysimulatabilityofthefunctionalityftoanswerS'squeries,i.e.,forshort,^S(;)=SS0(;).Then,ifthereexistsanattackerDviolatingstrongobfuscability,distinguishingwithnon-negligibleadvantage",thenDalsoviolatesthevirtualblack-boxnessproperty(withoutmakingoraclequeries)withdistinguishingadvantage" negl(n).Thisisbecausebythesimulatabilityoff,theprobabilitiesthatDoutputsonewheninteractingwitheitherof(pk;pk0;^S(pk;pk0))=(pk;pk0;SS0(pk;pk0))and(pk;pk0;SRfsk;pk(pk;pk0)))arenegligiblyclose. 6 4FullyHomomorphicEncryptionfromMany-to-oneFunctionalRe-encryptionInthissection,weconnectthenotionofobfuscatedmany-to-onefunctionalre-encryptionwithFHE,bypresentingagenericconstructionfromtheformertothelatter.Inparticular,weassumethepossibilityofobfuscatingfunctional-re-encryptionforspecicfamiliesoffunctions,whichwewilldiscussrst.4.1UniversalOperationsandCircuitsWedenethenotionofan(unobfuscated)re-encryptioncircuitthatappliesauniversaloperationtoitsinputs.Inparticular,foramessagespaceM=fMngn2N(e.g.,M=f0;1g),letF=fFngbeauniversalclassoffunctions,i.e.,suchthatFnissmallenough(i.e.,polynomialinn,thoughusuallyconstant)andsuchthateveryfunctionMqn!MncanbecomputedbycircuitshavinggatesimplementingfunctionsfromFn.Forexample,wecouldhaveMn=f0;1gforalln2N,andFnsimplycontainstheNANDfunction.Similarly,ifMn=Fqforsomeprimepowerqdependingonn,thenFcouldconsistsofadditionandmultiplicationinFq.Asusual,thegatesofthecircuitwithF-gatescanbedividedintolayers:anygatewhoseinputsconsistonlyofinputbitstotheentirecircuitisdenedtobeinlayer0,andanygatewhoseinputconsistsonlyofoutputsoflayer-igatesisinlayeri+1.Withoutlossofgenerality,wecanconsidercircuitswhereeachlayer-igateonlyoutputstolayeri+1.4.2MainConstructionFori2f0;1;:::;dg,letPKEi=(Geni;Enci;Deci)bepublic-keyencryptionschemes(latertobeassumedsemanticallysecure)withcommonmessagespaceM,andletFbeauniversalfamilyoffunctionsforM.Also,forallf2Fandi2f0;1;:::;d 1g,letfi=ff;iski;pki+1gbetheaf-re-encryptionfunctionalityfromPKEitoPKEi+1.Moreover,assumewehaveanobfuscatorObffiforfi.Weconstructad-leveledFHEschemeFHE=(Gen;Enc;Dec;Eval)asfollows: -Gen(1n):RunGen(i)togenerate(pki;ski)$ Gen(i)foralli=0;1;:::;d.Letthepublickeypk=(pk0;:::pkd),andlettheevaluationkeyevk=(fObff0(f;0sk0;pk1);:::Obffd 1(f;d 1skd 1;pkd)gf2F).Thesecretkeyissk=(sk0;:::skd).-Encpk(m):Returnc=Enc(0)pk0(m).-Decsk(c):RunDecskd(c).(Fordepthsilessthand,otherskimaybeused.)-Evalevk(B;c1;:::;cq),whereBisacircuitconsistingofFgatesofdepthatmostdandwithqinputs:Startwithc1;:::;cqasvaluesontheqinputwires,andforeach-arygatefwithinputsatlayeri=0;1;:::;d 1withvaluec01;:::;c0rontheinputlayers,runObffi(f;iski 1;pki+1)oninputsc01;:::;c0q,andassigntheresultingvaluec00totheoutputwire. 7 Remark.Inmanysituations,theencryptionschemesPKEimaypresentsomepartialhomomor-phismproperties,i.e.,itmayallowforcomputingsomefunctionf2F(e.g.,additioninFq)withoutresortingtore-encryption.Inthesesituations,theobviouseciencyimprovementscanbemadeforthescheme,avoidingtheuseofre-encryptiontocomputefgates.Wedispensewithaformalspecicationoftheconstructioninthiscase.4.3SecurityWewillprovethefollowingtheorems,whicharethemainresultofthissection.Theorem(SecurityoftheMainConstruction).AssumethatPKE0issemanticallysecure,andthatforalli2f0;:::;d 1gandf2F,theobfuscatorsObffistronglysecurelyobfuscatethefre-encryptionfunctionalityfi.ThentheMainConstructionaboveisasemantically-secured-leveledFHEscheme.ThefollowingresultshowsthatifF=ffg,i.e.,onlyonefunctioniscontained,thenwecaninsteadusetheweakernotionof(non-strong)obfuscation. 1 Theorem(SecurityoftheMainConstruction{SingleFunctionCase).AssumethatPKE0issemanticallysecure,andthatforalli2f0;:::;d 1g,theobfuscatorObffisecurelyobfuscatesthefre-encryptionfunctionalityfi.ThentheMainConstructionaboveisasemantically-secured-leveledFHEscheme.Forboththeorems,notethatcorrectnessisobviousbythedenitionofthere-encryptionfunc-tionalityandthecorrectnesspropertiesoftheobfuscators.Wearegoingtofocusonprovingthesecondtheorem,astheproofisinfactmorecomplicatedthanintherstcase.Therefore,asthecoreofourproof,wewishtoshowthattheaboveconstructionachievessemanticsecurity.Specically,weshowthatforallPPTD,j[(sk;pk;evk) Gen(1n):D(Encpk(m);pk;evk)=1 [(sk;pk;evk) Gen(1n):D(Encpk(0);pk;evk)=1]jnegl(n)wheretheprobabilityistakenovertherandomcoinsofGenandoftheencryptions.Tothisend,werstproveausefullemmatoshowthatwecansecurelychaintogetherobfus-catorstoperformmultipleoperationsonanunderlyingmessage.Lemma.Forallm2M,thereexistsPPTsimulatorSsuchthatj[(pk;evk;sk)$ Gen(1n):D(Encpk(m);pk;evk)=1] [(sk0;pk0)$ Gen(0)(1n):D(Enc(0)pk0(m);pk0;S(pk0))=1]jnegl(n)wheretheprobabilitiesaretakenoverthecoinsofGen,Gen(0),theencryptions,andthesimulatorS. 1TherearemultiplereasonswhyFmayonlycontainonefunction:EItherfistheNANDfunctionortheunderlyingschemealreadyprovidessomelevelofhomomorphism(e.g.additions).8 Proof.Therealdistribution(Encpk(m);pk;evk)canberewrittenexplicitlyas(Enc(0)pk0(m);pk0;Obff0(f;0sk0;pk1);pk1;Obff1(f;1sk1;pk2);pk2;:::;Obffd 1(fd 1skd 1;pkd);pkd):Wenowuseahybridargumenttoshowthatthisdistributioniscomputationallyindistinguishablefromthesimulateddistribution(Enc(0)pk0(m);pk0;S(pk0));forasimulatorSwhichisgivenbelow.Todothis,weconstructaseriesofdistributions,andarguethatapolynomial-timedistinguishercannotnoticeadierenceateachstep,exceptwithnegligibleprobability.Distribution0:Thedistinguisherisgiventhe\real-worldview"(Encpk0(m);pk0;Obff0(f;0sk0;pk1);pk1;Obff1(f;1sk1;pk2);pk2;:::Obffd 1(f;d 1skd 1;pkd);pkd):Distribution1:LetSd 1bethesimulatorguaranteedbythesecurityofObffd 1.Thedistin-guisherisgiven(Encpk0(m);pk0;Obff0(f;0sk0;pk1);pk1;Obf(f;1sk1;pk2);pk2;:::;Obffd 1(f;d 1skd 2;pkd 1);pkd 1;Sd 1(pkd 1))Thatis,theonlychangefromDistribution0isthat(Obffd 1(f;d 1skd 1;pkd);pkd)isreplacedbySd 1(pkd 1).Bydenition,weknowthat(pkd 1;Obffd 1(f;d 1skd 1;pkd);pkd)iscomputationallyindistinguishablefrom(pkd 1;Sd 1(pkd 1)).Theonlyremainingelementofthesedistributionsthatdependsonthevalues(skd 1;pkd 1)isObff;d 2(f;d 2skd 2;pkd 1).Notethatthisvalueonlydependsonpkd 1andnotskd 1.Thus,sincewearealreadygivingpkd 1intheclear,anadversarygainsnoadditionalinformationaboutskd 1byseeingObffd 2(f;d 2skd 2;pkd 1).Theotherelementsofthedistributionareindependentofthekeysatindexd 1andd,soweknowthattheDistribution0iscomputationallyindistinguishablefromDistribution1.Distribution2Again,letSd 1bethesimulatorguaranteedbythesecurityofObffd 1,andletS0d 2bethesimulatorguaranteedbythesecurityofObffd 2.DeneSd 2asafunctionthatappliesS0d 2toitsinputtogetapair,thenappliesSd 1tothesecondelementofthatpairtogetanotherpair,andoutputsthe4-tuplethatconsistsofbothpairs.Thedistinguisherisgiven(Encpk0(m);pk0;Obff0(f;0sk0;pk1);pk1;Obff1(f;1sk1;pk2);pk2;:::pkd 3;Obffd 3(f;d 3skd 3;pkd 2);pkd 2;Sd 2(pkd 2))Thisstepisdierentfromthepreviousstepsincethe\pkd 1"usedtogeneratethelasttwoelementsisnowitselfsimulatedinsteadofbeingoutputbyGen(d 1)directly.However,ifanadversarycoulddistinguishDistribution2fromDistribution1,hecoulduseS0tobreakbreakthesecurityoftheobfuscatoritself(bygeneratingtheencryptionandpk0;:::;pkd 3himself,usingthechallengeaspkd 2;x;y,andrunningSd 1(y)togeneratethenaltwoelements).Thus,Distribution2mustbecomputationallyindistinguishablefromDistribution1.Wecontinuereplacingpairswithasimulatorinthismanneruntilwereach:9 DistributiondInDistributiond,wehavereplacedd(obfuscatedcircuit,publickey)pairswithsimulatedvalues,yielding(Encpk0(m);pk0;S(pk0))asdesired.Byhybridargument,sinceeachadjacentpairofdistributionsarecomputationallyindistinguishable,Distribution0andDistributiondarecomputationallyindistinguishable. Wethereforeknowthatthesecurityoftheobfuscationalgorithmimpliesthatwecanusemanyobfuscatedre-encryptionalgorithmsinsuccessionwithoutbreakingsecurity.Fromhereon,provingthesemanticsecurityofthemainconstructionisstraightforward.Indeed,assumeanadversaryhasbothpkandevk.Weknowthat(Encpk0(m);m0;Obff0(f;0sk0;pk1);pk1;Obff1(f;1sk1;pk2);pk2;:::;Obffd 1(f;d 1skd 1;pkd);pkd)(Encpk0(m);pk0;S(pk0))forsomeS.Furthermore,sinceSisecient,weknowthattheoutputofS(pk0)cangivenomoreinformationaboutsk0totheadversarythanpk0itselfcan(sincetheadversarycouldhavesimplyrunSonhisown).Sincetheoriginalencryptionschemeissemanticallysecure,wethusknowthat(Encpk0(m);pk0;S(pk0))(Encpk0(0);pk0;S(pk0))toanyPPTadversary.Thus,suchanadversarycanonlyhavenegligibleadvantageatdistinguishingencryptionsofmandof0,andtheFHEissemanticallysecure.5ExampleConstructionInthissection,weexerciseourframeworkbytakingthepublic-keysystemofRegev[ Reg05 ],whichissemanticallysecureundertheLearningWithErrorsassumption,andgiveasecureobfuscationalgorithmforthemultiplication-re-encryptionfunctionalityfromthisschemetoitself.Thisschemeisnaturallyadditivelyhomomorphic;thus,bythemaintheorem,thisimpliesa(leveled)fully-homomorphicencryptionscheme.Notethattheresultingconstructionisessentiallythatof[ Bra12 ];however,webelievethatviewingtheproblemasoneofobfuscatedre-encryptionprovidesacleanerapproach.5.1APublic-KeyEncryptionSchemeThebasicpublic-keyencryptionschemeisduetoRegev[ Reg05 ].Itisparameterizedbyn;m;q;fromtheLWEassumptionused.WewillrefertothisschemeasPKEn;q;. -Gen(1k):Choosevectors0$ Znq,matrix$ Zmnq,andvectore$ m.Compute=s0+e.Outputsecretkeys=(s0; 1)andpublickey(;).-Encpk(m):Givenm2f0;1g,choose$ f0;1gmandoutput(T;h;i+bq 2cm).-Decsk(c):Compute(hs;ci(modq)).Output0ifthisvalueiscloserto0and1ifthisvalueisclosertobq 2c(modq). ThisencryptionschemeissemanticallysecureundertheLWEq;assumption[ Reg05 ].Fur-thermore,itisclearlyadditivelyhomomorphicoverGF[2](forappropriatechoiceof),since(hs;c1+c2i(modq))=bq 2c(m1+m2) he;1+2i(modq).10 5.2Re-encryptionandObfuscationRe-encryptionfunctionality.Weconsiderthefamilyofcircuits,there-encryption-with-multiplicationcircuitsfromPKEn;q;toPKEn;q;0.(Thevaluesnandqcouldchangeaswell,ifdesired.)Acircuitsk;pk02Rcontainsthesecretkeysk=sofaschemeinPKEn;q;andthepublickeypk0=(0;0)ofaschemeinPKEn;q;0,hardwiredinside.IttakesasinputtwociphertextsandappliesDecsk()toeachofthemtoobtaintwobits.Itmultipliesthesetwobits(correspondingtoalogicaland),runsEncpk0()ontheresult,andoutputstheresultingciphertext.ConstructionofObfToconstructourobfuscator,werstdenetransformationsBitDecompandPowersOf2(usedpreviouslyin[ BV11a ],[ BGV11 ],[ Bra12 ],[ GSW13 ]).Ifv=(1;v2;:::v`)2Z`q,then:-BitDecompq(v)=(1;0;v1;1;:::v1;dlgqe;v2;0;:::v`;dlgqe),wherei;jisthej-thleastsignicantbitofi(thatis,i=Pj2ji;j).-PowersOf2q(v)=(1;21;41;:::2dlgqe1;v2;22:::2dlgqe`).Inthefollowing,wewillgenerallyomitthesubscriptq.Ofnoteisthatforany;v2Znq,h;vi=hBitDecomp();PowersOf2(v)i.WewilldescribethetransformationwewantObftoperformrst,andthendeneitscircuitoutput.Werstcompute~s=2 q(BitDecomp(s)\nBitDecomp(s)),arationalvectoroflength((n+1)dlgqe)2.Here\ndenotesthetensorproduct.Wethenusepk0=(0;0)to\encrypt" 2 eachelementofPowersOf2(~s).Thatis,wechooseR$ f0;1g((n+1)2dlgqe3)mandcomputeD=[0j0]TR+q 2[0jPowersOf2(~s)]T,where0isanmnmatrixofzeroes.(NotethatDisanintegermatrix.)Dene~c=2 q(PowersOf2(c1)\nPowersOf2(c2)).Obfwillextractsand(0;0)fromitsinput.ThenitconstructsarandomizedcircuitthatchoosesarandomRasdenedaboveandcomputesthecorrespondingD.Thecircuittakesintwoinputciphertextsc1andc2,computesDBitDecomp(b~ce),andoutputsthisvalue.Obfoutputsthiscircuitastheobfuscationofsk;pk0. 2Asin[ BV11a ],thisisnottrueencryption,sincetheencryptedvaluesarenotbits;thus,theycannotbedecryptedproperly.However,theoperationisthesame,andtheintuitionthatthesevaluesare\encrypted"maybeuseful.11 Correctness.ThecircuitObf(sk;pk0)calculatesDBitDecomp(b~ce)=[0j0]TRBitDecomp(b~ce)+q 2[0jPowersOf2(~s)]TBitDecomp(b~ce)=[0j0]T0+q 2(0n;h~s;b~cei)=[0j0]T0+(0n;hBitDecomp(s)\nBitDecomp(s);2 q(PowersOf2(c1)\nPowersOf2(c2)i))+e01=[0j0]T0+2 q(0n;hs;c1ihs;c2i)+e01=[0j0]T0+2 q(0n;(he1;1i+q 2m1)(he2;2i+q 2m2))+e01=[0j0]T0+q 2(0n;m1m2)+e01+e02Wewishtoshowthatthisisstatisticallyclosetotheoutputofsk;pk0(whichisafreshencryptionofm1m2).Therearetwodierences:thefactthat0isnotabinaryvector,andthepresenceofanadditionaladditiveerrorterm(e1+e2).Fortherstdierence,notethat[0j0]T02Znq,andthatboth0andRarechosenrandomly.Thereare2mchoicesof002f0;1gm.Thus,foravaluem=\n(nlgq),withhighprobabilitythereexists002f0;1gmsuchthat[0j0]T0=[0j0]T00.Fortheseconddierence,wenotethatbothe01ande02are\small".Specically,e01comesfromroundingerror;eachelementisroundedbyatmost1/2,soitsmagnitudeisbounded 3 byjjBitDecomp(s)\nBitDecomp(s)jj11 2((n+1)(dlgqe+1))2=2.e02isduetothepresenceofe1andbfe2intheoriginalciphertexts;however,thepresenceofthe2 qcoecientmeansthatthistermisboundedbyO(m"),where"istheoriginalerrorboundof.Notethatthemagnitudeof(e1+e2)isindependentofqasidefromalogarithmicfactor;thus,wecanchoosetheLWEparameters(inparticular,qand0)suchthattheoutputdistributionsoftheobfuscatedandunobfuscatedcircuitsarestatisticallyclose.Simulatability.WeshowasimulatorSthatsatisesthestrongsimulatabilityconditionforthisconstruction,asdenedinsection3.2.RecallthatObf(sk;pk0)constructsacircuitthatonlydependsonthevalues(sk;pk0)throughamatrixD,denedas[0j0]TR+q 2[0jPowersOf2(~s)]T.ThesimulatorSsimplychoosesR$ f0;1g((n+1)2dlgqe3)mandreturnsacircuitthatuses[0j0]TRinplaceofD.NotethatthisissimplyaRegevencryptionof0underthekeypk0;indistinguishabilityholdsbythesemanticsecurityoftheoriginalRegevscheme.6BootstrappingManyexistingFHEschemes,startingwiththatofGentry[ Gen09 ],operateontheprincipleof\bootstrapping".Thatis,theyrstdenea\somewhathomomorphic"scheme,whichiscapable 3BoundingthiserroristhereasontointroduceBitDecompandPowersOf2{thisallowsthevectorBitDecomp(s)\nBitDecomp(s)tobebinary.12 ofhomomorphicallyevaluatingitsowndecryptioncircuitplusasingleoperationunderasinglekey.Theythenprovideachainofencryptedkeysunderthisscheme,wherethei-thdecryptionkeyisencryptedunderthe(i+1)stkey.Thisconstructionallowsfor(leveled)fully-homomorphicevaluation:givenaciphertextencryptedunderthei-thkey,theevaluatorencryptstheciphertextunderthe(i+1)stkeyandthenhomomorphicallyevaluatesthedecryptioncircuitonthenewciphertextandtheencryptedi-thkey,followedbyoneoperation.Thenetresultisanencryptionunderkeyi+1oftheoperationappliedtotheplaintextcorrespondingtotheinput.Thegeneralbootstrappingparadigmcanbeseenunderourframeworkasprovidinganobfus-catedre-encryption-with-operationfunctionality.Specically,giventhekeyspki+1;ski,onecanconstructacircuitthatencryptsitsinputunderpki+1,runsthedecryptionoperationhomomor-phicallyusingahardcodedvalueEncpki+1(ski),andthenhomomorphicallyperformsoneoperation.Thiscircuitperformsthesamecomputationasdecrypting,performingtheoperation,andencrypt-ing(bythecorrectnessoftheFHEscheme),anddoesnotleakanyinformationabouttheencrypteddata(bythesemanticsecurityoftheFHEscheme).Thus,atahighlevelitisanobfuscatedre-encryption-with-operationcircuitunderourdenition.However,ourdenitionismoregeneral,sincewedonotrequirestartingwitha\somewhathomomorphic"encryptionscheme,butanysemantically-secureencryptionschemewithasecurely-obfuscatablef-re-encryptionfunctionality.7AcknowledgementsTheauthorswouldliketothankShaGoldwasserforherhelpandguidance.References[AW07]BenAdidaandDouglasWikstrom.Howtoshueinpublic.InSalilP.Vadhan,editor,TCC2007:4thTheoryofCryptographyConference,volume4392ofLectureNotesinComputerScience,pages555{574.Springer,February2007.[BGI+01]BoazBarak,OdedGoldreich,RussellImpagliazzo,StevenRudich,AmitSahai,SalilP.Vadhan,andKeYang.Onthe(im)possibilityofobfuscatingprograms.InJoeKilian,editor,AdvancesinCryptology{CRYPTO2001,volume2139ofLectureNotesinComputerScience,pages1{18.Springer,August2001.[BGV11]ZvikaBrakerski,CraigGentry,andVinodVaikuntanathan.Fullyhomomorphicen-cryptionwithoutbootstrapping.CryptologyePrintArchive,Report2011/277,2011. http://eprint.iacr.org/ .[Bra12]ZvikaBrakerski.Fullyhomomorphicencryptionwithoutmodulusswitchingfromclas-sicalGapSVP.InReihanehSafavi-NainiandRanCanetti,editors,AdvancesinCryp-tology{CRYPTO2012,volume7417ofLectureNotesinComputerScience,pages868{886.Springer,August2012.[BV11a]ZvikaBrakerskiandVinodVaikuntanathan.Ecientfullyhomomorphicencryptionfrom(standard)LWE.InRafailOstrovsky,editor,52ndAnnualSymposiumonFoun-dationsofComputerScience,pages97{106.IEEEComputerSocietyPress,October2011.13 [BV11b]ZvikaBrakerskiandVinodVaikuntanathan.Fullyhomomorphicencryptionfromring-LWEandsecurityforkeydependentmessages.InPhillipRogaway,editor,AdvancesinCryptology{CRYPTO2011,volume6841ofLectureNotesinComputerScience,pages505{524.Springer,August2011.[CCV12]NishanthChandran,MelissaChase,andVinodVaikuntanathan.Functionalre-encryptionandcollusion-resistantobfuscation.InRonaldCramer,editor,TCC2012:9thTheoryofCryptographyConference,volume7194ofLectureNotesinComputerScience,pages404{421.Springer,March2012.[CMNT11]Jean-SebastienCoron,AvradipMandal,DavidNaccache,andMehdiTibouchi.Fullyhomomorphicencryptionovertheintegerswithshorterpublickeys.InPhillipRog-away,editor,AdvancesinCryptology{CRYPTO2011,volume6841ofLectureNotesinComputerScience,pages487{504.Springer,August2011.[CNT12]Jean-SebastienCoron,DavidNaccache,andMehdiTibouchi.Publickeycompres-sionandmodulusswitchingforfullyhomomorphicencryptionovertheintegers.InDavidPointchevalandThomasJohansson,editors,AdvancesinCryptology{EURO-CRYPT2012,volume7237ofLectureNotesinComputerScience,pages446{464.Springer,April2012.[CRV10]RanCanetti,GuyN.Rothblum,andMayankVaria.Obfuscationofhyperplanemem-bership.InDanieleMicciancio,editor,TCC2010:7thTheoryofCryptographyCon-ference,volume5978ofLectureNotesinComputerScience,pages72{89.Springer,February2010.[DS05]YevgeniyDodisandAdamSmith.Correctingerrorswithoutleakingpartialinforma-tion.InHaroldN.GabowandRonaldFagin,editors,37thAnnualACMSymposiumonTheoryofComputing,pages654{663.ACMPress,May2005.[Gen09]CraigGentry.Fullyhomomorphicencryptionusingideallattices.InMichaelMitzen-macher,editor,41stAnnualACMSymposiumonTheoryofComputing,pages169{178.ACMPress,May/June2009.[GH11]CraigGentryandShaiHalevi.Fullyhomomorphicencryptionwithoutsquashingusingdepth-3arithmeticcircuits.InRafailOstrovsky,editor,52ndAnnualSymposiumonFoundationsofComputerScience,pages107{109.IEEEComputerSocietyPress,October2011.[GHS12a]CraigGentry,ShaiHalevi,andNigelP.Smart.Fullyhomomorphicencryptionwithpolylogoverhead.InDavidPointchevalandThomasJohansson,editors,AdvancesinCryptology{EUROCRYPT2012,volume7237ofLectureNotesinComputerScience,pages465{482.Springer,April2012.[GHS12b]CraigGentry,ShaiHalevi,andNigelP.Smart.HomomorphicevaluationoftheAEScircuit.InReihanehSafavi-NainiandRanCanetti,editors,AdvancesinCryptology{CRYPTO2012,volume7417ofLectureNotesinComputerScience,pages850{867.Springer,August2012.14 [GK05]ShaGoldwasserandYaelTaumanKalai.Ontheimpossibilityofobfuscationwithauxiliaryinput.In46thAnnualSymposiumonFoundationsofComputerScience,pages553{562.IEEEComputerSocietyPress,October2005.[GSW13]CraigGentry,AmitSahai,andBrentWaters.Homomorphicencryptionfromlearningwitherrors:Conceptually-simpler,asymptotically-faster,attribute-based.CryptologyePrintArchive,Report2013/340,2013. http://eprint.iacr.org/ .[HRSV07]SusanHohenberger,GuyN.Rothblum,AbhiShelat,andVinodVaikuntanathan.Se-curelyobfuscatingre-encryption.InSalilP.Vadhan,editor,TCC2007:4thTheoryofCryptographyConference,volume4392ofLectureNotesinComputerScience,pages233{252.Springer,February2007.[RAD78]RonaldL.Rivest,LenAdleman,andMichaelL.Dertouzos.Ondatabanksandprivacyhomomorphisms.InRichardA.DeMillo,DavidP.Dobkin,AnitaK.Jones,andRichardJ.Lipton,editors,FoundationsofSecureComputation,pages165{179.AcademicPress,1978.[Reg05]OdedRegev.Onlattices,learningwitherrors,randomlinearcodes,andcryptography.InHaroldN.GabowandRonaldFagin,editors,37thAnnualACMSymposiumonTheoryofComputing,pages84{93.ACMPress,May2005.[SV10]NigelP.SmartandFrederikVercauteren.Fullyhomomorphicencryptionwithrela-tivelysmallkeyandciphertextsizes.InPhongQ.NguyenandDavidPointcheval,editors,PKC2010:13thInternationalConferenceonTheoryandPracticeofPublicKeyCryptography,volume6056ofLectureNotesinComputerScience,pages420{443.Springer,May2010.[vDGHV10]MartenvanDijk,CraigGentry,ShaiHalevi,andVinodVaikuntanathan.Fullyhomo-morphicencryptionovertheintegers.InHenriGilbert,editor,AdvancesinCryptology{EUROCRYPT2010,volume6110ofLectureNotesinComputerScience,pages24{43.Springer,May2010.[Wee05]HoeteckWee.Onobfuscatingpointfunctions.InHaroldN.GabowandRonaldFagin,editors,37thAnnualACMSymposiumonTheoryofComputing,pages523{532.ACMPress,May2005.15