Difference between revisions of "CertSGN"

From certFHE Community KB
Jump to navigation Jump to search
Line 32: Line 32:
  
 
=== The patented blueprint ===
 
=== The patented blueprint ===
 +
 +
Let <math>R </math> be a finite ring and let <math>(G,H,E,D)</math> be a monoid homomorphic encryption scheme. This implies that the ciphertext <math>G</math> and the plaintext <math>H</math> are monoids and the decryption algorithm <math>D: G \to H</math> is a monoid homomorphism.
 +
 +
Consider an efficiently computable <math>R</math>-character <math> \chi : H \to A</math>, where <math>A </math> is a finite <math>R</math>-algebra.
 +
 +
As explained above, the monoid homomorphism <math>D:G\to H </math> induces the <math>R </math>-algebra homomorphism <math>D_R : R[G] \to R[H]</math>. At the same time, <math>\chi </math> induces an <math> R</math>-algebra homomorphism <math>\chi_R : R[H] \to R[A] </math>. The <math>R</math>-algebra homomorphism <math>\mathrm{Dec}</math> is defined as
 +
 +
<center><math>\mathrm{Dec} = \epsilon \circ \chi_R \circ D_R : R[G] \to R[H] \to R[A] \to A </math>,</center>
 +
 +
defined by the formula
 +
 +
<center><math>\mathrm{Dec} \left( \sum_{g \in G} a_g[g] \right) = \sum_{g \in G} a_g \chi(D(g)) </math>.</center>

Revision as of 14:34, 21 December 2020

We will briefly describe here the contributions of the article[1], in which members of the certSign research group introduced a new method for producing the following:

  • Starting with an encryption scheme which is homomorphic with respect to one operation (such as multiplication), the recipe of the authors produces another encryption scheme which is now homomorphic with respect to two operations (for example, addition and multiplication).

The authors use this technique to construct examples of encryption schemes that, theoretically can handle any algebraic function on encrypted data.

The homomorphic encryption scheme CSGN, a symmetric homomorphic encryption scheme with plaintext (the field with two elements) was introduced in the same article. The latter plays an essential role the architecture of a privacy-preserving contact tracing application, developed by certSign as part of the TAMEC project. [2]

The content of the article is protected under the law by two patents. [3]


Ring homomorphic encryption schemes from monoidal ones. The blueprint

Given a monoid and any commutative ring with unity, one can associate to these an algebra . As an -module, the monoid algebra is free with a basis consisting of the symbols , where .

The multiplication in this algebra is defined by extending in an -bilinear manner. Any element has a unique representation

where for all but finitely many . The product of two elements is given by

We note that the identity element with respect to multiplication is , where is the identity element of . If is a group then the monoid algebra described above is called a group algebra.

If are two monoids, a monoid homomorphism induces a natural -algebra homomorphism .

We also remark that for any -algebra , there is a natural -algebra homomorphism given by

.

The patented blueprint

Let be a finite ring and let be a monoid homomorphic encryption scheme. This implies that the ciphertext and the plaintext are monoids and the decryption algorithm is a monoid homomorphism.

Consider an efficiently computable -character , where is a finite -algebra.

As explained above, the monoid homomorphism induces the -algebra homomorphism . At the same time, induces an -algebra homomorphism . The -algebra homomorphism is defined as

,

defined by the formula

.
  1. M. Barcau and V. Pasol, Bounded Fully Homomorphic Encryption from Monoid Algebras, https://eprint.iacr.org/2018/584
  2. https://www.certsign.ro/en/projects
  3. U.S. Patent Appln. No. 14/936,097 and European Patent Appln. No. EP 15193706.7