The present invention relates to a proxy re-encryption technique in homomorphic encryption.
Homomorphic encryption is an encryption technique that allows data to be operated on while the data remains encrypted. A process to operate on data while the data remains encrypted is called a homomorphic operation, and the types and the number of operations for which homomorphic operations are possible vary with each specific scheme. The use of homomorphic encryption allows data to be stored in a database on a cloud while the data remains encrypted, and further allows analysis, such as statistical processing, to be performed on the stored encrypted data without decrypting the data. As a result, the cloud can be used while securing privacy.
Homomorphic encryption has a property that ciphertexts have to be encrypted with the same public key in order to perform a homomorphic operation. Therefore, when a plurality of users store data on a cloud and further perform homomorphic operations on the stored data, all the users need to use a common key. Since all the users use the common key, a problem is that any user can decrypt the data.
Patent Literature 1 describes converting ciphertexts encrypted with different keys into ciphertexts encrypted with a specific single key by employing a technique, called proxy re-encryption, for converting a key with which data is encrypted. As a result, Patent Literature 1 allows ciphertexts to be converted into ciphertexts encrypted with the same specific key, and then allows a homomorphic operation to be performed on the ciphertexts. In addition, in Patent Literature 1, only a user who has the key after conversion by proxy re-encryption can decrypt a ciphertext resulting from the homomorphic operation.
That is, the technique described in Patent Literature 1 allows a homomorphic operation to be performed on ciphertexts encrypted with different keys. This solves the problem which is that all the users need to use the common key.
Patent Literature 1: WO 2014/010202 A1
However, in the technique described in Patent Literature 1, it is requisite that ciphertexts be converted by proxy re-encryption before performing a homomorphic operation. In other words, with the technique described in Patent Literature 1, a homomorphic operation cannot be performed on ciphertexts before proxy re-encryption is performed on the ciphertexts. For this reason, it is necessary to determine who is to be allowed to decrypt converted ciphertexts before a homomorphic operation is performed. Therefore, it is not possible to perform analysis by a homomorphic operation before an analyst is determined. In addition, a result of analysis by a homomorphic operation performed for a certain analyst cannot be analyzed by another analyst.
It is an object of the present invention to make it possible to realize a homomorphic encryption scheme in which after a homomorphic operation is performed on ciphertexts encrypted with different keys, a decrypting user can be controlled by proxy re-encryption.
A conversion key generation device according to the present invention includes
In the present invention, a decryption key ski in a pair of a conversion source is encrypted with a public key pkj in a pair of a conversion target, so as to generate a conversion key rki→j for converting a ciphertext encrypted with a public key pki into a converted ciphertext that can be decrypted with a decryption key skj in the pair of the conversion target. By using this conversion key rki→j, it is possible to allow control of a decryption key that can decrypt a ciphertext resulting from performing a homomorphic operation on ciphertexts encrypted with different keys.
A configuration of a privacy-preserving information processing system 10 according to a first embodiment will be described with reference to
The privacy-preserving information processing system 10 includes a common parameter generation device 20, a plurality of key generation devices 30, a conversion key generation device 40, an encryption device 50, a homomorphic operation device 60, a ciphertext conversion device 70, and a plurality of decryption devices 80.
The common parameter generation device 20, the key generation devices 30, the conversion key generation device 40, the encryption device 50, the homomorphic operation device 60, the ciphertext conversion device 70, and the decryption devices 80 are connected via transmission channels 90. A specific example of the transmission channels 90 is the Internet or a local area network (LAN).
A configuration of the common parameter generation device 20 according to the first embodiment will be described with reference to
The common parameter generation device 20 includes hardware of a processor 21, a memory 22, a storage 23, and a communication interface 24. The processor 21 is connected with the other hardware components via signal lines and controls the other hardware components.
The common parameter generation device 20 includes, as functional components, an acquisition unit 211, a common parameter generation unit 212, and an output unit 213. The functions of the functional components of the common parameter generation device 20 are realized by software.
The storage 23 stores programs for realizing the functions of the functional components of the common parameter generation device 20. These programs are loaded into the memory 22 by the processor 21 and executed by the processor 21. This realizes the functions of the functional components of the common parameter generation device 20.
The storage 23 realizes the function of a parameter storage unit 231.
A configuration of the key generation device 30 according to the first embodiment will be described with reference to
The key generation device 30 includes hardware of a processor 31, a memory 32, a storage 33, and a communication interface 34. The processor 31 is connected with the other hardware components via signal lines and controls the other hardware components.
The key generation device 30 includes, as functional components, an acquisition unit 311, a key generation unit 312, and an output unit 313. The functions of the functional components of the key generation device 30 are realized by software.
The storage 33 stores programs for realizing the functions of the functional components of the key generation device 30. These programs are loaded into the memory 32 by the processor 31 and executed by the processor 31. This realizes the functions of the functional components of the key generation device 30.
The storage 33 realizes the function of a key storage unit 331.
A configuration of the conversion key generation device 40 according to the first embodiment will be described with reference to
The conversion key generation device 40 includes hardware of a processor 41, a memory 42, a storage 43, and a communication interface 44. The processor 41 is connected with the other hardware components via signal lines and controls the other hardware components.
The conversion key generation device 40 includes, as functional components, a key acquisition unit 411, a conversion key generation unit 412, and an output unit 413. The functions of the functional components of the conversion key generation device 40 are realized by software.
The storage 43 stores programs for realizing the functions of the functional components of the conversion key generation device 40. These programs are loaded into the memory 42 by the processor 41 and executed by the processor 41. This realizes the functions of the functional components of the conversion key generation device 40.
The storage 43 realizes the function of a key storage unit 431.
A configuration of the encryption device 50 according to the first embodiment will be described with reference to
The encryption device 50 includes hardware of a processor 51, a memory 52, a storage 53, and a communication interface 54. The processor 51 is connected with the other hardware components via signal lines and controls the other hardware components.
The encryption device 50 includes, as functional components, an acquisition unit 511, an encryption unit 512, and an output unit 513. The functions of the functional components of the encryption device 50 are realized by software.
The storage 53 stores programs for realizing the functions of the functional components of the encryption device 50. These programs are loaded into the memory 52 by the processor 51 and executed by the processor 51. This realizes the functions of the functional components of the encryption device 50.
The storage 53 realizes the function of a key storage unit 531.
A configuration of the homomorphic operation device 60 according to the first embodiment will be described with reference to
The homomorphic operation device 60 includes hardware of a processor 61, a memory 62, a storage 63, and a communication interface 64. The processor 61 is connected with the other hardware components via signal lines and controls the other hardware components.
The homomorphic operation device 60 includes, as functional components, an acquisition unit 611, a homomorphic operation unit 612, and an output unit 613. The functions of the functional components of the homomorphic operation device 60 are realized by software.
The storage 63 stores programs for realizing the functions of the functional components of the homomorphic operation device 60. These programs are loaded into the memory 62 by the processor 61 and executed by the processor 61. This realizes the functions of the functional components of the homomorphic operation device 60.
The storage 63 realizes the functions of a key storage unit 631 and a ciphertext storage unit 632.
A configuration of the ciphertext conversion device 70 according to the first embodiment will be described with reference to
The ciphertext conversion device 70 includes hardware of a processor 71, a memory 72, a storage 73, and a communication interface 74. The processor 71 is connected with the other hardware components via signal lines and controls the other hardware components.
The ciphertext conversion device 70 includes, as functional components, an acquisition unit 711, a ciphertext conversion unit 712, and an output unit 713. The acquisition unit 711 includes a ciphertext acquisition unit 714 and a key acquisition unit 715. The functions of the functional components of the ciphertext conversion device 70 are realized by software.
The storage 73 stores programs for realizing the functions of the functional components of the ciphertext conversion device 70. These programs are loaded into the memory 72 by the processor 71 and executed by the processor 71. This realizes the functions of the functional components of the ciphertext conversion device 70.
The storage 73 realizes the function of a key storage unit 731.
A configuration of the decryption device 80 according to the first embodiment will be described with reference to
The decryption device 80 includes hardware of a processor 81, a memory 82, a storage 83, and a communication interface 84. The processor 81 is connected with the other hardware components via signal lines and controls the other hardware components.
The decryption device 80 includes, as functional components, an acquisition unit 811, a decryption unit 812, and an output unit 813. The functions of the functional components of the decryption device 80 are realized by software.
The storage 83 stores programs for realizing the functions of the functional components of the decryption device 80. These programs are loaded into the memory 82 by the processor 81 and executed by the processor 81. This realizes the functions of the functional components of the decryption device 80.
The storage 83 realizes the function of a key storage unit 831.
Each of the processors 21, 31, 41, 51, 61, 71, and 81 is an integrated circuit (IC) that performs arithmetic processing. As a specific example, each of the processors 21, 31, 41, 51, 61, 71, and 81 is a central processing unit (CPU), a digital signal processor (DSP), or a graphics processing unit (GPU).
Each of the memories 22, 32, 42, 52, 62, 72, and 82 is a storage device to temporarily store data. As a specific example, each of the memories 22, 32, 42, 52, 62, 72, and 82 is a static random access memory (SRAM) or a dynamic random access memory (DRAM).
Each of the storages 23, 33, 43, 53, 63, 73, and 83 is a storage device to store data. As a specific example, each of the storages 23, 33, 43, 53, 63, 73, and 83 is a hard disk drive (HDD). Alternatively, each of the storages 23, 33, 43, 53, 63, 73, and 83 may be a portable storage medium, such as a Secure Digital (SD, registered trademark) memory card, CompactFlash (CF, registered trademark), a NAND flash, a flexible disk, an optical disc, a compact disc, a Blu-ray (registered trademark) disc, or a digital versatile disc (DVD).
Each of the communication interfaces 24, 34, 44, 54, 64, 74, and 84 is an interface for communicating with external devices. As a specific example, each of the communication interfaces 24, 34, 44, 54, 64, 74, and 84 is an Ethernet (registered trademark) port, a Universal Serial Bus (USB) port, or a High-Definition Multimedia Interface (HDMI, registered trademark) port.
The plurality of processors share the execution of the programs for realizing the functions of the functional components. Each of the plurality of processors is, like the processors 21, 31, 41, 51, 61, 71, and 81, an IC that performs arithmetic processing.
Operation of the privacy-preserving information processing system 10 according to the first embodiment will be described with reference to
The operation of the privacy-preserving information processing system 10 according to the first embodiment corresponds to a privacy-preserving information processing method according to the first embodiment. The operation of the privacy-preserving information processing system 10 according to the first embodiment also corresponds to processes of a privacy-preserving information processing program according to the first embodiment.
In the first embodiment, the privacy-preserving information processing system 10 employs existing multi-key homomorphic encryption. As the existing multi-key homomorphic encryption, it is possible to employ schemes described in documents such as [Non-Patent Literature 1: C. Peikert and S. Shiehian. “Multi-Key FHE from LWE, Revisited”. In TCC, 2016.] and [Non-Patent Literature 2: Z. Brakerski and R. Perlman. “Lattice-based fully dynamic multi-key FHE with short ciphertexts”. In CRYPTO, 2016].
The multi-key homomorphic encryption includes a Setup algorithm, a KG algorithm, an Enc algorithm, a Dec algorithm, and an Eval algorithm. The Setup algorithm is an algorithm that generates a common parameter. The KG algorithm is an algorithm that generates a pair of a decryption key and a public key. The Enc algorithm is an algorithm that encrypts data to generate a ciphertext. The Dec algorithm is an algorithm that decrypts a ciphertext. The Eval algorithm is an algorithm that performs a homomorphic operation.
Operation of the common parameter generation device 20 according to the first embodiment will be described with reference to
The operation of the common parameter generation device 20 according to the first embodiment corresponds to a common parameter generation method according to the first embodiment. The operation of the common parameter generation device 20 according to the first embodiment also corresponds to processes of a common parameter generation program according to the first embodiment.
The acquisition unit 211 accepts an input of a parameter necessary for generating a common parameter. Specific examples of the parameter are a security parameter λ, the number k of keys, and a Boolean circuit depth d in Non-Patent Literature 1. The acquisition unit 211 writes the acquired parameter in the memory 22.
The common parameter generation unit 212 retrieves the parameter acquired in step S11 from the memory 22. The common parameter generation unit 212 executes the Setup algorithm in the multi-key homomorphic encryption, taking as input the retrieved parameter, so as to generate a common parameter pp. The common parameter generation unit 212 writes the generated common parameter pp in the memory 22.
The output unit 213 retrieves the common parameter pp generated in step S12 from the memory 22. The output unit 213 writes the retrieved common parameter pp in the storage 23.
The output unit 213 transmits the common parameter pp to each of the key generation devices 30 via the communication interface 24. In each of the key generation devices 30, the acquisition unit 311 receives the common parameter pp via the communication interface 34, and writes the common parameter pp in the key storage unit 331.
Operation of the key generation device 30 according to the first embodiment will be described with reference to
The operation of the key generation device 30 according to the first embodiment corresponds to a key generation method according to the first embodiment. The operation of the key generation device 30 according to the first embodiment also corresponds to processes of a key generation program according to the first embodiment.
The key generation unit 312 retrieves the common parameter pp from the key storage unit 331. The key generation unit 312 executes the KG algorithm in the multi-key homomorphic encryption, taking as input the retrieved common parameter pp, so as to generate a pair of a decryption key sk and a public key pk. The key generation unit 312 writes the generated pair of the decryption key sk and the public key pk in the memory 32.
The output unit 313 retrieves the pair of the decryption key sk and the public key pk generated in step S21 from the memory 32. The output unit 313 writes the retrieved pair of the decryption key sk and the public key pk in the key storage unit 331.
The output unit 313 transmits the public key pk to the conversion key generation device 40, the encryption device 50, and the homomorphic operation device 60 via the communication interface 34. Then, in the conversion key generation device 40, the key acquisition unit 411 receives the public key pk via the communication interface 44, and writes the public key pk in the key storage unit 431. Similarly, in the encryption device 50, the acquisition unit 511 receives the public key pk via the communication interface 54, and writes the public key pk in the key storage unit 531. Similarly, in the homomorphic operation device 60, the acquisition unit 611 receives the public key pk via the communication interface 64, and writes the public key pk in the key storage unit 631.
The output unit 313 transmits the decryption key sk to the conversion key generation device 40 and a corresponding one of the decryption devices 80 via the communication interface 34. The corresponding one of the decryption devices 80 is the decryption device 80 that is assigned to the user of the decryption key sk. The key generation devices 30 and the decryption devices 80 are associated on a one-to-one basis herein, and the decryption key sk is transmitted to the decryption device 80 associated with the key generation device 30 that has generated the decryption key sk. Then, in the conversion key generation device 40, the key acquisition unit 411 receives the decryption key sk via the communication interface 44, and writes the decryption key sk in the key storage unit 431. Similarly, in the decryption device 80, the acquisition unit 811 receives the decryption key sk via the communication interface 84, and writes the decryption key sk in the key storage unit 831.
In the following description, the decryption key sk generated by the ι-th key generation device 30 of the plurality of key generation devices 30 will be referred to as a decryption key skι, and the public key pk generated by the ι-th key generation device 30 will be referred to as a public key pkι.
Operation of the conversion key generation device 40 according to the first embodiment will be described with reference to
The operation of the conversion key generation device 40 according to the first embodiment corresponds to a conversion key generation method according to the first embodiment. The operation of the conversion key generation device 40 according to the first embodiment also corresponds to processes of a conversion key generation program according to the first embodiment.
A case in which a conversion key rki→j is generated will be described here. The conversion key rki→j is a key for converting a ciphertext encrypted with a public key pki generated by the i-th key generation device 30 into a ciphertext that can be decrypted with a decryption key skj generated by the j-th key generation device 30.
The key acquisition unit 411 retrieves a decryption key ski in a pair of a conversion source and a public key pkj in a pair of a conversion target, out of a plurality of pairs of a decryption key and a public key stored in the key storage unit 431. The key acquisition unit 411 writes the retrieved decryption key ski and public key pkj in the memory 42.
The conversion key generation unit 412 retrieves the decryption key ski and the public key pkj from the memory 42. The conversion key generation unit 412 executes an RKGen algorithm in the multi-key homomorphic encryption, taking as input the retrieved decryption key ski and public key pkj, so as to encrypt the decryption key ski with the public key pkj to generate a conversion key rki→j. The conversion key rki→j is a key for converting a ciphertext encrypted with a public key pki in the pair of the conversion source into a converted ciphertext that can be decrypted with a decryption key skj in the pair of the conversion target. The conversion key generation unit 412 writes the generated conversion key rki→j in the memory 42.
The output unit 413 retrieves the conversion key rki→j generated in step S32 from the memory 42. The output unit 413 transmits the retrieved conversion key rki→j to the ciphertext conversion device 70 via the communication interface 44. Then, in the ciphertext conversion device 70, the acquisition unit 711 receives the conversion key rki→j via the communication interface 74, and writes the conversion key rki→j in the key storage unit 731.
Operation of the encryption device 50 according to the first embodiment will be described with reference to
The operation of the encryption device 50 according to the first embodiment corresponds to an encryption method according to the first embodiment. The operation of the encryption device 50 according to the first embodiment also corresponds to processes of an encryption program according to the first embodiment.
The acquisition unit 511 acquires a plaintext M to be encrypted via the communication interface 54. The acquisition unit 511 writes the acquired plaintext M in the memory 52.
The encryption unit 512 retrieves the plaintext M acquired in step S41 from the memory 52. The encryption unit 512 retrieves the public key pk from the key storage unit 531. The encryption unit 512 executes the Enc algorithm in the multi-key homomorphic encryption, taking as input the retrieved plaintext M and public key pk, so as to encrypt the plaintext M with the public key pk to generate a ciphertext C. The encryption unit 512 writes the generated ciphertext C in the memory 52.
The output unit 513 retrieves the ciphertext C generated in step S42 from the memory 52. The output unit 513 transmits the retrieved ciphertext C to the homomorphic operation device 60 via the communication interface 54. Then, in the homomorphic operation device 60, the acquisition unit 611 receives the ciphertext C via the communication interface 64, and writes the ciphertext C in the ciphertext storage unit 632.
Operation of the homomorphic operation device 60 according to the first embodiment will be described with reference to
The operation of the homomorphic operation device 60 according to the first embodiment corresponds to a homomorphic operation method according to the first embodiment. The operation of the homomorphic operation device 60 according to the first embodiment also corresponds to processes of a homomorphic operation program according to the first embodiment.
The acquisition unit 611 retrieves a ciphertext TC, to he processed from the ciphertext storage unit 632. The acquisition unit 611 acquires an operation f that indicates details of an operation via the communication interface 64. The operation f is input, for example, by the user of the homomorphic operation device 60 via an input device. The acquisition unit 611 writes the retrieved ciphertext TC and the acquired operation fin the memory 62.
There may be one ciphertext TC to be processed or a plurality of ciphertexts TC to be processed. The ciphertext TC to be processed is at least one of a ciphertext C generated by the encryption device 50 and a ciphertext EC resulting from performing a homomorphic operation by the homomorphic operation device 60.
The homomorphic operation unit 612 retrieves, from the memory 62, the ciphertext TC retrieved in step S51 and the operation f acquired in step S51. The homomorphic operation unit 612 retrieves the public key pk that has been used to encrypt the ciphertext TC from the key storage unit 631. The homomorphic operation unit 612 executes the Eval algorithm in the multi-key homomorphic encryption, taking as input the retrieved ciphertext TC, operation f, and public key pk, so as to generate a ciphertext EC resulting from performing the operation f on the ciphertext TC. The homomorphic operation unit 612 writes the generated ciphertext EC in the memory 62.
The output unit 613 retrieves the ciphertext EC generated in step S52 from the memory 62. The output unit 613 writes the retrieved ciphertext EC in the ciphertext storage unit 632.
Operation of the ciphertext conversion device 70 according to the first embodiment will be described with reference to
The operation of the ciphertext conversion device 70 according to the first embodiment corresponds to a ciphertext conversion method according to the first embodiment, and also corresponds to processes of a ciphertext conversion program according to the first embodiment.
The acquisition unit 711 acquires a ciphertext IC to be processed from the homomorphic operation device 60 via the communication interface 74. Specifically, the acquisition unit 711 transmits an identifier of the ciphertext TC to be processed to the homomorphic operation device 60, and acquires the ciphertext TC transmitted as a response. The acquisition unit 811 writes the acquired ciphertext IC in the memory 72.
The ciphertext TC to be processed is at least one of a ciphertext IC generated by the encryption device 50 and a ciphertext EC resulting from performing a homomorphic operation by the homomorphic operation device 60.
It is assumed here that the ciphertext TC to be processed is a ciphertext EC generated by performing a homomorphic operation on a ciphertext encrypted with the public key pki for each integer i of i=1, . . . , s. It is also assumed that the ciphertext TC to be processed is to be converted into a ciphertext that can be decrypted with the decryption key skj generated by the j-th key generation device 30.
The ciphertext conversion unit 712 decrypts the ciphertext TC to be processed by a homomorphic operation, using the decryption key in the pair of the conversion source, that is, the decryption key ski for each integer i of i=1, . . . , s, so as to generate a converted ciphertext RC.
Specifically, the ciphertext conversion unit 712 executes the Enc algorithm in the multi-key homomorphic encryption, taking as input the public key pkj in the pair of the conversion target and the ciphertext TC, so as to encrypt the ciphertext TC with the public key pkj to generate a ciphertext C*. The ciphertext conversion unit 712 executes the Eval algorithm in the multi-key homomorphic encryption, taking as input the ciphertext C*, an operation fDec, the public key pkj, and the conversion key rki→j for each integer i of i=1, . . . , s, so as to generate the converted ciphertext RC resulting from performing the operation fDec on the ciphertext C*.
Note that the operation fDec is an operation representing the Dec algorithm in the multi-key homomorphic encryption. That is, the execution of the Eval algorithm in the multi-key homomorphic encryption, using as input the ciphertext C*, the operation fDec, the public key pkj, and the conversion key rki→j for each integer i of i=1, . . . , s, causes the ciphertext C* to be decrypted with the decryption key ski embedded in the conversion key rki→j. That is, the ciphertext C* is decrypted with the decryption key ski by the homomorphic operation.
The output unit 713 retrieves the converted ciphertext RC generated in step S62 from the memory 72. The output unit 713 transmits the retrieved converted ciphertext RC to the homomorphic operation device 60 via the communication interface 74. Then, in the homomorphic operation device 60, the acquisition unit 611 receives the converted ciphertext RC via the communication interface 64, and writes the converted ciphertext RC in the ciphertext storage unit 632.
Operation of the decryption device 80 according to the first embodiment will be described with reference to
The operation of the decryption device 80 according to the first embodiment corresponds to a decryption method according to the first embodiment. The operation of the decryption device 80 according to the first embodiment also corresponds to processes of a decryption program according to the first embodiment.
The acquisition unit 811 acquires a ciphertext TC to be processed from the homomorphic operation device 60 via the communication interface 84. Specifically, the acquisition unit 811 transmits an identifier of the ciphertext TC to be processed to the homomorphic operation device 60, and acquires the ciphertext TC transmitted as a response. The acquisition unit 811 writes the acquired ciphertext TC in the memory 82.
The decryption unit 812 retrieves the ciphertext TC acquired in step S71 from the memory 82. The decryption unit 812 executes the Dec algorithm in the multi-key homomorphic encryption, taking as input the retrieved ciphertext TC, so as to decrypt the ciphertext TC to generate a plaintext M′. The decryption unit 812 writes the generated plaintext M′ in the memory 82.
The output unit 813 retrieves the plaintext M′ generated in step S72 from the memory 82. The output unit 813 outputs the retrieved plaintext M′ via the communication interface 84.
As described above, in the privacy-preserving information processing system 10 according to the first embodiment, the conversion key generation device 40 generates the conversion key rki→j by encrypting the decryption key ski of the conversion source with the public key pkj of the conversion target. As a result, by using this conversion key rki→j, a ciphertext which is encrypted with the public key pki of the conversion source and then on which a homomorphic operation is performed can be converted into a ciphertext that can be decrypted with the decryption key skj.
In the technique described in Patent Literature 1, a homomorphic operation cannot be performed until a key to be a conversion target of proxy re-encryption is determined, so that data cannot be processed in advance. If a plurality of users wish to use data resulting from a homomorphic operation, the homomorphic operation has to be performed after keys used to encrypt data prior to the homomorphic operation are converted into keys of the respective data users by proxy re-encryption. Therefore, the homomorphic operation must be performed individually for each ciphertext encrypted with the key of each data user, and a result of the homomorphic operation cannot be reused.
In contrast to this, in the privacy-preserving information processing system 10 according to the first embodiment, by converting a ciphertext resulting from a homomorphic operation by the ciphertext conversion device 70, the key of the ciphertext resulting from the homomorphic operation can be converted while preserving the privacy of an encrypted plaintext and without changing the plaintext. As a result, even when a ciphertext resulting from a homomorphic operation needs to be converted for a plurality of keys, it is not necessary to re-execute the homomorphic operation. In addition, by storing a ciphertext resulting from a homomorphic operation, intermediate data in the operation can be securely reused.
It is conceivable that a computer for performing homomorphic operations and a computer for performing proxy re-encryption are provided separately, such that the storage of ciphertexts and operations on ciphertexts are processed by a computer with a large storage capacity and high computational power, such as a cloud, and the conversion of keys is processed by a computer with high security, for example.
In this case, in the technique described in Patent Literature 1, it is necessary to transmit all ciphertexts to be used for an operation to the computer for proxy re-encryption so as to have their respective keys converted, and then transmit all the ciphertexts after conversion to the cloud again. Therefore, a large number of ciphertexts are to be communicated.
In contrast to this, in the privacy-preserving information processing system 10 according to the first embodiment, it is possible to transmit only a ciphertext resulting from a homomorphic operation that needs to be decrypted to the ciphertext conversion device 70, so as to generate a converted ciphertext. Therefore, even when the homomorphic operation device 60 and the ciphertext conversion device 70 are provided in different computers, only a small number of ciphertexts are to be communicated.
In the first embodiment, the functional components are realized by software. As a first variation, however, the functional components may be realized by hardware. With regard to the first variation, differences from the first embodiment will be described.
A configuration of the common parameter generation device 20 according to the first variation will be described with reference to
When the functions are realized by hardware, the common parameter generation device 20 includes an electronic circuit 25, in place of the processor 21, the memory 22, and the storage 23. The electronic circuit 25 is a dedicated circuit that realizes the functional components of the common parameter generation device 20 and the functions of the memory 22 and the storage 23.
A configuration of the key generation device 30 according to the first variation will be described with reference to
When the functions are realized by hardware, the key generation device 30 includes an electronic circuit 35, in place of the processor 31, the memory 32, and the storage 33. The electronic circuit 35 is a dedicated circuit that realizes the functional components of the key generation device 30 and the functions of the memory 32 and the storage 33.
A configuration of the conversion key generation device 40 according to the first variation will be described with reference to
When the functions are realized by hardware, the conversion key generation device 40 includes an electronic circuit 45, in place of the processor 41, the memory 42, and the storage 43. The electronic circuit 45 is a dedicated circuit that realizes the functional components of the conversion key generation device 40 and the functions of the memory 42 and the storage 43.
A configuration of the encryption device 50 according to the first variation will be described with reference to
When the functions are realized by hardware, the encryption device 50 includes an electronic circuit 55, in place of the processor 51, the memory 52, and the storage 53. The electronic circuit 55 is a dedicated circuit that realizes the functional components of the encryption device 50 and the functions of the memory 52 and the storage 53.
A configuration of the homomorphic operation device 60 according to the first variation will be described with reference to
When the functions are realized by hardware, the homomorphic operation device 60 includes an electronic circuit 65, in place of the processor 61, the memory 62, and the storage 63. The electronic circuit 65 is a dedicated circuit that realizes the functional components of the homomorphic operation device 60 and the functions of the memory 62 and the storage 63.
A configuration of the ciphertext conversion device 70 according to the first variation will be described with reference to
When the functions are realized by hardware, the ciphertext conversion device 70 includes an electronic circuit 75, in place of the processor 71, the memory 72, and the storage 73. The electronic circuit 75 is a dedicated circuit that realizes the functional components of the ciphertext conversion device 70 and the functions of the memory 72 and the storage 73.
A configuration of the decryption device 80 according to the first variation will be described with reference to
When the functions are realized by hardware, the decryption device 80 includes an electronic circuit 85, in place of the processor 81, the memory 82, and the storage 83. The electronic circuit 85 is a dedicated circuit that realizes the functional components of the decryption device 80 and the functions of the memory 82 and the storage 83.
Each of the electronic circuits 25, 35, 45, 55, 65, 75, and 85 is assumed to be a single circuit, a composite circuit, a programmed processor, a parallel-programmed processor, a logic IC, a gate array (GA), an application specific integrated circuit (ASIC), or a field-programmable gate array (FPGA).
The functions of the functional components of the common parameter generation device 20 may be realized by one electronic circuit 25, or the functions of the functional components may be distributed among and realized by a plurality of electronic circuits 25. Similarly, with regard to the key generation device 30, the conversion key generation device 40, the encryption device 50, the homomorphic operation device 60, the ciphertext conversion device 70, or the decryption device 80, the functions of the functional components may be realized by one electronic circuit 35, 45, 55, 65, 75, or 85, or the functions of the functional components may be distributed among and realized by a plurality of electronic circuits 35, 45, 55, 65, 75, or 85, respectively.
As a second variation, some of the functions may be realized by hardware, and the rest of the functions may be realized by software. That is, some of the functions of the functional components may be realized by hardware, and the rest of the functions may be realized by software.
Each of the processors 21, 31, 41, 51, 61, 71, and 81, the memories 22, 32, 42, 52, 62, 72, and 82, the storages 23, 33, 43, 53, 63, 73, and 83, and the electronic circuits 25, 35, 45, 55, 65, 75, and 85 is referred to as processing circuitry. That is, the functions of the functional components are realized by the processing circuitry.
In a second embodiment, a specific scheme based on a multi-key homomorphic encryption scheme described in Non-Patent Literature 1 will be described. In the second embodiment, the scheme based on the large-ciphertext construction described in Non-Patent Literature 1 will be described. In the second embodiment, differences from the first embodiment will be described and description of the same portions will be omitted.
When A is a distribution, y←A denotes that y is randomly selected from A according to the distribution of A. When A is a set, y←A denotes that y is uniformly selected from A. When A is an algorithm, y←A(x) denotes that an output y is generated for an input x.
Note that n, q, and χ are certain Learning With Errors (LWE) parameters, m=O(n log q), L is a minimum integer equal to or more than log q, and g:=(1, 2, . . . , 2L−1). For any x∈Zq, y:=g−1[x]∈{0,1}L is a vector that satisfies <y, g>=x∈Zq. For any natural numbers n and m, In is an n×n identity matrix, 0n×m is an n×m matrix in which all elements are 0, and 1n×m is an n×m matrix in which all elements are 1. For any i∈[n], ei∈{0,1}n is a canonical basis vector in which the n-th element is 1 and the rest of the elements are 0. Note that [a∥b] denotes a concatenation of vectors or matrices a and b.
Operation of the common parameter generation device 20 according to the second embodiment will be described with reference to
The processes of step S11 and step S13 are the same as in the first embodiment.
The common parameter generation unit 212 executes the Setup algorithm in the multi-key homomorphic encryption, so as to generate a common parameter pp, as indicated in Formula 11.
Setup(1λ,1k,1d):
pp:=A←qn×m. [Formula 11]
Operation of the key generation device 30 according to the second embodiment will be described with reference to
The process of step S22 is the same as in the first embodiment.
The key generation unit 312 executes the KG algorithm in the multi-key homomorphic encryption, so as to generate a pair of a decryption key sk and a public key pk, as indicated in Formula 12.
KG(pp):
b:=tA+e,
sk:=t, pk:=(b,A). [Formula 12]
Operation of the conversion key generation device 40 according to the second embodiment will be described with reference to
The processes of step S31 and step S33 are the same as in the first embodiment.
The conversion key generation unit 412 executes the RKGen algorithm in the multi-key homomorphic encryption, taking as input the decryption key ski and the public key pkj, so as to encrypt the decryption key ski with the public key pkj to generate a conversion key rki→j, as indicated in Formula 13.
Operation of the encryption device 50 according to the second embodiment will be described with reference to
The processes of step S41 and step S43 are the same as in the first embodiment.
It is assumed here that the plaintext M is to be encrypted with the public key pki generated by the i-th key generation device 30.
The encryption unit 512 executes the Enc algorithm in the multi-key homomorphic encryption, taking as input the plaintext M and the public key pki, so as to encrypt the plaintext M with the public key pki to generate a ciphertext C, as indicated in Formula 14.
Enc(pki,M∈{0,1}):
index:=i,
B:=A−ent⊗b,
1. XC←{0,1}m×nL,
2. R←{0,1}m×nL, F:=AR+M(In⊗g),
3. XD←{0,1}nmL×nL,
D:=
C: =(CT,F,D,index). [Formula 14]
Operation of the homomorphic operation device 60 according to the second embodiment will be described with reference to
The processes of step S51 and step S53 are the same as in the first embodiment.
With regard to each ciphertext TC input in step S51, the homomorphic operation unit 612 executes an Extend algorithm in the multi-key homomorphic encryption, taking as input the ciphertext TC concerned and the public key pki, so as to compute a ciphertext C′, as indicated in Formula 15.
In Formula 15, s is the number of elements in index.
The homomorphic operation unit 612 executes the Eval algorithm in the multi-key homomorphic encryption, so as to generate a ciphertext EC resulting from performing the operation f on the ciphertext TC.
For example, the homomorphic operation unit 612 adds C1 and C2, which are two ciphertexts TC, as indicated in Formula 16.
Eval(C1=(CT1,F1,D1,index),C2=(CT2,F2,D2,index)):
(CTadd,Fadd,Dadd,indexadd)
:=(CT1+CT2,F1+F2,D1+D2,index),
EC=(CTadd,Fadd,Dadd,indexadd). [Formula 16]
Alternatively, for example, the homomorphic operation unit 612 multiplies C1 and C2, which are two ciphertexts TC, as indicated in Formula 17.
Eval(C1=(CT1,F1,D1,index),C2=(CT2,F2,D2,index)):
Sct:=(In′⊗g−1)[CT2]∈{0,1}n′L×n′L,
Sf:=(In⊗g−1)[F2]∈{0,1}nL×nL,
Sd:=(In′mL⊗g−1)[D2]∈{0,1}n′mL
CTmul:=CT1·Sct,
Fmul:=F1·Sf,
Dmul:=D1·Sf+(ImL⊗CT1)·Sd,
indexmul:=index,
EC=(CTmul,Fmul,Dmul,indexmul). [Formula 17]
Operation of the ciphertext conversion device 70 according to the second embodiment will be described with reference to
The processes of step S61 and step S63 are the same as in the first embodiment.
It is assumed here that a ciphertext EC resulting from performing a homomorphic operation using as input a ciphertext encrypted with the public key plc.; for each integer i of i=1, . . . , s is to be converted into a ciphertext that can be decrypted with the decryption key skj generated by the j-th key generation device 30. That is, index=[1∥, . . . , ∥s].
The ciphertext conversion unit 712 executes a ReEnc algorithm, taking as input the conversion key rki→j for each integer i of i=1, . . . , s and the ciphertext TC, which is the ciphertext EC resulting from performing a homomorphic operation, so as to generate a converted ciphertext RC, as indicated in Formula 18.
ReEnc(rk1→j, . . . , rks→j,TC:=(CT,F,D,index)):
CT*:=[rk1→j∥ . . . ∥rks→j]·(Ins⊗g−1)[CT],
F*:=F,
D*: =(Iml⊗[rk1→j∥ . . . ∥rks→j])·(Ins⊗g−1)[D],
RC: =(CT*,F*,D*,j). [Formula 18]
Operation of the decryption device 80 according to the second embodiment will be described with reference to
The processes of step S71 and step S73 are the same as in the first embodiment.
The decryption unit 812 executes the Dec algorithm in the multi-key homomorphic encryption, taking as input the ciphertext TC, so as to decrypt the ciphertext TC to generate a plaintext M′, as indicated in Formula 19.
Dec(sk,TC: =(CT,F,D,index)):
M′:=“t·ct/2L−2”. [Formula 19]
In Formula 19, ct is a column vector in the second column from the right in the element CT, and “t·ct/2L−2” signifies an integer closest to t·ct/2L−2. That is, the integer closest to t·ct/2L−2 is the plaintext M′.
The privacy-preserving information processing system 10 according to the second embodiment can realize a scheme by which a ciphertext on which a homomorphic operation has been performed can be converted into a ciphertext that can be decrypted with the decryption key ski by employing a specific multi-key homomorphic encryption scheme.
In the first embodiment, the ciphertext conversion device 70 converts a ciphertext by the homomorphic operation algorithm. In contrast to this, in the second embodiment, the ciphertext conversion device 70 converts a ciphertext without using the homomorphic operation algorithm, so that the amount of computation can be reduced.
In a third embodiment, a specific scheme based on a multi-key homomorphic encryption scheme described in Non-Patent Literature 1 will be described, as in the second embodiment. In the third embodiment, the scheme based on the small-ciphertext construction described in Non-Patent Literature 1 will be described. In the third embodiment, differences from the second embodiment will be described, and description of the same portions will be omitted.
Operation of the key generation device 30 according to the third embodiment will be described with reference to
The process of step S22 is the same as in the second embodiment.
The key generation unit 312 executes the KG algorithm in the multi-key homomorphic encryption, so as to generate a pair of a decryption key sk and a public key pk, as indicated in Formula 20.
KG(pp):
1.
b:=tA+e,
2. R←{0,1}m×n
3. choose LWE matrix
D:=
sk:=t, pk:=(b,P,D,A). [Formula 20]
Operation of the conversion key generation device 40 according to the third embodiment will be described with reference to
The processes of step S31 and step S33 are the same as in the second embodiment.
The conversion key generation unit 412 executes the RKGen algorithm in the multi-key homomorphic encryption, taking as input the decryption key ski and the public key pkj, so as to encrypt the decryption key ski with the public key pkj to generate a conversion key rki→j, as indicated in Formula 21.
Operation of the encryption device 50 according to the third embodiment will be described with reference to
The processes of step S41 and step S43 are the same as in the second embodiment.
It is assumed here that the plaintext M is to be encrypted with the public key pki generated by the i-th key generation device 30.
The encryption unit 512 executes the Enc algorithm in the multi-key homomorphic encryption, taking as input the plaintext M and the public key pki so as to encrypt the plaintext M with the public key pki to generate a ciphertext C, as indicated in Formula 22.
Enc(pki,M∈{0,1}):
index:=i,
B:=A−ent⊗b,
XC←{0,1}m×nL,
CT:=
C: =(CT,index). [Formula 22]
Operation of the homomorphic operation device 60 according to the third embodiment will be described with reference to
The processes of step S51 and step S53 are the same as in the second embodiment.
With regard to each ciphertext TC input in step S51, the homomorphic operation unit 612 executes the Extend algorithm in the multi-key homomorphic encryption, taking as input the ciphertext TC concerned and the public key pki, so as to compute a ciphertext C′, as indicated in Formula 23.
In Formula 23, s is the number of elements in index.
The homomorphic operation unit 612 executes the Eval algorithm in the multi-key homomorphic encryption, so as to generate a ciphertext EC resulting from performing the operation f on the ciphertext TC.
For example, the homomorphic operation unit 612 adds C1 and C2, which are two ciphertexts TC, as indicated in Formula 24.
Eval(C1=(CT1,index),C2=(CT2,index)):
(CTadd,indexadd)
:=(CT1+CT2,index),
EC=(CTadd,indexadd). [Formula 24]
Alternatively, for example, the homomorphic operation unit 612 multiplies C1 and C2, which are two ciphertexts TC, as indicated in Formula 25.
Eval(C1=(CT1,index),C2=(CT2,index)):
Sct:=(In′⊗g−1)[CT2]∈{0,1}n′L×n′L,
CTmul:=CT1·Sct,
indexmul:=index,
EC=(CTmul,indexmul). [Formula 25]
Operation of the ciphertext conversion device 70 according to the third embodiment will be described with reference to
The processes of step S61 and step S63 are the same as in the second embodiment.
It is assumed here that a ciphertext EC resulting from performing a homomorphic operation using as input a ciphertext encrypted with the public key pki for each integer i of i=1, . . . , s is to be converted into a ciphertext that can be decrypted with the decryption key skj generated by the j-th key generation device 30.
The ciphertext conversion unit 712 executes the ReEnc algorithm, taking as input the conversion key rki→j for each integer i of i=1, . . . , s and the ciphertext TC, which is the ciphertext EC resulting from performing a homomorphic operation, so as to generate a converted ciphertext RC, as indicated in Formula 26.
ReEnc(rk1→j, . . . , rks→j,TC: =(CT,index)):
CT*: =[rk1→j∥ . . . ∥rks→j]·(Ins⊗g−1)[CT],
RC:=(CT*,j). [Formula 26]
Operation of the decryption device 80 according to the third embodiment will be described with reference to
The processes of step S71 and step S73 are the same as in the second embodiment.
The decryption unit 812 executes the Dec algorithm in the multi-key homomorphic encryption, taking as input the ciphertext TC, so as to decrypt the ciphertext TC to generate a plaintext M′, as indicated in Formula 27.
Dec(sk,TC: =(CT,index)):
M′:=“t·ct/2L−2”. [Formula 27]
In Formula 27, ct is a column vector in the second column from the right in the element CT, and “t·ct/2L−2” signifies an integer closest to t·ct/2L−2. That is, the integer closest to t·ct/2L−2 is the plaintext M′.
As described above, the privacy-preserving information processing system 10 according to the third embodiment can realizes a scheme by which a ciphertext on which a homomorphic operation has been performed can be converted into a ciphertext that can be decrypted with the decryption key skj by employing a specific multi-key homomorphic encryption scheme,
In the scheme realized by the privacy-preserving information processing system 10 according to the third embodiment, the number of elements in the public key pk is greater but the number of elements in the ciphertext C is smaller than those in the scheme realized by the privacy-preserving information processing system 10 according to the second embodiment.
10: privacy-preserving information processing system, 20: common parameter generation device, 21: processor, 22: memory, 23: storage, 24: communication interface, 25: electronic circuit, 211: acquisition unit, 212: common parameter generation unit, 213: output unit, 231: parameter storage unit, 30: key generation device, 31: processor, 32: memory, 33: storage, 34: communication interface, 35: electronic circuit, 311: acquisition unit, 312: key generation unit, 313: output unit, 331: key storage unit, 40: conversion key generation device, 41: processor, 42: memory, 43: storage, 44: communication interface, 45: electronic circuit, 411: key acquisition unit, 412: conversion key generation unit, 413: output unit, 431: key storage unit, 50: encryption device, 51: processor, 52: memory, 53: storage, 54: communication interface, 55: electronic circuit, 511: acquisition unit, 512: encryption unit, 513: output unit, 531: key storage unit, 60: homomorphic operation device, 61: processor, 62: memory, 63: storage, 64: communication interface, 65: electronic circuit, 611: acquisition unit, 612: homomorphic operation unit, 613: output unit, 631: key storage unit, 632: ciphertext storage unit, 70: ciphertext conversion device, 71: processor, 72: memory, 73: storage, 74: communication interface, 75: electronic circuit, 711: acquisition unit, 712:
ciphertext conversion unit, 713: output unit, 731: key storage unit, 80: decryption device, 81: processor, 82: memory, 83: storage, 84: communication interface, 85: electronic circuit, 811: acquisition unit, 812: decryption unit, 813: output unit, 831: key storage unit, 90: transmission channels
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2017/047148 | 12/28/2017 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2019/130528 | 7/4/2019 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
20140115321 | Isshiki | Apr 2014 | A1 |
20150016606 | Omino | Jan 2015 | A1 |
20150043735 | Fujii | Feb 2015 | A1 |
20150180661 | Fujii | Jun 2015 | A1 |
20150372812 | Parann-Nissany | Dec 2015 | A1 |
20160254914 | Saito | Sep 2016 | A1 |
20160380768 | Koike et al. | Dec 2016 | A1 |
20170099263 | Matsuzaki | Apr 2017 | A1 |
20170366338 | Gajek | Dec 2017 | A1 |
20170366519 | Rao | Dec 2017 | A1 |
20180131512 | Gajek | May 2018 | A1 |
Number | Date | Country |
---|---|---|
2012-195733 | Oct 2012 | JP |
2015-19333 | Jan 2015 | JP |
2015-169842 | Sep 2015 | JP |
WO 2012169153 | Dec 2012 | WO |
WO-2014010202 | Feb 2013 | WO |
WO-2014010202 | Jul 2013 | WO |
WO 2014010202 | Jan 2014 | WO |
WO 2014024956 | Feb 2014 | WO |
WO-2020174515 | Sep 2020 | WO |
Entry |
---|
“Lopez-Alt et al.”, “On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption”, 2012 (Year: 2012). |
Brakerski et al., “Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts,” IACR-CRYPTO-2016, 2016, pp. 1-23. |
International Search Report (PCT/ISA/210) issued in PCT/JP2017/047148, dated Apr. 3, 2018. |
Peikert el al., “Multi-Key FHE from LWE, Revisited,” IACR-TCC-2016, 2016, pp. 1-19. |
Number | Date | Country | |
---|---|---|---|
20200344049 A1 | Oct 2020 | US |