Fully homomorphic encryption (FHE) is an emerging public key encryption paradigm, which enables a third party to execute operations on ciphertexts without knowing the decryption key. It can serve as a powerful cryptographic tool for data privacy protection in cloud computing environment, and has significant applications. However, in a complex network environment, a message may be received by multiple receivers. It has not been well solved by the traditional FHE schemes as how to share a computable ciphertext with an arbitrarily chosen set of receivers. Inspired by identity-based broadcast encryption, we introduce a novel cryptography primitive called identity-based broadcast fully homomorphic encryption (IBBFHE), and present a concrete scheme based on LWE assumption to solve the problem mentioned above. The data encrypted under IBBFHE schemes can still be homomorphic computed by third parties who do not have decryption abilities, and it can only be decrypted by the authorized receivers in a specific group. Thus, data secure sharing can be made possible in cloud computing environment. The IND-smCIS-CPA security of the proposed scheme under LWE assumption is proved. Furthermore, LWE problem is believed to be unsolvable by quantum computers, thus the proposed scheme also possesses this property.
[1] FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71–83. [DOI: 10.3724/SP.J.1001.2011.03958]
[2] RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978, 4(11): 169–180.
[3] FIAT A, NAOR M. Broadcast encryption[C]. In: Advances in Cryptology—CRYPTO 1993. Springer Berlin Heidelberg, 1993: 480–491. [DOI: 10.1007/3-540-48329-2_40]
[4] GENTRY C, SAHAI A, WATERS B. Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based[C]. In: Advances in Cryptology—CRYPTO 2013. Springer Berlin Heidelberg, 2013: 75–92. [DOI: 10.1007/978-3-642-40041-4_5]
[5] WANG J, BI J. Lattice-based identity-based broadcast encryption[J]. IACR ePrint Archive, 2010: 2010/288.
[6] REGEV O. On lattices, learning with errors, random linear codes, and cryptography[J]. Journal of the ACM (JACM), 2009, 56(6): 34. [DOI: 10.1145/1568318.1568324]
[7] GENTRY C. A fully homomorphic encryption scheme[D]. Stanford University, 2009. http://crypto.stanford.edu/craig.
[8] BRAKERSKI Z, VAIKUNTANATHAN V. Fully homomorphic encryption from ring-LWE and security for key dependent messages[C]. In: Advances in Cryptology—CRYPTO 2011. Springer Berlin Heidelberg, 2011: 505–524. [DOI: 10.1007/978-3-642-22792-9_29]
[9] BRAKERSKI Z, VAIKUNTANATHAN V. Efficient fully homomorphic encryption from (standard) LWE[C]. In: IEEE 52nd Annual Symposium on Foundations of Computer Science—FOCS 2011. IEEE, 2011: 97–106. [DOI: 10.1109/FOCS.2011.12]
[10] BRAKERSKI Z, GENTRY C, VAIKUNTANATHAN V. (Leveled) fully homomorphic encryption without
boot-strapping[C]. In: Innovations in Theoretical Computer Science, 2012. ACM, 2012: 309–325. [DOI: 10.1145/2090236.2090262]
[11] DODIS Y, FAZIO N. Public key broadcast encryption for stateless receivers[C]. In: ACM Workshop on Digital Rights Management. Springer Berlin Heidelberg, 2002: 61–80. [DOI: 10.1007/978-3-540-44993-5_5]
[12] BONEH D, GENTRY C, WATERS B. Collusion resistant broadcast encryption with short ciphertexts and private keys[C]. In: Advances in Cryptology—CRYPTO 2005. Springer Berlin Heidelberg, 2005: 258–275. [DOI: 10.1007/11535218_16]
[13] LIBERT B, PATERSON K G, QUAGLIA E A. Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model[C]. In: 15th International Conference on Practice and Theory in Public Key Cryptography—PKC 2012. Springer Berlin Heidelberg, 206–224. [DOI: 10.1007/978-3-642-30057-8_13]
[14] DELERABLÉE C. Identity-based broadcast encryption with constant size ciphertexts and private keys[C]. In: Advances in Cryptology—ASIACRYPT 2007. Springer Berlin Heidelberg, 2007: 200–215. [DOI: 10.1007/978-3-540-76900-2_12]
[15] LIU W, LIU J, WU Q, et al. Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption[J]. International Journal of Information Security, 2016, 15(1): 35–50. [DOI: 10.1007/s10207-015-0287-8]
[16] BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing[C]. In: Advances in Cryptology—CRYPTO 2001. Springer Berlin Heidelberg, 2001: 213–229. [DOI: 10.1007/3-540-44647-8_13]
[17] GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing. ACM, 2008: 197–206. [DOI: 10.1145/1374376.1374407]
[18] CASH D, HOFHEINZ D, KILTZ E, et al. Bonsai trees, or how to delegate a lattice basis[C]. In: Advances in Cryptology—EUROCRYPT 2010. Springer Berlin Heidelberg, 2010: 523–552. [DOI: 10.1007/978-3-642-13190-5_27]
[19] CASH D, HOFHEINZ D, KILTZ E. How to delegate a lattice basis[J]. IACR Cryptology ePrint Archive 2009: 2009/351.
[20] PEIKERT C. A decade of lattice cryptography[J]. Foundations and Trends in Theoretical Computer Science, 2016, 10(4): 283–424. [DOI: 10.1561/0400000074]
[21] CLEAR M, MCGOLDRICK C. Multi-identity and multi-key leveled FHE from learning with errors[C]. In: Advances in Cryptology—CRYPTO 2015. Springer Berlin Heidelberg, 2015: 630–656. [DOI: 10.1007/978-3-662-48000-7_31]
[22] MICCIANCIO D, PEIKERT C. Trapdoors for lattices: Simpler, tighter, faster, smaller[C]. In: Advances in Cryptology—EUROCRYPT 2012. Springer Berlin Heidelberg, 2012: 700–718. [DOI: 10.1007/978-3-642-29011-4_41]