Hardness amplification of weakly verifiable puzzles
Ran Canetti, Shai Halevi, et al.
TCC 2005
The security of contemporary homomorphic encryption schemes over cyclotomic number field relies on fields of very large dimension. This large dimension is needed because of the large modulus-to-noise ratio in the key-switching matrices that are used for the top few levels of the evaluated circuit. However, a smaller modulus-to-noise ratio is used in lower levels of the circuit, so from a security standpoint it is permissible to switch to lower-dimension fields, thus speeding up the homomorphic operations for the lower levels of the circuit. However, implementing such field-switching is nontrivial, since these schemes rely on the field algebraic structure for their homomorphic properties. A basic ring-switching operation was used by Brakerski, Gentry and Vaikuntanathan, over rings of the form Z[X]/(X2n+1), in the context of bootstrapping. In this work we generalize and extend this technique to work over any cyclotomic number field, and show how it can be used not only for bootstrapping but also during the computation itself (in conjunction with the 'packed ciphertext' techniques of Gentry, Halevi and Smart). © 2013 IOS Press and the authors.
Ran Canetti, Shai Halevi, et al.
TCC 2005
Jack Crawford, Craig Gentry, et al.
CCS/WAHC 2018
Tzipora Halevi, Nitesh Saxena, et al.
Journal of Computer Security
Sanjam Garg, Craig Gentry, et al.
SIAM Journal on Computing