ECCC-Report TR10-146https://eccc.weizmann.ac.il/report/2010/146Comments and Revisions published for TR10-146en-usTue, 21 Sep 2010 16:20:30 +0200
Paper TR10-146
| Homomorphic Encryption: from Private-Key to Public-Key |
Ron Rothblum
https://eccc.weizmann.ac.il/report/2010/146We show that any private-key encryption scheme that is weakly
homomorphic with respect to addition modulo 2, can be transformed
into a public-key encryption scheme. The homomorphic feature
referred to is a minimalistic one; that is, the length of a
homomorphically generated encryption should be independent of the
number of ciphertexts from which it was created. We do not require
anything else on the distribution of homomorphically generated
encryptions (in particular, we do not require them to be
distributed like real ciphertexts). Our resulting public-key
scheme is homomorphic in the following sense. If $i+1$ repeated
applications of homomorphic operations can be applied to the
private-key scheme, then $i$ repeated applications can be applied
to the public-key scheme.
Tue, 21 Sep 2010 16:20:30 +0200https://eccc.weizmann.ac.il/report/2010/146