University of Bahrain
Scientific Journals

Provable Security of RM Code based FHE Scheme

Show simple item record

dc.contributor.author Challa, Ratnakumari
dc.contributor.author G, Vijayakumari
dc.date.accessioned 2023-07-18T06:08:27Z
dc.date.available 2023-07-18T06:08:27Z
dc.date.issued 2023-07-18
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5044
dc.description.abstract Based on the hardness of decoding noisy codewords, coding theory was recently recognized as a potential and well established cryptographic primitive. While keeping the benefit of decoding noisy codewords, coding theory may be utilized to develop implementable homomorphic encryption systems with restricted capacity. Using error correction codes (ECC), a code-based homomorphic encryption system [1] [2] has been proposed and implemented. These designs have evolved into intriguing attempts at developing an implementable partial homomorphic encryption (PHE) method that does not require a computationally demanding bootstrapping phase. The techniques allow for unlimited number of addition operations while keeping the ciphertext size constant. However, using the existing schemes, multiplicative homomorphism is not instantly malleable. The current study is an effort to provide a system for designing an fully homomorphic encryption (FHE) utilizing any error correcting code based on coding theory. The development of a code-based homomorphic encryption scheme with homomorphic addition operations is a straightforward approach, however homomorphic multiplication is not possible with existing developments. The current work tries to show that a Reed-Muller (RM) error correcting code may be utilized to successfully develop multiplication operations, therefore transforming it fully homomorphic. While keeping the benefit of computational cost of ECC, the code-based homomorphic encryption method is effectively turned into the RM code -based FHE scheme (RMFHE). The RMFHE structure has been theoretically proven, and extensive experiments at various security levels have been conducted [14]. In this study, the hardness of RMFHE scheme to an attacker is reduced to the intractable decisional synchronized codeword problem (DCSP). en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Homomorphic encryption en_US
dc.subject Coding theory en_US
dc.subject Decisional synchronized codeword problem (DSCP) en_US
dc.subject Intractable en_US
dc.subject Erroneous codewords en_US
dc.subject Error correction codes en_US
dc.subject Indistinguishability under chosen plain text attack (IND-CPA) en_US
dc.title Provable Security of RM Code based FHE Scheme en_US
dc.identifier.doi https://dx.doi.org/10.12785/ijcds/XXXXXX
dc.volume 14 en_US
dc.issue 1 en_US
dc.pagestart 1 en_US
dc.pageend xx en_US
dc.contributor.authorcountry India en_US
dc.contributor.authoraffiliation RGUKT RK Valley en_US
dc.contributor.authoraffiliation JNTUH en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account