scholarly journals Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory

Author(s):  
Koji Nuida

Abstract In CRYPTO 2008, 1 year earlier than Gentry’s pioneering “bootstrapping” technique for the first fully homomorphic encryption (FHE) scheme, Ostrovsky and Skeith III had suggested a completely different approach towards achieving FHE. They showed that the $$\mathsf {NAND}$$ operator can be realized in some non-commutative groups; consequently, homomorphically encrypting the elements of the group will yield an FHE scheme, without ciphertext noise to be bootstrapped. However, no observations on how to homomorphically encrypt the group elements were presented in their paper, and there have been no follow-up studies in the literature. The aim of this paper is to exhibit more clearly what is sufficient and what seems to be effective for constructing FHE schemes based on their approach. First, we prove that it is sufficient to find a surjective homomorphism $$\pi :\widetilde{G} \rightarrow G$$ between finite groups for which bit operators are realized in G and the elements of the kernel of $$\pi $$ are indistinguishable from the general elements of $$\widetilde{G}$$. Secondly, we propose new methodologies to realize bit operators in some groups G. Thirdly, we give an observation that a naive approach using matrix groups would never yield secure FHE due to an attack utilizing the “linearity” of the construction. Then we propose an idea to avoid such “linearity” by using combinatorial group theory. Concretely realizing FHE schemes based on our proposed framework is left as a future research topic.

2012 ◽  
Vol 430-432 ◽  
pp. 834-837
Author(s):  
Xiao Qiang Guo ◽  
Zheng Jun He

First we introduce the history of group theory. Group theory has three main historical sources: number theory, the theory of algebraic equations, and geometry. Secondly, we give the main classes of groups: permutation groups, matrix groups, transformation groups, abstract groups and topological and algebraic groups. Finally, we give two different presentations of a group: combinatorial group theory and geometric group theory.


2021 ◽  
pp. 1-26
Author(s):  
Sonam Mittal ◽  
K.R. Ramkumar

As there is a continuous delivery of big data, the researchers are showing interest in the applications of cloud computing concerning privacy, and security. On the other hand, many researchers and experts of cybersecurity have commenced on a quest for improving the data encryption to the models of big data and applications of cloud computing. Since many users of the cloud become public cloud services, confidentiality turns out to be a more compound problem. To solve the confidentiality problem, cloud clients maintain the data on the public cloud. Under this circumstance, Homomorphic Encryption (HE) appears as a probable solution, in which the information of the client is encrypted on the cloud in such a process that it permits few manipulation operations without decryption. The main intent of this paper is to present the systematic review of research papers published in the field of Fully Homomorphic Encryption (FHE) over the past 10 years. The encryption scheme is considered full when it consists of plaintext, a ciphertext, a keyspace, an encryption algorithm, and a decryption algorithm. Hence, the review mostly concentrates on reviewing more powerful and recent FHE. The contributions using different algorithms in FHE like Lattice-based, integer-based, Learning With Errors (LWE), Ring Learning With Errors (RLWE), and Nth degree Truncated polynomial Ring Units (NTRU) are also discussed. Finally, it highlights the challenges and gaps to be addressed in modeling and learning about competent, effectual, and vigorous FHE for the cloud sector and pays attention to directions for better future research.


2020 ◽  
Vol 14 (1) ◽  
pp. 316-338
Author(s):  
Christina Boura ◽  
Nicolas Gama ◽  
Mariya Georgieva ◽  
Dimitar Jetchev

AbstractThis paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and then by applying efficient switching algorithms. This approach has many practical applications. First and foremost, it becomes an integral tool for the recent standardization initiatives of homomorphic schemes and common APIs. Then, it can be used in many real-life scenarios where operations of different nature and not achievable within a single FHE scheme have to be performed and where it is important to efficiently switch from one scheme to another. Finally, as a byproduct of our analysis we introduce the notion of a FHE module structure, that generalizes the notion of the external product, but can certainly be of independent interest in future research in FHE.


Crisis ◽  
2010 ◽  
Vol 31 (2) ◽  
pp. 109-112 ◽  
Author(s):  
Hui Chen ◽  
Brian L. Mishara ◽  
Xiao Xian Liu

Background: In China, where follow-up with hospitalized attempters is generally lacking, there is a great need for inexpensive and effective means of maintaining contact and decreasing recidivism. Aims: Our objective was to test whether mobile telephone message contacts after discharge would be feasible and acceptable to suicide attempters in China. Methods: Fifteen participants were recruited from suicide attempters seen in the Emergency Department in Wuhan, China, to participate in a pilot study to receive mobile telephone messages after discharge. All participants have access to a mobile telephone, and there is no charge for the user to receive text messages. Results: Most participants (12) considered the text message contacts an acceptable and useful form of help and would like to continue to receive them for a longer period of time. Conclusions: This suggests that, as a low-cost and quick method of intervention in areas where more intensive follow-up is not practical or available, telephone messages contacts are accessible, feasible, and acceptable to suicide attempters. We hope that this will inspire future research on regular and long-term message interventions to prevent recidivism in suicide attempters.


1996 ◽  
Vol 76 (06) ◽  
pp. 0887-0892 ◽  
Author(s):  
Serena Ricotta ◽  
Alfonso lorio ◽  
Pasquale Parise ◽  
Giuseppe G Nenci ◽  
Giancarlo Agnelli

SummaryA high incidence of post-discharge venous thromboembolism in orthopaedic surgery patients has been recently reported drawing further attention to the unresolved issue of the optimal duration of the pharmacological prophylaxis. We performed an overview analysis in order to evaluate the incidence of late occurring clinically overt venous thromboembolism in major orthopaedic surgery patients discharged from the hospital with a negative venography and without further pharmacological prophylaxis. We selected the studies published from January 1974 to December 1995 on the prophylaxis of venous thromboembolism after major orthopaedic surgery fulfilling the following criteria: 1) adoption of pharmacological prophylaxis, 2) performing of a bilateral venography before discharge, 3) interruption of pharmacological prophylaxis at discharge in patients with negative venography, and 4) post-discharge follow-up of the patients for at least four weeks. Out of 31 identified studies, 13 fulfilled the overview criteria. The total number of evaluated patients was 4120. An adequate venography was obtained in 3469 patients (84.1%). In the 2361 patients with negative venography (68.1%), 30 episodes of symptomatic venous thromboembolism after hospital discharge were reported with a resulting cumulative incidence of 1.27% (95% C.I. 0.82-1.72) and a weighted mean incidence of 1.52% (95% C.I. 1.05-1.95). Six cases of pulmonary embolism were reported. Our overview showed a low incidence of clinically overt venous thromboembolism at follow-up in major orthopaedic surgery patients discharged with negative venography. Extending pharmacological prophylaxis in these patients does not appear to be justified. Venous thrombi leading to hospital re-admission are likely to be present but asymptomatic at the time of discharge. Future research should be directed toward improving the accuracy of non invasive diagnostic methods in order to replace venography in the screening of asymptomatic post-operative deep vein thrombosis.


2020 ◽  
Author(s):  
Megha Kolhekar ◽  
Ashish Pandey ◽  
Ayushi Raina ◽  
Rijin Thomas ◽  
Vaibhav Tiwari ◽  
...  

1992 ◽  
Vol 18 (1) ◽  
pp. 67-76 ◽  
Author(s):  
Thomas M. Reimers ◽  
David P. Wacker ◽  
Linda J. Cooper ◽  
Agnes O. Deraad

The authors examined the acceptability ratings of positive reinforcement procedures recommended to parents seen in a pediatric behavior management outpatient clinic. Parental ratings of acceptability were obtained in the clinic and 1, 3, and 6 months following their initial clinic visit. Acceptability variables were examined by group (parents who rated the acceptability of treatments as high vs. low) and by severity (parents who rated their children's behavior problem as severe vs. mild). The relationship between these variables and reported compliance was also examined. Results show that the acceptability variables were useful in differentiating between parents who rated treatments to be more acceptable and parents who rated treatments to be less acceptable. Differences were also observed as a function of behavior problem severity. Significant correlations occurred between acceptability variables and compliance at each of the follow-up points. Results are discussed in relation to the clinical significance of these findings and the impetus they might serve for future research.


2021 ◽  
Author(s):  
Mostefa Kara ◽  
Abdelkader Laouid ◽  
Mohammed Amine Yagoub ◽  
Reinhardt Euler ◽  
Saci Medileh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document