Conference paper Open Access

# Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts

del Pino, Rafael; Lyubashevsky, Vadim; Seiler, Gregor

### JSON Export

{
"files": [
{
"self": "https://zenodo.org/api/files/3db98d32-ffd0-4f6f-a358-a967c69bc597/15-Short-Discrete-Log-Proofs-for-FHE-and-Ring-LWE-Ciphertexts.pdf"
},
"checksum": "md5:d871127c95d0a249374c82f0de2a5d0b",
"bucket": "3db98d32-ffd0-4f6f-a358-a967c69bc597",
"key": "15-Short-Discrete-Log-Proofs-for-FHE-and-Ring-LWE-Ciphertexts.pdf",
"type": "pdf",
"size": 513956
}
],
"owners": [
41483
],
"doi": "10.1007/978-3-030-17253-4_12",
"stats": {
"unique_views": 70.0,
"views": 73.0,
"version_views": 73.0,
"version_unique_views": 70.0,
"volume": 36490876.0,
"version_volume": 36490876.0
},
"doi": "https://doi.org/10.1007/978-3-030-17253-4_12",
"latest_html": "https://zenodo.org/record/3355457",
"bucket": "https://zenodo.org/api/files/3db98d32-ffd0-4f6f-a358-a967c69bc597",
"html": "https://zenodo.org/record/3355457",
"latest": "https://zenodo.org/api/records/3355457"
},
"created": "2019-07-30T14:12:16.154056+00:00",
"updated": "2020-01-20T17:30:40.915226+00:00",
"conceptrecid": "3355456",
"revision": 5,
"id": 3355457,
"access_right_category": "success",
"doi": "10.1007/978-3-030-17253-4_12",
"description": "<p>In applications of fully-homomorphic encryption (FHE) that involve computation on encryptions produced by several users, it is important that each user proves that her input is indeed well-formed. This may simply mean that the inputs are valid FHE ciphertexts or, more generally, that the plaintexts m additionally satisfy f(m) = 1 for some public function f. The most efficient FHE schemes are based on the hardness of the Ring-LWE problem and so a natural solution would be to use lattice-based zero-knowledge proofs for proving properties about the ciphertext. Such methods, however, require larger-than-necessary parameters and result in rather long proofs, especially when proving general relationships.</p>\n\n<p>In this paper, we show that one can get much shorter proofs (roughly 1.25KB) by first creating a Pedersen commitment from the vector corresponding to the randomness and plaintext of the FHE ciphertext. To prove validity of the ciphertext, one can then prove that this commitment is indeed to the message and randomness and these values are in the correct range. Our protocol utilizes a connection between polynomial operations in the lattice scheme and inner product proofs for Pedersen commitments of B&uml;unz et al. (S&amp;P 2018). Furthermore, our proof of equality between the ciphertext and the commitment is very amenable to amortization &ndash; proving the equivalence of k ciphertext / commitment pairs only requires an additive factor of O(log k) extra space than for one such proof. For proving additional properties of the plaintext(s), one can then directly use the logarithmic-space proofs of Bootle et al. (Eurocrypt 2016) and B&uml;unz et al. (IEEE S&amp;P 2018) for proving arbitrary relations of<br>\ndiscrete log commitment.</p>\n\n<p>Our technique is not restricted to FHE ciphertexts and can be applied to proving many other relations that arise in lattice-based cryptography. For example, we can create very efficient verifiable encryption / decryption schemes with short proofs in which confidentiality is based on the hardness of Ring-LWE while the soundness is based on the discrete logarithm problem. While such proofs are not fully postquantum, they are adequate in scenarios where secrecy needs to be future-proofed, but one only needs<br>\nto be convinced of the validity of the proof in the pre-quantum era. We furthermore show that our zero-knowledge protocol can be easily modified to have the property that breaking soundness implies solving discrete log in a short amount of time. Since building quantum computers capable of solving discrete logarithm in seconds requires overcoming many more fundamental challenges, such proofs may even remain valid in the post-quantum era.</p>",
"language": "eng",
"title": "Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts",
"id": "CC-BY-4.0"
},
"relations": {
"version": [
{
"count": 1,
"index": 0,
"parent": {
"pid_type": "recid",
"pid_value": "3355456"
},
"is_last": true,
"last_child": {
"pid_type": "recid",
"pid_value": "3355457"
}
}
]
},
"communities": [
{
"id": "futuretpm-h2020"
}
],
"publication_date": "2019-01-18",
"creators": [
{
"name": "del Pino, Rafael"
},
{
},
{
"name": "Seiler, Gregor"
}
],
"meeting": {
"title": "International Conference on Practice and Theory of Public Key Cryptography"
},
"access_right": "open",
"resource_type": {
"subtype": "conferencepaper",
"type": "publication",
"title": "Conference paper"
}
}
}
73
71
views