Table 2: Execution times in function of d.
X
X
X
X
X
X
X
X
X
X
d
Procedures
Mean Enc. Time Mean Dec. Time Matrix M Gen. Time Mean KS time
25 0.00046307 s 0.00018298 s 0.136013 s 0.01836656 s
50 0.0009448 s 0.00037313 s 0.740623 s 0.15121927 s
75 0.00128236 s 0.000484769 s 2.084263 s 0.56401619 s
100 0.00175928 s 0.000723319 s 5.392393 s 1.27906641 s
Choosing d = 50, a comparison between different
implementations is done in terms of execution time
and storage overhead in function of circuit depth l.
In Fig.2, different execution times for the three im-
plementations are drawn in function of circuit depth
l and given in log scale just for making results much
clearer. For circuit depth l higher than 6, which is the
complex circuits case faced in real world applications,
Basic DF Without KS is taking the highest execution
time, afterwards comes Modified DF With KS, and
the lower execution time is for Basic DF With KS (for
example in linear scale, with l = 10 and l = 7 respec-
tively, Basic DF Without KS took 6046.26 seconds
respectively 73.619958 seconds, while Modified DF
With KS took 261.21 seconds respectively 31.993578
seconds and Basic DF With KS took 14.57 seconds
respectively 1.733248 seconds). This result is inter-
preted by the fact that for a circuit with high depth,
Basic DF increases the storage overhead of cipher-
texts due to homomorphic multiplications.
Starting from d = 50, cipher dimension grows ex-
ponentially in function of circuit depth l in the case
of Basic DF Without KS (for example for l = 4 Ci-
pher Dimension becomes 785 and for l = 10 Cipher
Dimension becomes 50177), while it remains 50 for
the two others cases while using KS.
The new KS technique increases the efficiency of the
scheme by reducing the storage overhead of cipher-
texts. The difference in execution time between Ba-
sic DF with KS and Modified DF With KS is ex-
pected since the encryption is made more complicated
to leverage the security level.
6 CONCLUSION AND FUTURE
WORK
In this paper, we modified DF in order to be suit-
able for Cloud applications by resolving its two main
problems: sensitivity to known plain-text attack and
cipher expansion after homomorphic multiplication.
The first problem was resolved by changing the en-
cryption procedure. Crypt-analysis has shown that the
concerned attack becomes harder with the modified
version.
The second problem was treated by building a new
technique called KS that reduces the cipher-text di-
mension after each homomorphic multiplication. KS
is based on publishing a matrix M where different se-
cret parameters are encrypted within it based on the
hardness of LW E. Crypt-analysis has shown no se-
cret parameters leakage at the Cloud side.
Different implementations have validated our
work since KS improved the behavior of the scheme
in terms of execution time and storage overhead.
Crypt-analysis of DF has shown that the scheme
(Modified or Basic version) is secure against known
plain-text attack with high values of dimension d and
the public modulus m. Cloud systems can support
these security requirements since they are formed of
big data centers having intensive computation power
and storing capabilities.
Future work will consider applying the Modified
DF under LW E in a secure Cloud computing scenario
for a medical health care and a university applications.
ACKNOWLEDGEMENTS
This work has been partially funded with support
from the Lebanese University.
REFERENCES
Aguilar-Melchor, C., Fau, S., Fontaine, C., Gogniat, G., and
Sirdey, R. (2013). Recent advances in homomorphic
encryption: A possible future for signal processing in
the encrypted domain. IEEE Signal Processing Mag-
azine, 30(2):108–117.
Allgower, E. L., Georg, K., and Miranda, R. (1992).
The method of resultants for computing real solu-
tions of polynomial systems. SIAM J. Numer. Anal.,
29(3):831–844.
Brakerski, Z., Gentry, C., and Vaikuntanathan, V. (2012).
(leveled) fully homomorphic encryption without boot-
strapping. In Proceedings of the 3rd Innovations in
Theoretical Computer Science Conference, ITCS ’12,
pages 309–325, New York, NY, USA. ACM.
Brent, R. P. and McKay, B. D. (1987). Determinants and
ranks of random matrices over zm. Discrete Mathe-
matics, 66(1):35 – 49.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
348