Abstract
Blockchain technology is a key technology in the current information field and has been widely used in various industries. Blockchain technology faces significant challenges in privacy protection while ensuring data immutability and transparency, so it is crucial to implement private computing in blockchain. To target the privacy issues in blockchain, we design a secure multi-party computation (SMPC) protocol DHSMPC based on homomorphic encryption in this paper. On the one hand, homomorphic encryption technology can directly operate on ciphertext, solving the privacy problem in the blockchain. On the other hand, this paper designs the directed decryption function of DHSMPC to resist malicious opponents in the CRS model, so that authorized users who do not participate in the calculation can also access the decryption results of secure multi-party computation. Analytical and experimental results show that DHSMPC has smaller ciphertext size and stronger performance than existing SMPC protocols. The protocol makes it possible to implement complex calculations in multi-party scenarios and is proven to be resistant to various semi-malicious attacks, ensuring data security and privacy. Finally, this article combines the designed DHSMPC protocol with blockchain and cloud computing, showing how to use this solution to achieve trusted data management in specific scenarios.
Keywords: Secure multiparty computation, Multi-key homomorphic encryption, Blockchain
1. Introduction
With the rapid development of cloud computing and blockchain [1], the issues surrounding user data privacy and security have become increasingly prominent. Secure multiparty computation plays a crucial role in blockchain by allowing different participants to collaboratively process and compute data without revealing their respective sensitive information [2]. This technology enhances privacy protection and data security within blockchain networks, enabling blockchain applications to execute complex collaborative tasks and smart contracts while safeguarding user privacy [3]. Secure multiparty computation provides a secure and flexible data processing method for blockchain, facilitating its widespread application in various fields such as finance, healthcare, and supply chain.
However, in distributed scenarios like blockchain [4], there are numerous low-trust users and attackers. It is necessary to provide privacy protection while ensuring secure computation. SMPC protocol relies on multi-key fully homomorphic encryption (MKFHE) [5], [6] has advantages and can further enhance security and privacy. MKFHE scheme provides the following advantages in building SMPC. (1). MKFHE enables computations to be conducted on encrypted data sans decryption necessity [7]. Consequently, within the realm of SMPC, participants are empowered to execute computations on encrypted data whilst preserving the confidentiality of the underlying information, thus safeguarding data privacy [8]. (2). Reduced trust requirements: In SMPC, participants may not fully trust each other. MKFHE eliminates the need for participants to disclose their private data to each other, allowing them to perform computations only through encrypted data [9], [10], reducing the trust requirements on other participants. (3). Simplified protocol design: MKFHE can be used to design more concise and efficient secure multiparty computation protocols [11]. By leveraging homomorphic properties, computations on ciphertexts can be performed without plaintext computation, avoiding cumbersome interactions and key management. (4). Flexible data merging: SMPC protocols [12], [13], [14], [15] typically involve the merging of computation results from multiple participants [16], [17]. MKFHE allows partial computations on encrypted data, facilitating the merging of computation results, allowing participants to maintain control over their data until the results are merged. Thus, it has been widely used in the design of SMPC protocols.
There has been some work on integrating HE with blockchain systems so as to protect data security. In the study of Chen et al. [18], the researchers applied deep learning, blockchain and FHE techniques to in-vehicle self-organizing networks to effectively protect the privacy and trustworthiness of the vehicle. Yang et al. [19] proposed a federated learning approach combining blockchain, HE and reputation and used HE to secure the parameters during the process of completing the training of cipher models by edge nodes with local data. Ali et al. [20] integrated HE with industrial healthcare IoT and used federated blockchain to protect the data security and privacy of EHRs. Ma et al. [21] proposed a data privacy protection scheme across edge blockchain networks using FHE to encrypt the on-chain data and ensure that the on-chain private data is “available and invisible”. Gupta et al. [22] proposed a data privacy protection scheme across edge blockchain networks using FHE to encrypt the on-chain data and ensure that the on-chain private data is “available and invisible”. “Gupta et al. designed a decentralized blockchain-based federated learning framework for personalized recommendations in the consumer electronics domain and leveraged the power of homomorphic encryption to ensure that customer data remains encrypted and free from prying eyes, thus achieving data security and privacy protection in the federated learning process.
MKFHE-based SMPC protocols without a Common Reference String (CRS) setting offer more flexibility in terms of users independently generating keys but do not guarantee security; they can only achieve security in semi-malicious environments. In 2016, Mukherjee and Wichs presented a two-round SMPC protocol constructed using the MW16 scheme, capable of resisting arbitrary semi-malicious adversaries with proven security. The CRS model is a theoretical model used in cryptography for areas such as SMPC and zero-knowledge proofs. The CRS model is an assumption in which all participating parties have access to a public, pre-generated reference string. This string is assumed to be secure and generated by a trusted third party or by some decentralized way to ensure its security and fairness. In cryptography and SMPC research, a “semi-malicious environment” describes a specific threat model. In this environment, the parties involved in the computation follow predefined protocol rules, but they try to get as much additional information as possible from all the data they have access to during the process.
In the year 2017, Wang et al. [23] devised a succinct three-round hierarchical multi-key secure multiparty computation (SMC) protocol, founded upon the GSW13 scheme within the framework of CRS model. Although this protocol adds one round of interaction compared to the MW16 scheme, it has low encryption and decryption complexity, a small ciphertext expansion rate, and does not require running keys. In 2018, Kim et al. [24] proposed a three-round SMPC protocol designed to mitigate semi-malicious adversaries, which is based on the KLP 18 scheme and does not use a CRS setting, yet falls short of ensuring security against fully malicious adversaries. In the year 2020, Tang et al. [25] enhanced the ciphertext expansion technique of the KLP18 scheme by integrating encoding operations derived from Li's scheme [26], subsequently devising a three-round secure multiparty computation (SMPC) protocol grounded on multi-key FHE within a CRS-free framework. This protocol exhibited enhanced efficiency and decreased decryption noise, albeit lacking formal safety assurances in the existence of fully malicious adversaries. Subsequently, in 2021, Tang et al. [27] showcased the key homomorphism property inherent in Li's multi-bit FHE scheme [28], and formulated a three-round SMPC protocol accommodating multi-bit encryption within the CRS model, thereby further streamlining the intricacies associated with non-gate operations.
According to the above related work, it is evident that SMPC protocols based on MKFHE without a CRS setting strengthen the ability for users to independently generate keys. However, their security cannot be guaranteed, and they can only achieve security in semi-malicious environments, unable to resist fully malicious attacks. On the other hand, protocols with a CRS setting face issues of large ciphertext size and low efficiency. This paper addresses these challenges by utilizing a CRS-based MKFHE scheme proposed by Li et al. [29] to design a three-round SMPC protocol resistant to malicious adversaries in the CRS model. This scheme facilitates the use of multi-bit encryption and, compared to existing SMPC protocols in the CRS model, has a smaller ciphertext size, providing overall better performance.
Moreover, in addition to deploying this proposed scheme directly in the blockchain [30], we can also deploy this SMPC scheme on the blockchain and integrate it with cloud computing so that it can provide computing services to other users. The combination leverages the properties of blockchain as an immutable public ledger, providing a secure, transparent, and verifiable computing environment. The inherent security and transparency features of blockchain contribute to ensuring data security and privacy in the metaverse. By deploying the SMPC scheme on a blockchain, we can not only ensure the correctness of computations and the privacy of data but also take advantage of the portability of the solution, allowing it to run on different blockchain platforms.
Our contributions:
1. Aiming at the privacy problem in blockchain, this paper designs a homomorphic encryption-based secure multi-party computation (SMPC) protocol DHSMPC, and designs a directed decryption function of DHSMPC to resist malicious adversaries in the CRS model, so that the authorized users who do not participate in the computation can access the decrypted results of secure multi-party computation.
2. Through analysis and experiments, it is demonstrated that DHSMPC has smaller ciphertext size and stronger performance than existing SMPC protocols, and it is also shown that DHSMPC is able to resist a variety of semi-malicious attacks to ensure the security and privacy of data.
3. Finally, this paper combines the designed DHSMPC protocol with blockchain and cloud computing, and shows how the scheme can be utilized to achieve trusted data management in specific scenarios.
The succeeding chapters of our manuscript are organized as follows. Section 2 delineates the symbols and definitions employed within the framework of the scheme. Section 3 describes the MKFHE on which the constructed secure multiparty computation scheme is based. Section 4 introduces the DHSMPC scheme we construct which is a SMPC protocol based on MKFHE with directional decryption and proves the security of the scheme. Section 5 conducts experiments and performance analysis. Section 6 describes the application of the scheme. Section 7 summarizes the entire paper.
2. Symbol definition
In this paper, we employ to signify the negligible function of λ, where λ is the security parameter. The notation is used to represent the i-th component of vector a. Furthermore, vector a may be conceptualized as a matrix possessing a single row. Additionally, refers to the element located at the intersection of the i-th row and the j-th column within matrix A.
In the present manuscript, we define the degree of as , where represents the Euler totient function and is identified as the m-th cycotomic polynomial. The investigations are conducted over the rings and . Herein, the additive and multiplicative operations are performed on the coefficients of the aforementioned rings component-wise. The integer q, a prime, adheres to the relationship . The notation indicates that the coefficients of x are normalized to the interval under the condition that . The term is employed to denote the distribution of B-bounded errors within the ring R, where coefficients lie within the range , B is a constant bound on the error distribution χ. The expression signifies that the element x is drawn from the probability distribution D, and specifies that x is sampled uniformly from D.
The general learning with errors problem
Given that the Ring Learning with Errors (RLWE) problem may be construed as an instantiation of the Learning with Errors (LWE) problem within the context of rings, the BGV12 scheme consolidates the LWE and RLWE problems into the Generalized Learning with Errors (GLWE) problem. This unification is predicated on the syntactic similarities inherent to both problems.
Definition 1
GLWE Problem: Let λ denote a security parameter. Consider the polynomial ringand its quotient ring, along with an error distributiondefined over R. The problem of Generalized Learning With Errors (GLWE) involves distinguishing between two distinct distributions. In the first distribution, a tupleis uniformly and randomly sampled from. In contrast, for the second distribution, the elementsare initially uniformly drawn from. Subsequently, one uniformly selectsand, and constructs the tuplewhereis set as. The foundational assumption of the GLWE problem asserts the computational infeasibility of distinguishing these two distributions.
Definition 2
LWE & RLWE Problems: as mentioned earlier, the LWE and RLWE problems are syntactically identical, specifically, the LWE and RLWE problems can be viewed as instances of the GLWE problem when and respectively.
Here we present two subroutines (BitDecomp(-) and Powesof (-)) that are widely used in the FHE scheme. Let be an n-dimensional polynomial on and let .
: decompose the n-dimensional vector of integers of modulus q into a binary representation. Specifically, for the input , the output , is obtained, where is the jth bit in the binary representation of (ordered from least significant bit to most significant bit).
: Its output is a vector of n-dimensional modulo q integers by different powers of 2. Specifically, for the input , get the output , .
It is easy to verify that for any , there is , .
Moreover, in the discourse presented herein, we introduce two robust methodologies—key-switching and modulus-switching—as delineated in BGV12. These techniques are adeptly utilized to regulate the dimensionality and noise attributes of ciphertexts throughout the process of homomorphic evaluation. Such strategic management enhances both the computational efficiency and security robustness of FHE schemes.
-
(1)
Key-Switching
The technique of key switching represents a pivotal operation within the realm of Fully Homomorphic Encryption (FHE) schemes, primarily utilized to mitigate the dimensionality of an expanded ciphertext to conventional levels. More comprehensively, it facilitates the transformation of a ciphertext encrypted under a specific secret key , into another ciphertext that remains encrypted under a different secret key , while preserving the integrity of the underlying message. For a given FHE scheme E, and defining , the process of key switching is predominantly governed by two distinct procedures:
E. SwitchKeyGen(: Compute , and outputs the computation of Eq. (1).(1) E. SwitchKey(,q): Compute , and is calculated from Eq. (2).(2) Lemma 1 BGV12 —
Consider a ciphertextunder the secret keyfor a modulus q, where the error term, defined as, has a maximum length of B. Additionally, letdenote the message encoded aswith. Suppose further thatis derived fromby applying a key switching function, represented as, and subsequently, letbe the new error term acquired via.Then, the magnitude of(the new noise component) is constrained to at most, assuming that this error magnitude remains below. Under this condition, the messagecan be correctly retrieved as, thus ensuring the fidelity of the message through the key-switching process. This lemma underscores the impact of key-switching operations on the error characteristics and the stability of the encrypted message within the framework of the cryptographic system. -
(2)
Modulus-Switching
Within the framework of FHE schemes, the growth of noise within ciphertexts due to homomorphic operations necessitates mechanisms to manage and mitigate this escalation. Modulus switching is a technique employed to address this issue by altering the internal modulus of a ciphertext from a higher value to a lower value . This operation adeptly diminishes the noise approximately by , concurrently maintaining the integrity of decryption with the same secret key.
The procedure, denoted as , involves the following steps: Given an input ciphertext and a smaller modulus , the function outputs a new ciphertext . This new ciphertext is calculated to be the element that is closest to , thereby approximating the original ciphertext while scaling down its modulus and correspondingly its associated noise. This technique is irreplaceable in extending the practical utility of FHE by facilitating operations on encrypted data while managing noise to maintain decryption integrity.
Lemma 2 BGV12 —
Consider a ciphertextencrypted under the keyfor a modulus, where the associated error termis derived asand is constrained to a maximum length B. Letbe the message encoded by. Subsequently, letbe obtained through the operation, and define the new error termas.The amplitude of the emergent noise componentis constrained to a maximum of, provided that this amplitude does not exceed. Subject to this condition, the original messageis accurately recovered as.This lemma highlights the efficacy of the Modulus Switch technique in controlling noise growth within homomorphic encryption schemes. The detailed theoretical underpinnings and practical implications of this technique, along with key switching, are elaborated further in BGV12 [28], providing a comprehensive framework for understanding and applying these critical cryptographic operations.
3. Basic DHSMPC
The MKFHE scheme enables secure computation across multiple parties, permitting the evaluated ciphertext to be jointly decrypted by all involved participants. However, situations may occur where it is necessary that the final decryption outcome remains inaccessible to certain participants. In such instances, it is preferable to restrict access to the decryption outcome exclusively to designated and authorized users, regardless of their participation in the computation process. Implementing a directed decryption protocol is crucial to strengthen the data owner's governance over their plaintext. Therefore, this manuscript designs a secure multiparty computation protocol with directed decryption, termed as the DHSMPC protocol, which consists of two parts, section 3.1 and section 3.2. The basic version of the DHSMPC protocol shares similarities first part with reference [29] and the second part with reference [31].
3.1. MKFHE protocol
MKFHE.Setup :Firstly, select a security parameter λ, an upper limit k on the permissible number of keys, and a maximum L for the circuit depth, ensuring a decreasing sequence of moduli . Additionally, designate a small integer p that is coprime to all moduli . The rings and are established as described previously. Define an error distribution over R, bounded by B, with coefficients within the interval . Define , and for each level l in , select random public vectors .
All subsequent algorithms inherently consider the public parameters as input. Define S as an ordered set encapsulating all user indices pertinent to the ciphertext, arranged in ascending order without duplication. Thus, a ciphertext is succinctly represented as a tuple .
MKFHE.KeyGen(pp):The key generation algorithm operates based on the provided public parameters pp, producing keys suitable for a circuit depth l for the j-th party, where l ranges from 0 to L.
-
(1)Sample and subsequently compute secret key as Eq. (3).
(3) -
(2)Randomly select and compute it as Eq. (4) to get user j's public key
(4) - (3)
MKFHE.Enc(): Taking the plaintext as input, the plaintext is encrypted using the public key and a randomly selected error from χ to obtain the ciphertext as Eq. (9):
| (9) |
The resultant tuple , encapsulating the ciphertext along with the index of the keyholder and the encryption level, is then outputted.
MKFHE.Dec(, ): The decryption function is formulated to process a level-l ciphertext , where denotes the set of indices corresponding to the involved parties. The associated secret keys for these indices are given as , each a vector in . The procedure constructs an augmented secret key vector in , then recover the encrypted message as Eq. (10).
| (10) |
MKFHE.Eval(:The evaluation function entails the evaluation of a Boolean circuit C over a sequence of ciphertexts , all of which are assumed to reside at the same level l. If necessary, key switching and modulus switching are applied to ensure uniformity in the encryption level. Let . The evaluation process proceeds as follows:
-
(1)
For each , employ RBGV.CTExt() to obtain an extended ciphertext under the extended secret key .
-
(2)Generate the evaluation keys by computing Eq. (11).
(11) -
(3)
Execute the evaluation of the circuit C utilizing the two fundamental homomorphic operations, namely and .
3.2. Directed decryption protocol
In this study, we integrate the directed decryption protocol with MKFHE to establish the foundational Directed Homomorphic Secure Multi-Party Computation (DHSMPC) scheme. This configuration permits users to designate the intended recipient of the final decryption result during the homomorphic evaluation process, thereby augmenting the data owner's authority over their plaintext.
In the context where a level-l ciphertext, denoted as , requires decryption, and where represents the corresponding set of user indices involved with the plaintext computed through a Boolean circuit C, consider the scenario wherein the target user designated as i is to receive the final decrypted output. This user receives the ciphertext c, and the decryption protocol proceeds as outlined below:
-
(1)Semi-Decryption: Each user within the set S performs a partial decryption on the ciphertext c using their unique extended keys. For instance, user with secret key , employs the extended key to obtain a semi-decrypted result , calculated as Eq. (12).
(12) Similar operations are conducted by other users in S.
-
(2)Encryption of Zero by the Target User: Each user in S computes the encryption of zero using the public key of user i, designated as . As shown in Eq. (13), the encryption result for user is:
(13) Then, user computes the sum of his semi-decryption result and the encryption , which is derived by Eq. (14):(14) Following the same procedure, the other users compute and gather , which are then transmitted to user i.
-
(3)Final decryption: Upon receipt of , user i calculates the summation , and then computes the final decryption result as Eq. (15).
(15)
Lemma 3: Define B as the noise boundary of an initial RBGV ciphertext, and as the noise boundary for a ciphertext at level l within the RBGV scheme. The directed decryption process is demonstrated to be correct if Eq. (16)
| (16) |
holds. This inequality ensures that the accumulated noise from multiple decryption steps remains within acceptable limits to maintain the integrity of decryption.
It should be noted that within existing MKFHE frameworks, the results of homomorphic evaluations are generally confined to decryption exclusively by users involved in the evaluation process. The directed decryption protocol introduced in this manuscript extends this capability, permitting any duly authorized user to decrypt the resultant ciphertext. Furthermore, this protocol does not incorporate homomorphic multiplication, obviating the need for additional techniques commonly employed to manage noise growth during such operations. This simplification contributes to the robustness and efficiency of the proposed decryption methodology.
4. Our SMPC protocol enhanced DHSMPC
As shown in Fig. 1, the most notable feature of DHSMPC constructed in this paper, compared to other schemes, is the inclusion of a directional decryption algorithm. As a result, the secure multiparty computation protocol built on this scheme can operate in two modes. (1) DHSMPC with collective decryption; (2) DHSMPC scheme with direct decryption. In second mode, only the target user possesses the decryption capability for the final result.
Figure 1.
DHSMPC with directed decryption.
4.1. DHSMPC with collective decryption
(1). Run , all participants have the same parameter settings
(2). Each participant has input
Round one: Each participant performs the following steps
(1). Generate and component for
(2). Obtained through encrypt by
(3). Announce and
Round two: Each participant receives and of other participants and performs the following steps:
(1). Homomorphic evaluation was performed according to Eq. (17) to obtain the evaluation ciphertext
| (17) |
(2). Each participant performs semi-decryption
(3). Publish semi decryption results, all parties obtain results by decryption
4.2. DHSMPC with direct decryption
(1). Setup: Run , all participants have the same parameter settings
(2). Each participant has input
Round one: Each participant performs the following steps
1. Generate and component for
2. Obtained through encrypt by
3. Announce and
Round two: Each participant receives and of other participants and performs the following steps:
(1). Homomorphic evaluation was performed according to Eq. (18) to obtain the evaluation ciphertext.
| (18) |
(2). Semi decryption by all parties involved.
(3). Each participant encrypts 0 using the target user's public key and adds it into semi decrypted ciphertext.
(4). All participants will receive the encrypted 0 and half decrypted ciphertext and send it to the target user.
Round three: The target user receives semi decrypted ciphertext from all users and performs the following steps: The target user executes Final decryption to obtain the decryption result.
4.3. Security proof
In the realm of multi-party secure computing, adversaries are typically categorized into several models. The first type is the semi-honest model, wherein all participants conform to the protocol specifications without active alterations to the protocol or data. However, they may retain intermediate results from the computations to deduce the confidential data of other participants. The second type is the semi-malicious model, characterized by adversaries who decide whether to adhere to the protocol based on the input data and certain stochastic elements. The third type encompasses malicious models, in which participants may freely manipulate or disclose protocols and data, and are even capable of obstructing the normal execution of protocols.
In the context of SMPC, a protocol that is secure within a semi-malicious model can be elevated to security in a malicious model through the application of non-interactive zero-knowledge proofs (NIZKs) in the CRS model. Thus, our analysis primarily focuses on the security of the MPC protocol in the semi-malicious model.
Correctness: The overall architecture of our scheme mirrors that of MKFHE, with modifications confined to the decryption component.
Consider a ciphertext C that encrypts a bit μ. Upon evaluating the ciphertext with the secret key ss, and based on the correctness analysis of non-threshold MKFHE, the Eq. (19) holds:
| (19) |
where . If the partial decryption adheres to the preceding structure, then as shown in Eq. (20):
| (20) |
Here, , and , with . Setting and ensuring , the accuracy of the decryption is thereby assured.
Definition 3
Security of DHSMPC protocol: Let be the advantage of the adversary in successfully forging ciphertexts. The scheme is considered to have ciphertext indistinguishability when the Eq. (21) holds:
(21)
Game based proof is a universal method for proving the security of cryptographic protocols. It describes the behavior of attackers in the form of a game and proves the security of the protocol by setting game testing conditions and restrictions. In a semi malicious environment, we can use game proof based methods to prove the security of the scheme. Specifically, we can use the impersonation model to test the security of the protocol. In this model, attackers can impersonate the user's identity to participate in the protocol, but cannot change or crack the ciphertext.
: Baseline Game
(1). Attackers can freely choose n public key pks, PKE and its own private key SKG
(2). The game will randomly generate a plaintext m and encrypt it using the n public keys mentioned above to obtain the ciphertext q=E (pk,. m).
(3). The game randomly selects a set s that includes both the attacker and other users, and sends the public key pk and ciphertext q of all users in S to the attacker, while sending m to other users.
(4). The attacker needs to output plaintext m'
(5). The game determines whether m'=m is valid. If true, the game is successful; otherwise, the game fails.
: Attackers can impersonate a user in user group S's game
Based on game 0, we further assume that the attacker can impersonate a user in user group S. Unlike Game 0, in Game 1, attackers can know the user ID corresponding to a ciphertext and can choose to impersonate the user's identity to completely replace the real user in the protocol.
Drawing from the conceptual frameworks delineated in the aforementioned games, we employ the security paradigms of these games to validate the security of the proposed scheme within a semi-malicious environment. If the adversary fails to mount a successful attack in Game 1, it can be asserted that the scheme upholds IND-CPA security in a semi-malicious setting.
Security proof under the semi-malicious model encompasses the following games:
(1) Game : In the authentic environment denoted as Z, a semi-malicious adversary engages in protocol execution.
(2) Game : Analogous to Game , the principal distinction lies in the presumption that all private keys are apprehended by subsequent to the second round, and in the third round, simulated partial decryption is employed in lieu of genuine decryption for publication.
(3) Game : Bearing similarity to Game , yet differing in the second round where the honest party opts to encrypt and release a constant zero instead of actual input data.
Simulation: The simulator, denoted as , receives the keys , the evaluated ciphertext , and the encrypted output value using as inputs. It simulates the decryption of part of the output as Eq. (22):
| (22) |
where and . As shown in Eq. (23), to evaluate indistinguishability, observe that if represents the true partial decryption, it decrypts to:
| (23) |
The distinction between the actual value and the simulated value lies in the noise e, which adheres to . According to lemma 4, the distributions of and are statistically close, as each coefficient of esm is uniformly sampled within , where , ensuring . Hence, simulated partial decryption and actual partial decryption are statistically indistinguishable.
Lemma 4. Let positive integers and and let be a fixed integer. Further let the integer be chosen by uniform randomization. If the condition is satisfied, then the distribution of the integers is statistically indistinguishable from the distribution of . Similarly, when considering the ring , if is a stationary ring element and satisfies , and if the ring element with coefficients chosen uniformly at random from the interval . The distribution of is also statistically indistinguishable from that of under the condition .
Drawing from the MW16 scheme, if the SMC protocol in the CRS model is substantiated as secure within a semi-malicious environment, it can be extrapolated to a malicious model employing methodologies such as NIZKs.
This experiment compares the CDKS19 scheme, CZW17 scheme, and the secure multiparty computation proposed in this paper. The aim is to investigate the strengths and weaknesses of the proposed scheme and to use the findings for future optimization.
The experiment maintains an equal number of participants, comparing the space and time complexity consumption of the two existing schemes and the proposed scheme under different dimensions of challenging assumptions. The performance of the proposed scheme surpasses CCS19 and CDKS19 until the dimension of challenging assumptions reaches a certain threshold (correlated with the number of participants). Beyond this threshold, the performance of the proposed scheme falls between CCS19 and CDKS-19.
5. Experiment and analysis
5.1. Experiment
From the experimental observations presented in Fig. 2, it is discernible that the efficiency of the proposed scheme, in relation to challenging assumptions, exhibits an enhancement concomitant with an increase in dimensionality. However, considering that as the dimension of challenging assumptions increases, the parameters in the proposed scheme also increase, leading to increased storage overhead in practical usage. Therefore, taking the efficiency and storage overhead of the proposed scheme and CCS19 scheme as an example, the point at which both schemes exhibit similar performance is the optimal efficiency and storage overhead node for the proposed scheme. The position of this node is influenced by the number of participants, showing a positive correlation: the more participants, the larger the value of this node.
Figure 2.

Efficiency comparison.
Fig. 3 presents a comparative analysis of the storage overheads associated with our proposed scheme, CCS19, and CDKS19. It is evident from the data that the storage overhead incurred by our proposed scheme is substantially greater than that observed in the other two schemes utilized for comparison.
Figure 3.

Storage consumption comparison.
In order to support directional decryption techniques, our proposed scheme includes additional settings and parameters compared to the other two schem-es in the experiment. This results in a sacrifice of some efficiency and overhead. Consequently, the performance of our proposed scheme in the experimental evaluation did not exceed that of the CDKS19 scheme.
5.2. Performance analysis
The SMPC protocol developed in this article, along with the protocol described in reference [9], are both predicated on MKFHE, specifically of the BGV (Brakerski-Gentry-Vaikuntanathan) type. This foundational similarity endows both schemes with specific advantages in terms of encrypting cyclic elements, optimizing the ciphertext-to-plaintext ratio, and facilitating computation leveraging the Chinese remainder theorem.
As shown in Table 1. Although the protocol proposed in this article has an additional round of three compared to the two-round scheme in reference [9], the multi key FHE used in this article for constructing SMPC optimizes the ciphertext extension and reduces the ciphertext size by half compared to reference [9]. The unique evaluation key generation method significantly reduces the input and output volume. Moreover, compared to traditional SMPC protocols, the SMPC protocol proposed in this article with a directed decryption protocol can choose between directed decryption or decryption, which can be applied to more scenarios.
Table 1.
Comparison.
| Protocol | Basic | Round | Ciphertext Ratio | Cipertext Size | Evaluation Key |
|---|---|---|---|---|---|
| Che et al. [5] | BGV12 | 2 | O(1) | 2kn | 4n |
| Ours | BGV12 | 3 | O(1) | (k+1)n | n |
To address the lack of efficiency of this scheme, one possible direction of improvement is to combine the DHSMPC protocol with the Trusted Execution Environment (TEE), and utilize the secure and isolated environment provided by the TEE to accelerate and protect the sensitive computation process in the SMC. For example, we can transfer the homomorphic encryption evaluation step in the DHSMPC protocol to be performed in the TEE. By feeding the data directly into the TEE and performing all the sensitive computations in it, the exposure of the data to the external environment can be minimized since the data is only decrypted and processed inside the TEE; at the same time, the TEE has direct access to the hardware resources, which provides a higher computational efficiency compared to a fully software-implemented SMC. Higher computational efficiency, the computation within the TEE can use hardware acceleration features, such as encryption and decryption engines, which makes it faster than the traditional, fully software-based SMC, thus achieving efficiency improvement while ensuring the security of the DHSMPC protocol, so the use of the TEE to optimize the DHSMPC protocol will be the focus of our subsequent work.
6. Application of our DHSMPC in blockchain
In this section, we initially introduce an application exemplar of our proposed scheme within the framework of a blockchain scenario. Subsequently, we will provide a detailed explanation of how the scheme is utilized to achieve trusted data management.
The system architecture comprises a Trusted Authority (TA), a Cloud Server (CS), and Data Holders (DH), as illustrated in Fig. 4. Trusted Authority: The Trusted Authority is considered responsible for completing identity registration and authentication for each data holder in the blockchain during the registration phase. It also manages the recording and reporting of malicious nodes.
Figure 4.
System model of DHSMPC in blockchain.
Cloud Server (CS): The Cloud Server is a cloud server with a certain storage capacity and is responsible for storing user-encrypted data. Data Holder (DH): Data holders are users of data resources and act as nodes in the blockchain. They can synchronize block information generated in the cloud. By adopting a combination of on-chain and off-chain approaches, the off-chain part handles data generation and key generation, using homomorphic encryption technology to encrypt the data. Computing tasks are placed on the blockchain to ensure transparency. All steps of the computation can be publicly verified, and all inputs and outputs of the data are encrypted to ensure data privacy.
In the model, a cloud server is used as an accounting node. All data-holding users form a group with reliable data management and computation requirements. Due to the high cost of local storage, this group can effectively reduce costs by renting cloud servers. In our model, data holders upload encrypted data to the cloud. While storing the data, the cloud generates data blocks according to predefined rules. When a data holder needs to perform a computation using the data, a request is sent to all users. The users that fulfill the requirements form a secure multiparty computation group and perform the computation according to the protocol. The detailed process is as follows:
(1). Initially, data-holding users complete registration in the blockchain, obtaining the key generation program for the corresponding secure multiparty computation protocol. Subsequently, they generate their respective keys (sk, pk).
(2). Each data-holding user encrypts their data and stores it in the cloud, generating the corresponding data blocks.
(3). Data-holding users with computation requirements send out requests for their computation needs. Upon receiving a request, other users retrieve their data based on the requirements. Users that meet the criteria form a task group to perform a complete SMPC. Each user contributes the data from the relevant data blocks to the agreed-upon computation model. The computation and decryption are carried out according to the protocol. Depending on the specific requirements, individual computation needs initiate a SMPC protocol with directional decryption, while collective computation needs initiate a SMPC protocol with collective decryption. Each protocol initiation process is recorded on the blockchain, ensuring public transparency and data security.
In Fig. 5, blockchain is utilized to provide secure multiparty computation services, offering a secure and reliable solution not only for web services but also for the data security and privacy protection of these web services. This deployment employs a decentralized approach to store and process data, ensuring the immutability of data. Simultaneously, the integration of secure multiparty computation technology effectively guarantees the confidentiality and security of data among all parties involved in the data processing.
Figure 5.
Secure multi-party computing services deployed on blockchain.
The advantages of secure multiparty computation technology lie in its ability to handle data involving multiple parties, ensuring the privacy and security of the data, while also exhibiting high portability. By leveraging blockchain technology, services are distributed across multiple nodes, inherently possessing high portability. Moreover, deploying secure multiparty computation algorithms on the blockchain using smart contract technology allows them to run on any platform through API, further enhancing portability and scalability.
However, it is crucial to note that the combination of secure multiparty computation and blockchain imposes higher requirements on processing speed, data scalability, and the executability of algorithms. Therefore, in practical applications, algorithm optimization based on specific circumstances is necessary, leveraging hardware devices to enhance processing speed and scalability. Simultaneously, strict security measures must be implemented to guard against various security attacks.
7. Discussion
With the continuous growth of digital transformation and the demand for data privacy protection, the application potential of full homomorphic encryption is becoming more and more prominent. The efficient fully homomorphic encryption protocol DHSMPC proposed in this study provides a new solution for handling sensitive information while ensuring data security and operational efficiency. In the future, this protocol is expected to play an important role in the field of federated learning, especially when dealing with cross-agency data collaboration, to ensure data privacy protection and security.
In a federated learning environment, different participants can jointly train models without directly exchanging data, and all parties only need to upload encrypted local updates to the shared model. The DHSMPC protocol, through its small ciphertext expansion rate and efficient homomorphic operation, can significantly reduce communication and computation costs, enabling efficient operation even in resource-constrained scenarios. A more feasible direction is to use the DHSMPC protocol to encrypt the local model gradients of each participant in federated learning and use its support for homomorphic evaluation to aggregate the ciphertexts of the model gradients at a central server, which is a more secure scheme than the mainstream homomorphic encryption algorithms that are currently being applied with federated learning while maintaining a certain level of efficiency. In addition, the protocol's ability to withstand malicious attacks makes it promising for a wide range of applications in industries where data security is particularly sensitive, such as finance, healthcare and personal privacy data processing.
Looking ahead, with technological advances and algorithmic optimizations, the application of the DHSMPC protocol in federated learning and other multi-party secure computing scenarios will be further expanded, especially in combination with blockchain technology, which can provide even more robust and secure support in decentralized data transactions and management. This will not only drive the development of federated learning technology, but also promote the innovation and maturity of the entire intelligent data processing field.
8. Conclusion
Leveraging an efficient FHE scheme, the paper introduces a hierarchical multi-bit, multi-key SMPC (DHSMPC) under the PRC model. This protocol comprises three communication rounds and has been validated for security in semi-honest and semi-malicious environments, as well as demonstrating resistance to malicious adversaries in the CRS model. Compared with existing protocols, the proposed protocol has smaller ciphertext expansion rate, significantly reduces the number of homomorphic operations for multi-bit encryption, has smaller ciphertext size, and efficiently generates evaluation keys. Finally, this article shows how to use this solution to achieve trusted data management in specific scenarios by combining it with blockchain and cloud computing.
CRediT authorship contribution statement
Haijun Bao: Writing – original draft, Software, Methodology, Conceptualization. Minghao Yuan: Writing – review & editing, Investigation, Data curation. Haitao Deng: Writing – original draft, Software, Data curation. Jiang Xu: Project administration, Funding acquisition. Yekang Zhao: Writing – review & editing, Supervision, Resources, Conceptualization.
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgements
This work is supported by the Key R&D and Transformation Plan of Qinghai Province (No. 2022-QY-218). And this work is also supported by the National Natural Science Foundation of China (No. 62072249).
Footnotes
This work is supported by the Key R&D and Transformation Plan of Qinghai Province (No. 2022-QY-218). And this work is also supported by the National Natural Science Foundation of China (No. 62072249).
Data availability
The data that has been used is confidential.
References
- 1.Gai K., Guo J., Zhu L., Yu S. Blockchain meets cloud computing: a survey. IEEE Commun. Surv. Tutor. 2020;22(3):2009–2030. [Google Scholar]
- 2.Guo C., Katz J., Wang X., Yu Y. 2020 IEEE Symposium on Security and Privacy (SP) IEEE; 2020. Efficient and secure multiparty computation from fixed-key block ciphers; pp. 825–841. [Google Scholar]
- 3.Benhamouda F., Halevi S., Halevi T. Supporting private data on hyperledger fabric with secure multiparty computation. IBM J. Res. Dev. 2019;63(2/3):1–8. [Google Scholar]
- 4.Ren Y., Leng Y., Qi J., Sharma P.K., Wang J., Almakhadmeh Z., Tolba A. Multiple cloud storage mechanism based on blockchain in smart homes. Future Gener. Comput. Syst. 2021;115:115. [Google Scholar]
- 5.López-Alt A., Tromer E., Vaikuntanathan V. Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing. 2012. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption; pp. 1219–1234. [Google Scholar]
- 6.Mukherjee P., Wichs D. Two round multiparty computation via multi-key fhe. Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques; Vienna, Austria, May 8–12, 2016; Springer; 2016. pp. 735–763. [Google Scholar]
- 7.Brakerski Z., Perlman R. Annual International Cryptology Conference. Springer; 2016. Lattice-based fully dynamic multi-key fhe with short ciphertexts; pp. 190–213. [Google Scholar]
- 8.Sun L., Wang Y., Ren Y., Xia F. Path signature-based xai-enabled network time series classification. Sci. China Inf. Sci. 2024:1–15. doi: 10.1007/s11432-023-3978-y. [DOI] [Google Scholar]
- 9.Chen L., Zhang Z., Wang X. Batched multi-hop multi-key fhe from ring-lwe with compact ciphertext extension. Theory of Cryptography: 15th International Conference; TCC 2017, Baltimore, MD, USA, November 12-15, 2017; Springer; 2017. pp. 597–627. [Google Scholar]
- 10.Chen H., Chillotti I., Song Y. Multi-key homomorphic encryption from tfhe. Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security; Kobe, Japan, December 8–12, 2019; Springer; 2019. pp. 446–472. [Google Scholar]
- 11.Yao A.C. 23rd Annual Symposium on Foundations of Computer Science (Sfcs 1982) IEEE; 1982. Protocols for secure computations; pp. 160–164. [Google Scholar]
- 12.Zhang Y. Beijing University of Posts and Telecommunications; 2020. Research on anonymous voting system based on blockchain. Master's thesis. [Google Scholar]
- 13.Wu H. Xi'an University of Electronic Science and Technology; 2020. Research and design of efficient and verifiable electronic election systems. Master's thesis. [Google Scholar]
- 14.Choi S., Kang J., Chung K.S. Design of blockchain based e-voting system for vote requirements. J. Phys. Conf. Ser. 2021;1944 IOP Publishing. [Google Scholar]
- 15.Geetha S., Sathya S., Sakthi S.T. A secure digital e-voting using blockchain technology. J. Phys. Conf. Ser. 2021;1916 IOP Publishing. [Google Scholar]
- 16.Annessi R., Fast E. 2021 IEEE International Conference on Blockchain (Blockchain) IEEE; 2021. Improving security for users of decentralized exchanges through multiparty computation; pp. 229–236. [Google Scholar]
- 17.Bag S., Hao F., Shahandashti S.F., Ray I.G. Seal: sealed-bid auction without auctioneers. IEEE Trans. Inf. Forensics Secur. 2019;15:2042–2052. [Google Scholar]
- 18.Chen J., Li K., Philip S.Y. Privacy-preserving deep learning model for decentralized vanets using fully homomorphic encryption and blockchain. IEEE Trans. Intell. Transp. Syst. 2021;23(8):11633–11642. [Google Scholar]
- 19.Yang R., Zhao T., Yu F.R., Li M., Zhang D., Zhao X. Blockchain-based federated learning with enhanced privacy and security using homomorphic encryption and reputation. IEEE Int. Things J. 2024 [Google Scholar]
- 20.Ali A., Pasha M.F., Guerrieri A., Guzzo A., Sun X., Saeed A., Hussain A., Fortino G. A novel homomorphic encryption and consortium blockchain-based hybrid deep learning model for industrial internet of medical things. IEEE Trans. Netw. Sci. Eng. 2023 [Google Scholar]
- 21.Ma Z., Wang J., Gai K., Duan P., Zhang Y., Luo S. Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network. J. Syst. Archit. 2023;134 [Google Scholar]
- 22.Gupta B.B., Gaurav A., Arya V. Secure and privacy-preserving decentralized federated learning for personalized recommendations in consumer electronics using blockchain and homomorphic encryption. IEEE Trans. Consum. Electron. 2023 [Google Scholar]
- 23.H.-Y. Wang, Y. Feng, L.-Z. Zhao, S.-J. Tang, et al., A secure multi-party computation protocol on the basis of multi-key homomorphism, 2017.
- 24.Kim E., Lee H.-S., Park J. Towards round-optimal secure multiparty computations: multikey fhe without a crs. Information Security and Privacy: 23rd Australasian Conference; ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018; Springer; 2018. pp. 101–113. [Google Scholar]
- 25.Tang C., Hu Y., Li X. Three round secure multiparty computation based on multi-key full-homomorphic encryption without crs. J. Cryptogr. 2021;8:273–281. [Google Scholar]
- 26.Li Z. Lattice-based fully homomorphic encryption and its applications [d] J. Harbin Eng. Univ. 2018 [Google Scholar]
- 27.Tang C., Hu Y. Secure multi-party computation based on multi bit homomorphic encryption. Chinese J. Comput. 2021 [Google Scholar]
- 28.Li Z., Ma C., Morais E., Du G. International Conference on Information Security and Cryptology. Springer; 2016. Multi-bit leveled homomorphic encryption via-based; pp. 221–242. [Google Scholar]
- 29.Li N., Zhou T., Yang X., Han Y., Liu W., Tu G. Efficient multi-key fhe with short extended ciphertexts and directed decryption protocol. IEEE Access. 2019;7:56724–56732. [Google Scholar]
- 30.Ren Y., Leng Y., Cheng Y., Wang J. Secure data storage based on blockchain and coding in edge computing. Math. Biosci. Eng. 2019;16(4):1874–1892. doi: 10.3934/mbe.2019091. [DOI] [PubMed] [Google Scholar]
- 31.Ningbo L., Haonan Z., Xiaoliang C., Xiaoyuan Y. Design of directional decryption protocol based on multi-key fully homomorphic encryption in cloud environment. Netinfo Secur. 2020;20(06):10–16. doi: 10.3969/j.issn.1671-1122.2020.06.002. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The data that has been used is confidential.



