Next Article in Journal
An Axial Compression Transformer for Efficient Human Pose Estimation
Previous Article in Journal
A Few-Shot Learning Framework for Depth Completion Based on Self-Training with Noise and Pixel-Wise Knowledge Distillation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing

School of Computer and Electronic Information, Guangxi University, Nanning 530004, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(9), 4745; https://doi.org/10.3390/app15094745
Submission received: 11 March 2025 / Revised: 14 April 2025 / Accepted: 23 April 2025 / Published: 24 April 2025

Abstract

Threshold multi-party fully homomorphic encryption (TMFHE) schemes enable efficient computation to be performed on sensitive data while maintaining privacy. These schemes allow a subset of parties to perform threshold decryption of evaluation results via a distributed protocol without the need for a trusted dealer, and provide a degree of fault tolerance against a set of corrupted parties. However, existing TMFHE schemes can only provide correctness and security against honest-but-curious parties. We construct a compact TMFHE scheme based on the Learning with Errors (LWE) problem. The scheme applies Shamir secret sharing and share resharing to support an arbitrary t-out-of-N threshold access structure, and enables non-interactive reconstruction of secret key shares using additive shares derived from the current set of online participants. Furthermore, the scheme implements commitment and non-interactive zero-knowledge (NIZK) proof techniques to verify the TMFHE operations. Finally, our experiments demonstrate that the proposed scheme achieves active security against malicious adversaries. It overcomes the limitation of existing TMFHE schemes that can only guarantee correct computation under passive semi-honest adversaries.
Keywords: multi-party fully homomorphic encryption; share resharing; commitments; non-interactive zero-knowledge proofs; malicious adversary multi-party fully homomorphic encryption; share resharing; commitments; non-interactive zero-knowledge proofs; malicious adversary

Share and Cite

MDPI and ACS Style

Xie, Y.; Huang, R.; Qiu, J. Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing. Appl. Sci. 2025, 15, 4745. https://doi.org/10.3390/app15094745

AMA Style

Xie Y, Huang R, Qiu J. Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing. Applied Sciences. 2025; 15(9):4745. https://doi.org/10.3390/app15094745

Chicago/Turabian Style

Xie, Yuqi, Ruwei Huang, and Junbin Qiu. 2025. "Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing" Applied Sciences 15, no. 9: 4745. https://doi.org/10.3390/app15094745

APA Style

Xie, Y., Huang, R., & Qiu, J. (2025). Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing. Applied Sciences, 15(9), 4745. https://doi.org/10.3390/app15094745

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop