Post-Quantum Secure Aggregation via Code-Based Homomorphic Encryption

📅 2026-01-19
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the challenge of preserving individual contribution privacy in multi-party input aggregation under post-quantum security requirements. It proposes the first code-based homomorphic encryption scheme grounded in the Learning Parity with Noise (LPN) assumption, establishing a secure aggregation framework that supports additive homomorphism over both keys and messages. By introducing the Hint-LPN assumption—proven equivalent to standard LPN—alongside a secret-sharing-driven committee decryption mechanism and optimizations via the Chinese Remainder Theorem, the scheme substantially reduces communication overhead. Under specific parameter settings, it outperforms information-theoretically secure protocols, achieving superior communication efficiency while maintaining post-quantum security and overcoming limitations inherent in conventional lattice-based approaches.

Technology Category

Application Category

📝 Abstract
Secure aggregation enables aggregation of inputs from multiple parties without revealing individual contributions to the server or other clients. Existing post-quantum approaches based on homomorphic encryption offer practical efficiency but predominantly rely on lattice-based hardness assumptions. We present a code-based alternative for secure aggregation by instantiating a general framework based on key- and message-additive homomorphic encryption under the Learning Parity with Noise (LPN) assumption. Our construction employs a committee-based decryptor realized via secret sharing and incorporates a Chinese Remainder Theorem (CRT)-based optimization to reduce the communication costs of LPN-based instantiations. We analyze the security of the proposed scheme under a new Hint-LPN assumption and show that it is equivalent to standard LPN for suitable parameters. Finally, we evaluate performance and identify regimes in which our approach outperforms information-theoretically secure aggregation protocols.
Problem

Research questions and friction points this paper is trying to address.

secure aggregation
post-quantum cryptography
code-based cryptography
homomorphic encryption
LPN assumption
Innovation

Methods, ideas, or system contributions that make the work stand out.

code-based cryptography
homomorphic encryption
secure aggregation
LPN assumption
Chinese Remainder Theorem
🔎 Similar Papers
No similar papers found.