CryptoDB
Hilder V. L. Pereira
Publications
Year
Venue
Title
2024
CIC
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Abstract
<p> Fully Homomorphic Encryption (FHE) is a powerful tool to achieve non-interactive privacy preserving protocols with optimal computation/communication complexity. However, the main disadvantage is that the actual communication cost (bandwidth) is high due to the large size of FHE ciphertexts. As a solution, a technique called transciphering (also known as Hybrid Homomorphic Encryption) was introduced to achieve almost optimal bandwidth for such protocols. However, all existing works require clients to fix a precision for the messages or a mathematical structure for the message space beforehand. It results in unwanted constraints on the plaintext size or underlying structure of FHE based applications.</p><p> In this article, we introduce a new approach for transciphering which does not require fixed message precision decided by the client, for the first time. In more detail, a client uses any kind of FHE-friendly symmetric cipher for $\{0,1\}$ to send its input data encrypted bit-by-bit, then the server can choose a precision $p$ depending on the application and homomorphically transforms the encrypted bits into FHE ciphertexts encrypting integers in $\mathbb{Z}_p$. To illustrate our new technique, we evaluate a transciphering using FiLIP cipher and adapt the most practical homomorphic evaluation technique [CCS'22] to keep the practical latency. As a result, our proof-of-concept implementation for $p$ from $2^2$ to $2^8$ takes only from $13$ ms to $137$ ms. </p>
2024
CIC
Verifiable FHE via Lattice-based SNARKs
Abstract
<p>Fully Homomorphic Encryption (FHE) is a prevalent cryptographic primitive that allows for computation on encrypted data. In various cryptographic protocols, this enables outsourcing computation to a third party while retaining the privacy of the inputs to the computation. However, these schemes make an honest-but-curious assumption about the adversary. Previous work has tried to remove this assumption by combining FHE with Verifiable Computation (VC). Recent work has increased the flexibility of this approach by introducing integrity checks for homomorphic computations over rings. However, efficient FHE for circuits of large multiplicative depth also requires non-ring computations called maintenance operations, i.e. modswitching and keyswitching, which cannot be efficiently verified by existing constructions. We propose the first efficiently verifiable FHE scheme that allows for arbitrary depth homomorphic circuits by utilizing the double-CRT representation in which FHE schemes are typically computed, and using lattice-based SNARKs to prove components of this computation separately, including the maintenance operations. Therefore, our construction can theoretically handle bootstrapping operations. We also present the first implementation of a verifiable computation on encrypted data for a computation that contains multiple ciphertext-ciphertext multiplications. Concretely, we verify the homomorphic computation of an approximate neural network containing three layers and >100 ciphertexts in less than 1 second while maintaining reasonable prover costs. </p>
2023
TCHES
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Abstract
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality. We present BASALISC, an architecture family of hardware accelerators that aims to substantially accelerate FHE computations in the cloud. BASALISC is the first to implement the BGV scheme with fully-packed bootstrapping – the noise removal capability necessary for arbitrary-depth computation. It supports a customized version of bootstrapping that can be instantiated with hardware multipliers optimized for area and power.BASALISC is a three-abstraction-layer RISC architecture, designed for a 1 GHz ASIC implementation and underway toward 150mm2 die tape-out in a 12nm GF process. BASALISC’s four-layer memory hierarchy includes a two-dimensional conflict-free inner memory layer that enables 32 Tb/s radix-256 NTT computations without pipeline stalls. Its conflict-resolution permutation hardware is generalized and re-used to compute BGV automorphisms without throughput penalty. BASALISC also has a custom multiply-accumulate unit to accelerate BGV key switching.The BASALISC toolchain comprises a custom compiler and a joint performance and correctness simulator. To evaluate BASALISC, we study its physical realizability, emulate and formally verify its core functional units, and we study its performance on a set of benchmarks. Simulation results show a speedup of more than 5,000× over HElib – a popular software FHE library.
2023
ASIACRYPT
Amortized bootstrapping revisited: Simpler, asymptotically-faster, implemented
Abstract
Micciancio and Sorrel (ICALP 2018) proposed a bootstrapping algorithm
that can refresh many messages at once with sublinearly many homomorphic
operations per message.
However, despite the attractive asymptotic cost,
it is unclear if their algorithm could ever be practical,
which reduces the impact of their results.
In this work, we follow their general framework,
but propose an amortized bootstrapping procedure that is
conceptually simpler and asymptotically cheaper.
We reduce the number of homomorphic operations per refreshed message from
$O(3^\rho \cdot n^{1/\rho} \cdot \log n)$ to
$O(\rho \cdot n^{1/\rho})$,
and the noise overhead from
$\tilde{O}(n^{2 + 3 \cdot \rho})$
to $\tilde{O}(n^{1 + \rho})$.
We also make it more general, by handling non-binary messages and applying
programmable bootstrapping.
To obtain a concrete instantiation of our bootstrapping algorithm,
we describe a double-CRT (aka RNS) version of the GSW scheme, including a
new operation, called \emph{shrinking}, used to speed-up homomorphic
operations by reducing the dimension and ciphertext modulus of the
ciphertexts.
We also provide a C++ implementation of our algorithm,
thus showing for the first time the practicability of the amortized
bootstrapping.
Moreover, it is competitive with existing bootstrapping
algorithms, being even around 3.4 times faster than an equivalent
non-amortized version of our bootstrapping.
2019
ASIACRYPT
On Kilian’s Randomization of Multilinear Map Encodings
Abstract
Indistinguishability obfuscation constructions based on matrix branching programs generally proceed in two steps: first apply Kilian’s randomization of the matrix product computation, and then encode the matrices using a multilinear map scheme. In this paper we observe that by applying Kilian’s randomization after encoding, the complexity of the best attacks is significantly increased for CLT13 multilinear maps. This implies that much smaller parameters can be used, which improves the efficiency of the constructions by several orders of magnitude.As an application, we describe the first concrete implementation of multiparty non-interactive Diffie-Hellman key exchange secure against existing attacks. Key exchange was originally the most straightforward application of multilinear maps; however it was quickly broken for the three known families of multilinear maps (GGH13, CLT13 and GGH15). Here we describe the first implementation of key exchange that is resistant against known attacks, based on CLT13 multilinear maps. For
$$N=4$$
users and a medium level of security, our implementation requires 18 GB of public parameters, and a few minutes for the derivation of a shared key.
Coauthors
- David W. Archer (1)
- Shahla Atapoor (1)
- Karim Baghery (1)
- Jean-Sébastien Coron (1)
- Georgios Dimou (1)
- Robin Geelen (1)
- Antonio Guimarães (1)
- Brian Huffman (1)
- Jeongeun Park (1)
- Tynan McAuley (1)
- Pierrick Méaux (1)
- Hilder V. L. Pereira (5)
- Ben Selfridge (1)
- Jannik Spiessens (1)
- Michiel Van Beirendonck (1)
- Barry van Leeuwen (1)
- Ingrid Verbauwhede (1)
- Frederik Vercauteren (1)
- Daniel Wagner (1)