Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption

被引:0
|
作者
Chielle, Eduardo [1 ]
Mazonka, Oleg [1 ]
Gamil, Homer [1 ]
Maniatakos, Michail [1 ]
机构
[1] NYU Abu Dhabi, Ctr Cyber Secur, Abu Dhabi, U Arab Emirates
关键词
Fully homomorphic encryption; privacy-preserving computation; modular arithmetic;
D O I
10.1145/3665280
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fully Homomorphic Encryption (FHE) enables computation directly on encrypted data. This property is desirable for outsourced computation of sensitive data as it relies solely on the underlying security of the cryptosystem and not in access control policies. Even though FHE is still significantly slower than unencrypted computation, practical times are possible for applications easily representable as low-order polynomials, since most FHE schemes support modular addition and multiplication over ciphertexts. If, however, an application cannot be expressed with low-order polynomials, then Boolean logic must be emulated. This bit-level arithmetic enables any computation to be performed homomorphically. Nevertheless, as it runs on top of the natively supported modular arithmetic, it has poor performance, which hinders its use in the majority of scenarios. In this work, we propose Bridging, a technique that allows conversion from bit-level to modular arithmetic and vice-versa. This enables the use of the comprehensive computation provided by bit-level arithmetic and the performance of modular arithmetic within the same application. Experimental results show that Bridging can lead to 1-2 orders of magnitude performance improvement for tested benchmarks and two real-world applications: URL denylisting and genotype imputation. Bridging performance comes from two factors: reduced number of operations and smaller multiplicative depth.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] A General Design Method of Constructing Fully Homomorphic Encryption with Ciphertext Matrix
    Song, Xinxia
    Chen, Zhigang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2629 - 2650
  • [32] Towards an efficient LWE-based fully homomorphic encryption scheme
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IET INFORMATION SECURITY, 2022, 16 (04) : 235 - 252
  • [33] Efficient GSW-Style Fully Homomorphic Encryption over the Integers
    Zhao, Jianan
    Huang, Ruwei
    Yang, Bo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] An Efficient Fully Homomorphic Encryption Scheme for Private Information Retrieval in the Cloud
    Wang, Xun
    Luo, Tao
    Li, Jianfeng
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2020, 34 (04)
  • [35] Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE)
    N. K. Prema
    Mobile Networks and Applications, 2019, 24 : 434 - 442
  • [36] Efficient Utilization of SIMD Engines for General-Purpose Processors
    Huang, Libo
    Wang, Zhiying
    Xiao, Nong
    Dou, Qiang
    COMPUTER JOURNAL, 2014, 57 (08): : 1141 - 1154
  • [37] Runtime reconfiguration techniques for efficient general-purpose computation
    Xu, BX
    Albonesi, DH
    IEEE DESIGN & TEST OF COMPUTERS, 2000, 17 (01): : 42 - 52
  • [38] Efficient VLSI Architecture of Bluestein's FFT for Fully Homomorphic Encryption
    Wu, Shi-Yong
    Chen, Kuan-Yu
    Shieh, Ming-Der
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 2242 - 2245
  • [39] Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme
    Tu, Guangsheng
    Liu, Wenchao
    Zhou, Tanping
    Yang, Xiaoyuan
    Zhang, Fan
    IEEE ACCESS, 2024, 12 : 49640 - 49652