HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical

被引:0
|
作者
Aranha, Diego F. [1 ]
Costache, Anamaria [2 ]
Guimaraes, Antonio [3 ]
Soria-Vazquez, Eduardo [4 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] NTNU, Trondheim, Norway
[3] IMDEA Software Inst, Madrid, Spain
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
关键词
D O I
10.1007/978-981-96-0935-2_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) enables computation on encrypted data, which in turn facilitates the outsourcing of computation on private data. However, HE offers no guarantee that the returned result was honestly computed by the cloud. In order to have such guarantee, it is necessary to add verifiable computation (VC) into the system. The most efficient recent works in VC over HE focus on verifying operations on the ciphertext space of the HE scheme, which usually lacks the algebraic structure that would make it compatible with existing VC systems. For example, multiplication of ciphertexts in the current most efficient HE schemes requires non-algebraic operations such as real division and rounding. Therefore, existing works for VC over HE have to either give up on those efficient HE schemes, or incur a large overhead (an amount of constraints proportional to the ciphertext ring's size) in order to emulate these non-algebraic operations. In this work, we move away from that paradigm by placing the verification checks in the plaintext space of HE, all while the prover remains computing on ciphertexts. We achieve this by introducing a general transformation for Interactive Oracle Proofs (IOPs) to work over HE, whose result we denote as HE-IOPs. We apply this same transformation to the FRI [Ben-Sasson et al., ICALP 2018] IOP of proximity and we show how to compile HE-Reed Solomon-encoded IOPs and HE-d-correlated-IOPs with HE-FRI into HE-IOPs. Furthermore, our construction is compatible with a prover that provides input in zero-knowledge, and only relies on building blocks that are plausibly quantum-safe. Aligning the security parameters of HE and FRI is a difficult task for which we introduce several optimizations. We demonstrate their efficiency with a proof-of-concept implementation and show that we can run FRI's commit phase for 4096 encrypted Reed Solomon codewords with degree bound 2(11) in just 5.4 s (using 32 threads) on a c6i.metal instance using less than 4GB of memory. Verification takes just 12.3 milliseconds (single-threaded) for the same parameter set and can be reduced to just 5.6ms with parameters optimized for the verifier.
引用
收藏
页码:302 / 334
页数:33
相关论文
共 50 条
  • [1] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [2] Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs
    Lee, Joohee
    Cho, Sangrae
    Kim, Soohyung
    Park, Saerom
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [3] Efficiently Verifiable Computation on Encrypted Data
    Fiore, Dario
    Gennaro, Rosario
    Pastro, Valerio
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 844 - 855
  • [4] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [5] Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data
    Ngoc Hieu Tran
    Pang, HweeHwa
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 605 - 616
  • [6] Distributed Aggregation over Homomorphically Encrypted Data under Switching Networks
    Lee, Donggil
    Kim, Junsoo
    Shim, Hyungbo
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 5495 - 5500
  • [7] Dynamic Controller That Operates Over Homomorphically Encrypted Data for Infinite Time Horizon
    Kim, Junsoo
    Shim, Hyungbo
    Han, Kyoohyung
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (02) : 660 - 672
  • [8] Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds
    Nie, Xiaohong
    Liu, Qin
    Liu, Xuhui
    Peng, Tao
    Lin, Yapin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016, 2016, 10048 : 557 - 571
  • [9] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [10] Verifiable Search Over Updatable Encrypted Data in Cloud Computing
    Ocansey, Selasi Kwame
    Wang, Changda
    Ametepe, Wolali
    Xu, Qinbao
    Zeng, Yu
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (06) : 156 - 161