HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical

被引:0
|
作者
Aranha, Diego F. [1 ]
Costache, Anamaria [2 ]
Guimaraes, Antonio [3 ]
Soria-Vazquez, Eduardo [4 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] NTNU, Trondheim, Norway
[3] IMDEA Software Inst, Madrid, Spain
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT V | 2025年 / 15488卷
关键词
D O I
10.1007/978-981-96-0935-2_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) enables computation on encrypted data, which in turn facilitates the outsourcing of computation on private data. However, HE offers no guarantee that the returned result was honestly computed by the cloud. In order to have such guarantee, it is necessary to add verifiable computation (VC) into the system. The most efficient recent works in VC over HE focus on verifying operations on the ciphertext space of the HE scheme, which usually lacks the algebraic structure that would make it compatible with existing VC systems. For example, multiplication of ciphertexts in the current most efficient HE schemes requires non-algebraic operations such as real division and rounding. Therefore, existing works for VC over HE have to either give up on those efficient HE schemes, or incur a large overhead (an amount of constraints proportional to the ciphertext ring's size) in order to emulate these non-algebraic operations. In this work, we move away from that paradigm by placing the verification checks in the plaintext space of HE, all while the prover remains computing on ciphertexts. We achieve this by introducing a general transformation for Interactive Oracle Proofs (IOPs) to work over HE, whose result we denote as HE-IOPs. We apply this same transformation to the FRI [Ben-Sasson et al., ICALP 2018] IOP of proximity and we show how to compile HE-Reed Solomon-encoded IOPs and HE-d-correlated-IOPs with HE-FRI into HE-IOPs. Furthermore, our construction is compatible with a prover that provides input in zero-knowledge, and only relies on building blocks that are plausibly quantum-safe. Aligning the security parameters of HE and FRI is a difficult task for which we introduce several optimizations. We demonstrate their efficiency with a proof-of-concept implementation and show that we can run FRI's commit phase for 4096 encrypted Reed Solomon codewords with degree bound 2(11) in just 5.4 s (using 32 threads) on a c6i.metal instance using less than 4GB of memory. Verification takes just 12.3 milliseconds (single-threaded) for the same parameter set and can be reduced to just 5.6ms with parameters optimized for the verifier.
引用
收藏
页码:302 / 334
页数:33
相关论文
共 50 条
  • [11] Verifiable Diversity Ranking Search Over Encrypted Outsourced Data
    Liu, Yuling
    Peng, Hua
    Wang, Jie
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01): : 37 - 57
  • [12] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 799 - 813
  • [13] JCrypt: Towards computation over encrypted data
    Rensselaer Polytechnic Institute, Troy
    NY, United States
    不详
    ACM Int. Conf. Proc. Ser.,
  • [14] VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data
    Liang, Yanrong
    Li, Yanping
    Cao, Qiang
    Ren, Fang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 108 (108)
  • [15] Verifiable ranked search over encrypted data with forward and backward privacy
    Najafi, Aniseh
    Javadi, Hamid Haj Seyyed
    Bayatb, Majid
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 410 - 419
  • [16] Enabling verifiable multiple keywords search over encrypted cloud data
    Miao, Yinbin
    Weng, Jian
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Liu, Zhiquan
    Li, Hongwei
    INFORMATION SCIENCES, 2018, 465 : 21 - 37
  • [17] EVSS: An efficient verifiable search scheme over encrypted cloud data
    Qian Zhou
    Hua Dai
    Wenjie Sheng
    Yuanlong Liu
    Geng Yang
    World Wide Web, 2023, 26 : 1459 - 1479
  • [18] Efficient verifiable multi-keyword search over encrypted data
    Miao, Yinbin
    Ma, Jianfeng
    Zhang, Junwei
    Liu, Zhiquan
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2017, 44 (04): : 18 - 23
  • [19] Verifiable keyword search over encrypted cloud data in smart city
    Miao, Yinbin
    Ma, Jianfeng
    Jiang, Qi
    Li, Xiong
    Sangaian, Arun Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 : 90 - 101
  • [20] Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Zhiquan
    Choo, Kim-Kwang Raymond
    Liu, Ximeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 839 - 853