HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical

被引:0
|
作者
Aranha, Diego F. [1 ]
Costache, Anamaria [2 ]
Guimaraes, Antonio [3 ]
Soria-Vazquez, Eduardo [4 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] NTNU, Trondheim, Norway
[3] IMDEA Software Inst, Madrid, Spain
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT V | 2025年 / 15488卷
关键词
D O I
10.1007/978-981-96-0935-2_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) enables computation on encrypted data, which in turn facilitates the outsourcing of computation on private data. However, HE offers no guarantee that the returned result was honestly computed by the cloud. In order to have such guarantee, it is necessary to add verifiable computation (VC) into the system. The most efficient recent works in VC over HE focus on verifying operations on the ciphertext space of the HE scheme, which usually lacks the algebraic structure that would make it compatible with existing VC systems. For example, multiplication of ciphertexts in the current most efficient HE schemes requires non-algebraic operations such as real division and rounding. Therefore, existing works for VC over HE have to either give up on those efficient HE schemes, or incur a large overhead (an amount of constraints proportional to the ciphertext ring's size) in order to emulate these non-algebraic operations. In this work, we move away from that paradigm by placing the verification checks in the plaintext space of HE, all while the prover remains computing on ciphertexts. We achieve this by introducing a general transformation for Interactive Oracle Proofs (IOPs) to work over HE, whose result we denote as HE-IOPs. We apply this same transformation to the FRI [Ben-Sasson et al., ICALP 2018] IOP of proximity and we show how to compile HE-Reed Solomon-encoded IOPs and HE-d-correlated-IOPs with HE-FRI into HE-IOPs. Furthermore, our construction is compatible with a prover that provides input in zero-knowledge, and only relies on building blocks that are plausibly quantum-safe. Aligning the security parameters of HE and FRI is a difficult task for which we introduce several optimizations. We demonstrate their efficiency with a proof-of-concept implementation and show that we can run FRI's commit phase for 4096 encrypted Reed Solomon codewords with degree bound 2(11) in just 5.4 s (using 32 threads) on a c6i.metal instance using less than 4GB of memory. Verification takes just 12.3 milliseconds (single-threaded) for the same parameter set and can be reduced to just 5.6ms with parameters optimized for the verifier.
引用
收藏
页码:302 / 334
页数:33
相关论文
共 50 条
  • [21] Verifiable Ranked Search Over Dynamic Encrypted Data in Cloud Computing
    Liu, Qin
    Nie, Xiaohong
    Liu, Xuhui
    Peng, Tao
    Wu, Jie
    2017 IEEE/ACM 25TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2017,
  • [22] EVSS: An efficient verifiable search scheme over encrypted cloud data
    Zhou, Qian
    Dai, Hua
    Sheng, Wenjie
    Liu, Yuanlong
    Yang, Geng
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (04): : 1459 - 1479
  • [23] Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET
    Meng, Qian
    Weng, Jian
    Miao, Yinbin
    Chen, Kefei
    Shen, Zhonghua
    Wang, Fuqun
    Li, Zhijun
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (12) : 12342 - 12357
  • [24] TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU
    Fan, Shengyu
    Wang, Zhiwei
    Xu, Weizhi
    Hou, Rui
    Meng, Dan
    Zhang, Mingzhe
    2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, 2023, : 922 - 934
  • [25] Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data
    Yang, Xu
    Wang, Qiuhao
    Qi, Saiyu
    Li, Ke
    Wang, Jianfeng
    Zhao, Wenjia
    Qi, Yong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 6356 - 6371
  • [26] Verifiable Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
    Wei, Xue
    Zhang, Hua
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING (AMITP 2016), 2016, 60 : 271 - 277
  • [27] Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Wang, Jianfeng
    Ma, Hua
    Tang, Qiang
    Li, Jin
    Zhu, Hui
    Ma, Siqi
    Chen, Xiaofeng
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 667 - 684
  • [28] Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
    Shao, Jun
    Lu, Rongxing
    Guan, Yunguo
    Wei, Guiyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 124 - 137
  • [29] Verifiable dynamic ranked search with forward privacy over encrypted cloud data
    Chen, Chien-Ming
    Tie, Zhuoyu
    Wang, Eric Ke
    Khan, Muhammad Khurram
    Kumar, Sachin
    Kumari, Saru
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2977 - 2991
  • [30] EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data
    Guan, Yunguo
    Xiong, Pulei
    Lu, Rongxing
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 553 - 558