HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical

被引:0
|
作者
Aranha, Diego F. [1 ]
Costache, Anamaria [2 ]
Guimaraes, Antonio [3 ]
Soria-Vazquez, Eduardo [4 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] NTNU, Trondheim, Norway
[3] IMDEA Software Inst, Madrid, Spain
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT V | 2025年 / 15488卷
关键词
D O I
10.1007/978-981-96-0935-2_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) enables computation on encrypted data, which in turn facilitates the outsourcing of computation on private data. However, HE offers no guarantee that the returned result was honestly computed by the cloud. In order to have such guarantee, it is necessary to add verifiable computation (VC) into the system. The most efficient recent works in VC over HE focus on verifying operations on the ciphertext space of the HE scheme, which usually lacks the algebraic structure that would make it compatible with existing VC systems. For example, multiplication of ciphertexts in the current most efficient HE schemes requires non-algebraic operations such as real division and rounding. Therefore, existing works for VC over HE have to either give up on those efficient HE schemes, or incur a large overhead (an amount of constraints proportional to the ciphertext ring's size) in order to emulate these non-algebraic operations. In this work, we move away from that paradigm by placing the verification checks in the plaintext space of HE, all while the prover remains computing on ciphertexts. We achieve this by introducing a general transformation for Interactive Oracle Proofs (IOPs) to work over HE, whose result we denote as HE-IOPs. We apply this same transformation to the FRI [Ben-Sasson et al., ICALP 2018] IOP of proximity and we show how to compile HE-Reed Solomon-encoded IOPs and HE-d-correlated-IOPs with HE-FRI into HE-IOPs. Furthermore, our construction is compatible with a prover that provides input in zero-knowledge, and only relies on building blocks that are plausibly quantum-safe. Aligning the security parameters of HE and FRI is a difficult task for which we introduce several optimizations. We demonstrate their efficiency with a proof-of-concept implementation and show that we can run FRI's commit phase for 4096 encrypted Reed Solomon codewords with degree bound 2(11) in just 5.4 s (using 32 threads) on a c6i.metal instance using less than 4GB of memory. Verification takes just 12.3 milliseconds (single-threaded) for the same parameter set and can be reduced to just 5.6ms with parameters optimized for the verifier.
引用
收藏
页码:302 / 334
页数:33
相关论文
共 50 条
  • [31] Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase
    Kong, Fanyu
    Wang, Jie
    Yu, Jia
    Wang, Xuan
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 840 - 843
  • [32] Verifiable dynamic ranked search with forward privacy over encrypted cloud data
    Chien-Ming Chen
    Zhuoyu Tie
    Eric Ke Wang
    Muhammad Khurram Khan
    Sachin Kumar
    Saru Kumari
    Peer-to-Peer Networking and Applications, 2021, 14 : 2977 - 2991
  • [33] Towards a Practical Cluster Analysis over Encrypted Data
    Cheon, Jung Hee
    Kim, Duhyeong
    Park, Jai Hyun
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 227 - 249
  • [34] CryptMDB: A Practical Encrypted MongoDB over Big Data
    Xu, Guowen
    Ren, Yan
    Li, Hongwei
    Liu, Dongxiao
    Dai, Yuanshun
    Yang, Kan
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [35] Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs
    Nir Bitansky
    Journal of Cryptology, 2020, 33 : 459 - 493
  • [36] Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs
    Bitansky, Nir
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 567 - 594
  • [37] Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs
    Bitansky, Nir
    JOURNAL OF CRYPTOLOGY, 2020, 33 (02) : 459 - 493
  • [38] Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks
    Hahn, Changhee
    Kim, Jongkil
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22559 - 22570
  • [39] Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security
    Tong, Qiuyun
    Miao, Yinbin
    Weng, Jian
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (05) : 5386 - 5399
  • [40] VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data
    Li, Xinghua
    Tong, Qiuyun
    Zhao, Jinwei
    Miao, Yinbin
    Ma, Siqi
    Weng, Jian
    Ma, Jianfeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 698 - 710