HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical

被引:0
|
作者
Aranha, Diego F. [1 ]
Costache, Anamaria [2 ]
Guimaraes, Antonio [3 ]
Soria-Vazquez, Eduardo [4 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] NTNU, Trondheim, Norway
[3] IMDEA Software Inst, Madrid, Spain
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT V | 2025年 / 15488卷
关键词
D O I
10.1007/978-981-96-0935-2_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) enables computation on encrypted data, which in turn facilitates the outsourcing of computation on private data. However, HE offers no guarantee that the returned result was honestly computed by the cloud. In order to have such guarantee, it is necessary to add verifiable computation (VC) into the system. The most efficient recent works in VC over HE focus on verifying operations on the ciphertext space of the HE scheme, which usually lacks the algebraic structure that would make it compatible with existing VC systems. For example, multiplication of ciphertexts in the current most efficient HE schemes requires non-algebraic operations such as real division and rounding. Therefore, existing works for VC over HE have to either give up on those efficient HE schemes, or incur a large overhead (an amount of constraints proportional to the ciphertext ring's size) in order to emulate these non-algebraic operations. In this work, we move away from that paradigm by placing the verification checks in the plaintext space of HE, all while the prover remains computing on ciphertexts. We achieve this by introducing a general transformation for Interactive Oracle Proofs (IOPs) to work over HE, whose result we denote as HE-IOPs. We apply this same transformation to the FRI [Ben-Sasson et al., ICALP 2018] IOP of proximity and we show how to compile HE-Reed Solomon-encoded IOPs and HE-d-correlated-IOPs with HE-FRI into HE-IOPs. Furthermore, our construction is compatible with a prover that provides input in zero-knowledge, and only relies on building blocks that are plausibly quantum-safe. Aligning the security parameters of HE and FRI is a difficult task for which we introduce several optimizations. We demonstrate their efficiency with a proof-of-concept implementation and show that we can run FRI's commit phase for 4096 encrypted Reed Solomon codewords with degree bound 2(11) in just 5.4 s (using 32 threads) on a c6i.metal instance using less than 4GB of memory. Verification takes just 12.3 milliseconds (single-threaded) for the same parameter set and can be reduced to just 5.6ms with parameters optimized for the verifier.
引用
收藏
页码:302 / 334
页数:33
相关论文
共 50 条
  • [41] Verifiable dynamic search over encrypted data in cloud-assisted intelligent systems
    Wang, Yunling
    Wei, Pei
    Miao, Meixia
    Zhang, Xuefeng
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 11830 - 11852
  • [42] A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud
    Yang, Wenyuan
    Zhu, Yuesheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 100 - 115
  • [43] Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing
    Nie, Kai
    Wang, Yunling
    Tao, Xiaoling
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 707 - 718
  • [44] Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud
    Li, Meng
    Gao, Jianbo
    Zhu, Liehuang
    Zhang, Zijian
    Lal, Chhagan
    Conti, Mauro
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 1239 - 1251
  • [45] VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    Ateniese, Giuseppe
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 522 - 530
  • [46] Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data
    Ge, Xinrui
    Yu, Jia
    Chen, Fei
    Kong, Fanyu
    Wang, Huaqun
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12902 - 12918
  • [47] Efficient Secure and Verifiable Location-Based Skyline Queries over Encrypted Data
    Wang, Zuan
    Ding, Xiaofeng
    Jin, Hai
    Zhou, Pan
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2022, 15 (09): : 1822 - 1834
  • [48] Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Ge, Xinrui
    Yu, Jia
    Hu, Chengyu
    Zhang, Hanlin
    Hao, Rong
    IEEE ACCESS, 2018, 6 : 45725 - 45739
  • [49] Slicer: Verifiable, Secure and Fair Search over Encrypted Numerical Data Using Blockchain
    Wu, Haotian
    Song, Rui
    Lei, Kai
    Xiao, Bin
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 1201 - 1211
  • [50] Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources
    Song, Wei
    Wang, Bing
    Wang, Qian
    Shi, Chengliang
    Lou, Wenjing
    Peng, Zhiyong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2334 - 2347