Exploring the Feasibility of Fully Homomorphic Encryption

被引:62
|
作者
Wang, Wei [1 ]
Hu, Yin [1 ]
Chen, Lianmu [1 ]
Huang, Xinming [1 ]
Sunar, Berk [1 ]
机构
[1] Worcester Polytech Inst, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
Fully homomorphic encryption; GPU; large-number multiplication; modular reduction; MULTIPLICATION; ALGORITHM;
D O I
10.1109/TC.2013.154
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2010, Gentry and Halevi presented the first FHE implementation. FHE allows the evaluation of arbitrary functions directly on encrypted data on untrusted servers. However, even for the small setting with 2048 dimensions, the authors reported a performance of 1.8 s for a single bit encryption and 32 s for recryption on a high-end server. Much of the latency is due to computationally intensive multimillion-bit modular multiplications. In this paper, we introduce two optimizations coupled with a novel precomputation technique. In the first optimization called partial FFT, we adopt Strassen's FFT-based multiplication algorithm along with Barret reduction to speedup modular multiplications. For the encrypt primitive, we employ a window-based evaluation technique along with a modest degree of precomputation. In the full FFT optimization, we delay modular reductions and change the window algorithm, which allows us to carry out the bulk of computations in the frequency domain. We manage to eliminate all FFT conversion except the final inverse transformation drastically reducing the computation latency for all FHE primitives. We implemented the GH FHE scheme on two GPUs to further speedup the operations. Our experimental results with small parameter setting show speedups of 174, 7.6, and 13.5 times for encryption, decryption, and recryption, respectively, when compared to the Gentry-Halevi implementation. The speedup is enhanced in the medium setting. However, in the large setting, memory becomes the bottleneck and the speedup is somewhat diminished.
引用
收藏
页码:698 / 706
页数:9
相关论文
共 50 条
  • [1] Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
    Katz, Jonathan
    Thiruvengadam, Aishwarya
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 14 - 31
  • [2] Assessing the Feasibility of Fully Homomorphic Encryption for Smart Grid AMI Networks
    Tonyali, Samet
    Saputro, Nico
    Akkaya, Kemal
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 591 - 596
  • [3] Optimizations in Fully Homomorphic Encryption
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-cherif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 150 - 166
  • [4] A Flexible Fully Homomorphic Encryption
    Chunguang Ma
    Juyan Li
    Gang Du
    Wireless Personal Communications, 2017, 95 : 761 - 772
  • [5] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [6] A Flexible Fully Homomorphic Encryption
    Ma, Chunguang
    Li, Juyan
    Du, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 761 - 772
  • [7] Faster Fully Homomorphic Encryption
    Stehle, Damien
    Steinfeld, Ron
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 377 - +
  • [8] The Rise of Fully Homomorphic Encryption
    Creeger M.
    Queue, 2022, 20 (04): : 39 - 60
  • [9] Fully Homomorphic Encryption for Mathematicians
    Silverberg, Alice
    WOMEN IN NUMBERS 2: RESEARCH DIRECTIONS IN NUMBER THEORY, 2013, 606 : 111 - 123
  • [10] On the Plausibility of Fully Homomorphic Encryption for RAMs
    Hamlin, Ariel
    Holmgren, Justin
    Weiss, Mor
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 589 - 619