Exploring the Feasibility of Fully Homomorphic Encryption

被引:62
|
作者
Wang, Wei [1 ]
Hu, Yin [1 ]
Chen, Lianmu [1 ]
Huang, Xinming [1 ]
Sunar, Berk [1 ]
机构
[1] Worcester Polytech Inst, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
Fully homomorphic encryption; GPU; large-number multiplication; modular reduction; MULTIPLICATION; ALGORITHM;
D O I
10.1109/TC.2013.154
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2010, Gentry and Halevi presented the first FHE implementation. FHE allows the evaluation of arbitrary functions directly on encrypted data on untrusted servers. However, even for the small setting with 2048 dimensions, the authors reported a performance of 1.8 s for a single bit encryption and 32 s for recryption on a high-end server. Much of the latency is due to computationally intensive multimillion-bit modular multiplications. In this paper, we introduce two optimizations coupled with a novel precomputation technique. In the first optimization called partial FFT, we adopt Strassen's FFT-based multiplication algorithm along with Barret reduction to speedup modular multiplications. For the encrypt primitive, we employ a window-based evaluation technique along with a modest degree of precomputation. In the full FFT optimization, we delay modular reductions and change the window algorithm, which allows us to carry out the bulk of computations in the frequency domain. We manage to eliminate all FFT conversion except the final inverse transformation drastically reducing the computation latency for all FHE primitives. We implemented the GH FHE scheme on two GPUs to further speedup the operations. Our experimental results with small parameter setting show speedups of 174, 7.6, and 13.5 times for encryption, decryption, and recryption, respectively, when compared to the Gentry-Halevi implementation. The speedup is enhanced in the medium setting. However, in the large setting, memory becomes the bottleneck and the speedup is somewhat diminished.
引用
收藏
页码:698 / 706
页数:9
相关论文
共 50 条
  • [31] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [32] On the Feasibility of Homomorphic Encryption for Internet of Things
    Reddy, H. Manohar
    Sajimon, P. C.
    Sankaran, Sriram
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [33] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [34] On DGHV and BGV Fully Homomorphic Encryption Schemes
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [35] Minimizing ESOP Expressions for Fully Homomorphic Encryption
    Ye, Jheng-Hao
    Chen, Si-Quan
    Shieh, Ming-Der
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [36] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [37] Batched Fully Homomorphic Encryption from TFHE
    Jiang, Yuting
    Wei, Jianghong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 92 - 109
  • [38] Practical Fully Homomorphic Encryption for Fully Masked Neural Networks
    Izabachene, Malika
    Sirdey, Renaud
    Zuber, Martin
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 24 - 36
  • [39] Approximating Max Function in Fully Homomorphic Encryption
    Lee, Hyunjun
    Choi, Jina
    Lee, Younho
    ELECTRONICS, 2023, 12 (07)
  • [40] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254