Batched Fully Homomorphic Encryption from TFHE

被引:0
|
作者
Jiang, Yuting [1 ]
Wei, Jianghong [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] PLA Strateg Support Force Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
来源
关键词
Fully homomorphic encryption; TFHE; Bootstrapping; Batching; NTT;
D O I
10.1007/978-3-031-22390-7_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A surge of interest in fully homomorphic encryption (FHE) has produced various FHE constructions in recent years. One of the main goals of these FHE schemes is to improve the efficiency when using the bootstrapping technique. Particularly, TFHE, a fast FHE scheme over the torus, decreases the running time of the bootstrapping significantly. However, it only supports a single-bit bootstrapping, and thus still has high computation cost. In this paper, we propose a batched FHE from TFHE, which can simultaneously bootstrap n torus-based LWE (TLWE) ciphertexts. In more detail, we employ a binary packing tree to pack several TLWE ciphertexts into one TLWE ciphertext, and further optimize the bootstrapping procedure with the homomorphic number theoretic transform (NTT). As a consequence, the amortized computation cost of our batched FHE scheme is reduced to O(logN) from O(N) in the original TFHE scheme, where N is the dimension of the TLWE assumption. Moreover, we provide an implementation of the proposed FHE scheme with specific parameters, so as to demonstrate its practicability.
引用
收藏
页码:92 / 109
页数:18
相关论文
共 50 条
  • [31] Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Xie, Run
    Zhao, Jining
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 180 - 186
  • [32] Leakage Resilient Fully Homomorphic Encryption
    Berkoff, Alexandra
    Liu, Feng-Hao
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 515 - 539
  • [33] Fully Homomorphic Encryption with Polylog Overhead
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 465 - 482
  • [34] Fully Homomorphic Encryption: Computations with a Blindfold
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    IEEE SECURITY & PRIVACY, 2016, 14 (01) : 62 - 66
  • [35] Verifiable Decryption for Fully Homomorphic Encryption
    Luo, Fucai
    Wang, Kunpeng
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 347 - 365
  • [36] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [37] Fully homomorphic encryption and its applications
    Beijing International Center for Mathematical Research, Peking University, Beijing
    100871, China
    不详
    100084, China
    Jisuanji Yanjiu yu Fazhan, 12 (2593-2603):
  • [38] Fully homomorphic encryption: A case study
    Rauthan, J. S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (06) : 8417 - 8437
  • [39] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [40] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106