Batched Fully Homomorphic Encryption from TFHE

被引:0
|
作者
Jiang, Yuting [1 ]
Wei, Jianghong [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] PLA Strateg Support Force Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
来源
关键词
Fully homomorphic encryption; TFHE; Bootstrapping; Batching; NTT;
D O I
10.1007/978-3-031-22390-7_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A surge of interest in fully homomorphic encryption (FHE) has produced various FHE constructions in recent years. One of the main goals of these FHE schemes is to improve the efficiency when using the bootstrapping technique. Particularly, TFHE, a fast FHE scheme over the torus, decreases the running time of the bootstrapping significantly. However, it only supports a single-bit bootstrapping, and thus still has high computation cost. In this paper, we propose a batched FHE from TFHE, which can simultaneously bootstrap n torus-based LWE (TLWE) ciphertexts. In more detail, we employ a binary packing tree to pack several TLWE ciphertexts into one TLWE ciphertext, and further optimize the bootstrapping procedure with the homomorphic number theoretic transform (NTT). As a consequence, the amortized computation cost of our batched FHE scheme is reduced to O(logN) from O(N) in the original TFHE scheme, where N is the dimension of the TLWE assumption. Moreover, we provide an implementation of the proposed FHE scheme with specific parameters, so as to demonstrate its practicability.
引用
收藏
页码:92 / 109
页数:18
相关论文
共 50 条
  • [41] Fully Homomorphic Encryption over the Integers: From Theory to Practice
    Tibouchi, Mehdi
    NTT Technical Review, 2014, 12 (07): : 24 - 29
  • [42] Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
    Kluczniak, Kamil
    PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 69 - 98
  • [43] Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
    Doroz, Yarkin
    Hoffstein, Jeffrey
    Pipher, Jill
    Silverman, Joseph H.
    Sunar, Berk
    Whyte, William
    Zhang, Zhenfei
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 125 - 155
  • [44] Labeled PSI from Fully Homomorphic Encryption with Malicious Security
    Chen, Hao
    Huang, Zhicong
    Laine, Kim
    Rindal, Peter
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1223 - 1237
  • [45] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [46] Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
    Susilo, Willy
    Dung Hoang Duong
    Huy Quoc Le
    Pieprzyk, Josef
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 107 - 127
  • [47] On DGHV and BGV Fully Homomorphic Encryption Schemes
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [48] Minimizing ESOP Expressions for Fully Homomorphic Encryption
    Ye, Jheng-Hao
    Chen, Si-Quan
    Shieh, Ming-Der
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [49] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [50] Practical Fully Homomorphic Encryption for Fully Masked Neural Networks
    Izabachene, Malika
    Sirdey, Renaud
    Zuber, Martin
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 24 - 36