Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption

被引:0
|
作者
Chielle, Eduardo [1 ]
Mazonka, Oleg [1 ]
Gamil, Homer [1 ]
Maniatakos, Michail [1 ]
机构
[1] NYU Abu Dhabi, Ctr Cyber Secur, Abu Dhabi, U Arab Emirates
关键词
Fully homomorphic encryption; privacy-preserving computation; modular arithmetic;
D O I
10.1145/3665280
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fully Homomorphic Encryption (FHE) enables computation directly on encrypted data. This property is desirable for outsourced computation of sensitive data as it relies solely on the underlying security of the cryptosystem and not in access control policies. Even though FHE is still significantly slower than unencrypted computation, practical times are possible for applications easily representable as low-order polynomials, since most FHE schemes support modular addition and multiplication over ciphertexts. If, however, an application cannot be expressed with low-order polynomials, then Boolean logic must be emulated. This bit-level arithmetic enables any computation to be performed homomorphically. Nevertheless, as it runs on top of the natively supported modular arithmetic, it has poor performance, which hinders its use in the majority of scenarios. In this work, we propose Bridging, a technique that allows conversion from bit-level to modular arithmetic and vice-versa. This enables the use of the comprehensive computation provided by bit-level arithmetic and the performance of modular arithmetic within the same application. Experimental results show that Bridging can lead to 1-2 orders of magnitude performance improvement for tested benchmarks and two real-world applications: URL denylisting and genotype imputation. Bridging performance comes from two factors: reduced number of operations and smaller multiplicative depth.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
    Gentry, Craig
    Halevi, Shai
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 107 - 116
  • [32] A General Design Method of Constructing Fully Homomorphic Encryption with Ciphertext Matrix
    Song, Xinxia
    Chen, Zhigang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2629 - 2650
  • [33] Fully Privacy-Preserving and Efficient Clustering Scheme based on Fully Homomorphic Encryption
    Zhang, Mengyu
    Wang, Long
    Zhang, Xiaoping
    Wang, Yisong
    Sun, Wenhou
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 2694 - 2700
  • [34] Efficient GSW-Style Fully Homomorphic Encryption over the Integers
    Zhao, Jianan
    Huang, Ruwei
    Yang, Bo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] Efficient evaluation algorithms for noiseless fully homomorphic encryption scheme and their applications
    Han, Hee
    Kang, Stefano V.
    Lee, Byungdo
    Wang, Hyo Keun
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2025,
  • [36] Towards an efficient LWE-based fully homomorphic encryption scheme
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IET INFORMATION SECURITY, 2022, 16 (04) : 235 - 252
  • [37] Efficient Utilization of SIMD Engines for General-Purpose Processors
    Huang, Libo
    Wang, Zhiying
    Xiao, Nong
    Dou, Qiang
    COMPUTER JOURNAL, 2014, 57 (08): : 1141 - 1154
  • [38] Runtime reconfiguration techniques for efficient general-purpose computation
    Xu, BX
    Albonesi, DH
    IEEE DESIGN & TEST OF COMPUTERS, 2000, 17 (01): : 42 - 52
  • [39] An Efficient Fully Homomorphic Encryption Scheme for Private Information Retrieval in the Cloud
    Wang, Xun
    Luo, Tao
    Li, Jianfeng
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2020, 34 (04)
  • [40] Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE)
    N. K. Prema
    Mobile Networks and Applications, 2019, 24 : 434 - 442