Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference

被引:136
|
作者
Chen, Hao [1 ]
Dai, Wei [1 ]
Kim, Miran [2 ]
Song, Yongsoo [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] UT Hlth Sci Ctr Houston, Houston, TX USA
关键词
multi-key homomorphic encryption; packed ciphertext; ring learning with errors; neural networks; FHE;
D O I
10.1145/3319535.3363207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted data. Lopez-Alt et al. (STOC 2012) proposed a generalized notion of HE, called Multi-Key Homomorphic Encryption (MKHE), which is capable of performing arithmetic operations on ciphertexts encrypted under different keys. In this paper, we present multi-key variants of two HE schemes with packed ciphertexts. We present new relinearization algorithms which are simpler and faster than previous method by Chen et al. (TCC 2017). We then generalize the bootstrapping techniques for HE to obtain multi-key fully homomorphic encryption schemes. We provide a proof-of-concept implementation of both MKHE schemes using Microsoft SEAL. For example, when the dimension of base ring is 8192, homomorphic multiplication between multi-key BFV (resp. CKKS) ciphertexts associated with four parties followed by a relinearization takes about 116 (resp. 67) milliseconds. Our MKHE schemes have a wide range of applications in secure computation between multiple data providers. As a benchmark, we homomorphically classify an image using a pre-trained neural network model, where input data and model are encrypted under different keys. Our implementation takes about 1.8 seconds to evaluate one convolutional layer followed by two fully connected layers on an encrypted image from the MNIST dataset.
引用
收藏
页码:395 / 412
页数:18
相关论文
共 50 条
  • [1] Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product
    Che, Xiaoliang
    Liu, Longfei
    Wang, Baocang
    Han, Yiliang
    Wang, Xu An
    Yang, Xiaoyuan
    Zhou, Tanping
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
  • [2] Multi-Key Homomorphic Encryption from TFHE
    Chen, Hao
    Chillotti, Ilaria
    Song, Yongsoo
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 446 - 472
  • [3] Efficient multi-key fully homomorphic encryption scheme from RLWE
    Che X.
    Zhou H.
    Yang X.
    Zhou T.
    Liu L.
    Li N.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 87 - 95
  • [4] Efficient Federated Learning Framework Based on Multi-Key Homomorphic Encryption
    Zhang, Qian
    Jing, Shan
    Zhao, Chuan
    Zhang, Bo
    Chen, Zhenxiang
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2021, 2022, 343 : 88 - 105
  • [5] Hierarchical Threshold Multi-Key Fully Homomorphic Encryption
    Wan, Xiaohan
    Lin, Hao
    Wang, Mingqiang
    Shen, Wenting
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [6] Federated learning enabled multi-key homomorphic encryption
    Kumbhar, Hemant Ramdas
    Rao, S. Srinivasa
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 268
  • [7] SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption
    Cai, Yuxuan
    Ding, Wenxiu
    Xiao, Yuxuan
    Yan, Zheng
    Liu, Ximeng
    Wan, Zhiguo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3817 - 3833
  • [8] Multi-key Homomorphic Proxy Re-Encryption
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Hiromasa, Ryo
    Kawai, Yutaka
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 328 - 346
  • [9] Griffin: Towards Mixed Multi-Key Homomorphic Encryption
    Schneider, Thomas
    Yalame, Hossein
    Yonli, Michael
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 147 - 158
  • [10] Oblivious Neural Network Computing via Homomorphic Encryption
    Orlandi, C.
    Piva, A.
    Barni, M.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01):