Homomorphic Encryption for Arithmetic of Approximate Numbers

被引:1289
作者
Cheon, Jung Hee [1 ]
Kim, Andrey [1 ]
Kim, Miran [2 ]
Song, Yongsoo [1 ]
机构
[1] Seoul Natl Univ, Seoul, South Korea
[2] Univ Calif San Diego, San Diego, CA 92103 USA
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I | 2017年 / 10624卷
基金
新加坡国家研究基金会;
关键词
Homomorphic encryption; Approximate arithmetic; LOGISTIC-REGRESSION; COMPUTATION; KEY;
D O I
10.1007/978-3-319-70694-8_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We suggest a method to construct a homomorphic encryption scheme for approximate arithmetic. It supports an approximate addition and multiplication of encrypted messages, together with a new rescaling procedure for managing the magnitude of plaintext. This procedure truncates a ciphertext into a smaller modulus, which leads to rounding of plaintext. The main idea is to add a noise following significant figures which contain a main message. This noise is originally added to the plaintext for security, but considered to be a part of error occurring during approximate computations that is reduced along with plaintext by rescaling. As a result, our decryption structure outputs an approximate value of plaintext with a predetermined precision. We also propose a new batching technique for a RLWE-based construction. A plaintext polynomial is an element of a cyclotomic ring of characteristic zero and it is mapped to a message vector of complex numbers via complex canonical embedding map, which is an isometric ring homomorphism. This transformation does not blow up the size of errors, therefore enables us to preserve the precision of plaintext after encoding. In our construction, the bit size of ciphertext modulus grows linearly with the depth of the circuit being evaluated due to rescaling procedure, while all the previous works either require an exponentially large size of modulus or expensive computations such as bootstrapping or bit extraction. One important feature of our method is that the precision loss during evaluation is bounded by the depth of a circuit and it exceeds at most one more bit compared to unencrypted approximate arithmetic such as floating-point operations. In addition to the basic approximate circuits, we show that our scheme can be applied to the efficient evaluation of transcendental functions such as multiplicative inverse, exponential function, logistic function and discrete Fourier transform.
引用
收藏
页码:409 / 437
页数:29
相关论文
共 41 条
[1]  
[Anonymous], PREPRINT
[2]  
[Anonymous], 2016250 CRYPT EPRINT
[3]  
[Anonymous], WAHC 2017
[4]  
[Anonymous], IMPLEMENTATION HEA A
[5]  
[Anonymous], 20161019 CRYPT EPRIN
[6]  
Arita Seiko, 2017, Information Security and Cryptology. 12th International Conference, Inscrypt 2016. Revised Selected Papers: LNCS 10143, P253, DOI 10.1007/978-3-319-54705-3_16
[7]  
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[8]   Private predictive analysis on encrypted medical data [J].
Bos, Joppe W. ;
Lauter, Kristin ;
Naehrig, Michael .
JOURNAL OF BIOMEDICAL INFORMATICS, 2014, 50 :234-243
[9]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[10]   Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J].
Brakerski, Zvika .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :868-886