Presentation is loading. Please wait.

Presentation is loading. Please wait.

Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016.

Similar presentations


Presentation on theme: "Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016."— Presentation transcript:

1 Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016

2 Outline Homomorphic Encryption Definitions and Applications Brief history and types HE Schemes Computing on larger plaintext inputs Packing Techniques Direct Binary Galois Field Encoding Smart and Vercauteren Method External Chinese Remainder Theorem Comparison and Conclusion

3 What is Homomorphic Encryption? Homomorphic Encryption: provides the ability to preform computations on encrypted data. Untrusted parties can interpret encrypted requests and return an encrypted result without ever decrypting. An Evaluate function takes inputs of a function and ciphertext and outputs an encrypted ciphertext equivalent to the plaintext being evaluated by the function.

4 Why is it Important?  Truly Secure Cloud Computing  Encrypted Search Queries  Privacy Protection  Multiparty Computations  Each party has private info but together compute a result that is known to all parties ConfidentialityIntegrity Availability

5 SWHE vs FHE

6 Types of FHE Schemes  Lattice-based  First type purposed (2009)  Very large public key sizes and ciphertext  Similar theory as error correcting codes  Security from sparse subset sum problem (SSSP) or shortest vector problem (SVP)  Integer-based  Introduced by Dijk [3] (2010)  Theoretically simpler alternative to lattice based schemes  Includes a public key compression technique to reduce public key size from over 2GB to 10MB  Performance has been improved from a batching scheme [2]  Encrypts multiple plaintext bits into one ciphertext  Learning-with-errors (LWE)  Also extended to ring-learning-with-errors (RLWE) to increase efficiency (2011)  Current research focus of FHE  First purposed by Oded Regev

7 Ciphertext Packing  Pack multiple plaintext bits into a single ciphertext  Also referred to as batching  Improves efficiency by computing on more than one bit at a time  Interested in homomorphically computing on larger inputs.

8 Binary Galois Field Encoding

9 Smart and Vercauteren Method Goal: provide a scheme that supports Single Instruction Multiple Data (SIMD) operations and operations on large finite fields of characteristic two FHE scheme that would support operations on more than one bit at a time.

10 Smart and Vercauteren Method

11 Permutations Moves element from one ciphertext slot to another In SIMD operations, only elements in the same slot are operated on Complex permutation networks are required to link operations together Cloning is also needed

12 External use of CRT Purposed in the YASHE [4] scheme, 2013 Takes large input value and encrypts residues of smaller moduli into multiple ciphertexts. All ciphertexts are evaluated and the decrypted residues are recombined by inverse CRT Separates encoding process from the crypto system Provides more parallelism than the SV technique No requirement of permutations all elements are separated by their unique modulus

13 Conclusions Use of CRT outside of a homomorphic cryptosystem is just as effective and greatly simplifies computations External CRT can be applied to any scheme that supports the use of a generic plaintext modulus Removes the need to set scheme parameters to meet input data size

14 Questions

15 References [1] N. Smart and F. Vercauteren, "Fully homomorphic SIMD operations", in Designs, codes, and Cryptography 2012 [2] N. J. H. Cheon, J. S. Coron, J. Kim, M. S. Lee, L. T., M. Tibouchi, and A. Yun, "Batch Fully Homomorphic Encryption over the Integers", in Advances in Cryptology - EUROCRYPT 2013 [3] Z. Brakerski, V. Vaikuntanathan, and C. Gentry, "Fully Homomorphic Encryption without Bootstrapping", in Innovations in Theoretical Computer Science, 2012 [4] J. Bos, K. Lauter, J. Loftus, and M. Naehrig, "Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme“, 2013


Download ppt "Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016."

Similar presentations


Ads by Google