SlideShare a Scribd company logo
1 of 20
Download to read offline
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Homomorphic Lower Digits Removal and
Improved FHE Bootstrapping
Hao Chen and Kyoohyung Han*
Microsoft Research and Seoul National University
satanigh@snu.ac.kr
April 30, 2018
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Homomorphic Encryption
• Homomorphic Encryption (HE) supports operations between
encrypted data
• HE can be used for out-sourced computation (without
revealing private information)
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Bootstrapping
• The size of noise in ciphertext of HE becomes large during
homomorphic evaluations.
• If we need large depth computation in encrypted state,
bootstrapping is necessary.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Bootstrapping
• Bootstrapping = ‘Homomorphic Eval of decryption circuit’.
• How can we make bootstrapping more efficient?
1. Express decryption function (or circuit) with lower depth.
> Better Bootstrapping in FHE [GHS12]
> Bootstrapping in HElib [HS15]
> (Batch) FHE over integers for Non-binary Msg Space [NK15]
2. Express decryption function with less non-scalar multiplications.
> Various optimization techniques are related.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Homomorphic Lower Digit Removal
Homomorphic Lower Digit Removal
For a given encryption of a ∈ Zpe , our goal is to return encryption
of b = a − [a]pv ∈ Zpe .
• Homomorphic Lower Digit Removal is used in bootstrapping
for RLWE based FHE.
• Homomorphic Lower Digit Removal can also be used for
homomorphic flooring (which is need for real number
arithmetics).
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Homomorphic Lower Digit Removal
Homomorphic Lower Digit Removal
For a given encryption of a ∈ Zpe , our goal is to return encryption
of b = a − [a]pv ∈ Zpe .
• Homomorphic Lower Digit Removal is used in bootstrapping
for RLWE based FHE.
• Homomorphic Lower Digit Removal can also be used for
homomorphic flooring (which is need for real number
arithmetics).
• HE only supports add and mult (i.e polynomial evaluation).
• What is good representation of Homomorphic Lower Digit
Removal using polynomial?
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
The Previous Method in [HS15]
Lifting Polynomial
For a given p and e, there exists a polynomial F(X) satisfies
following condition:
F(b) = a ∈ Zpk+1 if b = a ∈ Zpk
for a ∈ {0, . . . , p − 1}. The degree of F(X) is p.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
The Previous Method in [HS15]
Lifting Polynomial
For a given p and e, there exists a polynomial F(X) satisfies
following condition:
F(b) = a ∈ Zpk+1 if b = a ∈ Zpk
for a ∈ {0, . . . , p − 1}. The degree of F(X) is p.
Special Operations
For a given encryption of a ∈ Zpe , MultByP() returns an
encryption of pa ∈ Zpe+1 . For a given encryption of pa ∈ Zpe ,
DivideByP() returns an encryption of a ∈ Zpe−1 .
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
The Previous Method
For an encryption of I = d + cp + bp2 + ap3 = a b c d ,
• Lift( a b c d ): 0 d · · · expensive
• Lift( 0 d ): 0 0 d · · · expensive
• MultByP( a b c ): a b c 0 · · · cheap
• DevideByP( a b c 0 ): a b c · · · cheap
Remark
The number of non-scalar multiplication while homomorphic
evaluation of lifting polynomial is O(
√
p) (Paterson-Stockmeyer
Algorithm).
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
The Previous Method
GOAL: a b c d ⇒ a b 0 0
a b c d
Lift
−−→ 0 d
Lift
−−→ 0 0 d
Lift
−−→ 0 0 0 d
c 0 and apply DivideByP()
c
Lift
−−→ 0 c
Lift
−−→ 0 0 c
MultByP()
−−−−−−→ 0 0 c 0
Depth and Complexity
Suppose that the input is in Zpe and we want to remove bottom v
digits. The previous method consumes (e log p) depth and
(1
2e2
√
2p) number of non-scalar multiplications.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Our Method
Lowest Digit Removal (LDR) Polynomial
For a given p and e, there exist a polynomial F such that for every
integer 0 ≤ a < pe, we have
F(a) = a − [a]p mod pe
.
The degree of F(X) is at most (e − 1)(p − 1) + 1.
• When p = 2 and e = 4, F(X) = 11X4 + 8X3 + 12X2 + X.
• If we use lifting polynomial, we can get F (X) = X − X8.
• LDR( a b c d ): a b c 0 .
• Lowest Digit Extraction (LDE) can also be done by thinking
G(X) = X − F(X).
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Our Method
GOAL: a b c d ⇒ a b 0 0
a b c d
Lift
−−→ 0 d , a b c d
LDE
−−−→ 0 0 0 d
c 0 and apply DivideByP()
c
LDE
−−−→ 0 0 c
MultByP()
−−−−−−→ 0 0 c 0
Depth and Complexity
Suppose that the input is in Zpe and we want to remove bottom v
digits. Our method consumes (v log p + log e) depth and
(
√
2pe · v) number of non-scalar multiplications.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Result
• Our method consumes smaller depth and is faster than
previous one.
• In case of p = 2, 3, lifting polynomial is X2 and X3 resp.
Homomorphic evaluation of those functions have some
optimizations.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Improved Bootstrapping for (B)FV scheme
Decryption Algorithm
1. Inner Product:
c1(x) + c2(x) · s(x) mod q = q/t · m(x) + e(x)
2. Rounding:
t
q
(c1(x) + c2(x) · s(x)) = m(x)
Step 1 is easy to evaluate in encrypted state, but step 2 is hard to
do. To make it easier, we apply a ‘modulus switching’ trick.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Improved Bootstrapping for (B)FV scheme
Let t = pr and ciphertext modulus is switched to q = pe.
1. Inner Product:
c1(x) + c2(x) · s(x) mod pe
= pe−r
· m(x) + e(x)
2. Lower Digit Removal:
Add pe−r
/2 and remove bottom e−r digits of each coefficients.
Bootstrapping can be done using our method for removing e − r
digits in second step.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Slim Bootstrapping for (B)FV scheme
• The plaintext space of
BGV and (B)FV scheme is
a product of finite fields.
• In applications, it is hard
to use those finite field
structures.
• For this reason, we also
proposed efficient
bootstrapping for plaintext
space Zt for t = pr .
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Result
• We implemented our method on Simple Encrypted Arithmetic
Library v2.3. [SEAL]
• Our technique can also be adapted to bootstrapping in HElib.
• When plaintext space is Z64
127, recrypt takes only 6.75 seconds.
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
References
Simple Encrypted Arithmetic Library (SEAL)
https://www.microsoft.com/en-us/research/project/simple-encrypted-
arithmetic-library/
Craig Gentry, Shai Halevi, and Nigel P. Smart
Better Bootstrapping in Fully Homomorphic Encryption
PKC 2012
Shai Halevi and Victor Shoup
Bootstrapping for HElib
EUROCRYPT 2015
Koji Nuida and Kaoru Kurosawa
(Batch) Fully Homomorphic Encryption over Integers for Non-binary
Message Spaces
EUROCRYPT 2015
Make sure to check out vpnMentors’
interview with Kyoohyung Han at
EuroCrypt 2018 in Tel Aviv

More Related Content

What's hot

Lecture 08 uninformed search techniques
Lecture 08 uninformed search techniquesLecture 08 uninformed search techniques
Lecture 08 uninformed search techniquesHema Kashyap
 
Introduction to NumPy (PyData SV 2013)
Introduction to NumPy (PyData SV 2013)Introduction to NumPy (PyData SV 2013)
Introduction to NumPy (PyData SV 2013)PyData
 
The Elements of Machine Learning
The Elements of Machine LearningThe Elements of Machine Learning
The Elements of Machine LearningAlexander Jung
 
[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...
[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...
[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...Asai Masataro
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
2 lectures 16 17-informed search algorithms ch 4.3
2 lectures 16 17-informed search algorithms ch 4.32 lectures 16 17-informed search algorithms ch 4.3
2 lectures 16 17-informed search algorithms ch 4.3Ravi Balout
 
Intoduction to numpy
Intoduction to numpyIntoduction to numpy
Intoduction to numpyFaraz Ahmed
 
Minimum phase, All pass and Magnitude Squared Function
Minimum phase, All pass and Magnitude Squared FunctionMinimum phase, All pass and Magnitude Squared Function
Minimum phase, All pass and Magnitude Squared FunctionCOMSATS Abbottabad
 
Effective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPyEffective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPyKimikazu Kato
 
Solving problems by searching Informed (heuristics) Search
Solving problems by searching Informed (heuristics) SearchSolving problems by searching Informed (heuristics) Search
Solving problems by searching Informed (heuristics) Searchmatele41
 
Lecture 10 Uninformed Search Techniques conti..
Lecture 10 Uninformed Search Techniques conti..Lecture 10 Uninformed Search Techniques conti..
Lecture 10 Uninformed Search Techniques conti..Hema Kashyap
 

What's hot (20)

Lecture 08 uninformed search techniques
Lecture 08 uninformed search techniquesLecture 08 uninformed search techniques
Lecture 08 uninformed search techniques
 
Algorithm
AlgorithmAlgorithm
Algorithm
 
Numpy Talk at SIAM
Numpy Talk at SIAMNumpy Talk at SIAM
Numpy Talk at SIAM
 
Introduction to NumPy (PyData SV 2013)
Introduction to NumPy (PyData SV 2013)Introduction to NumPy (PyData SV 2013)
Introduction to NumPy (PyData SV 2013)
 
Bc0037
Bc0037Bc0037
Bc0037
 
The Elements of Machine Learning
The Elements of Machine LearningThe Elements of Machine Learning
The Elements of Machine Learning
 
[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...
[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...
[AAAI-16] Tiebreaking Strategies for A* Search: How to Explore the Final Fron...
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
2 lectures 16 17-informed search algorithms ch 4.3
2 lectures 16 17-informed search algorithms ch 4.32 lectures 16 17-informed search algorithms ch 4.3
2 lectures 16 17-informed search algorithms ch 4.3
 
Intoduction to numpy
Intoduction to numpyIntoduction to numpy
Intoduction to numpy
 
Asymptotic Notation
Asymptotic NotationAsymptotic Notation
Asymptotic Notation
 
Filter Designing
Filter DesigningFilter Designing
Filter Designing
 
Minimum phase, All pass and Magnitude Squared Function
Minimum phase, All pass and Magnitude Squared FunctionMinimum phase, All pass and Magnitude Squared Function
Minimum phase, All pass and Magnitude Squared Function
 
Effective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPyEffective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPy
 
Ir2415241528
Ir2415241528Ir2415241528
Ir2415241528
 
Solving problems by searching Informed (heuristics) Search
Solving problems by searching Informed (heuristics) SearchSolving problems by searching Informed (heuristics) Search
Solving problems by searching Informed (heuristics) Search
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow Analysis
 
Phase Responce of Pole zero
Phase Responce of Pole zeroPhase Responce of Pole zero
Phase Responce of Pole zero
 
Pythonic Math
Pythonic MathPythonic Math
Pythonic Math
 
Lecture 10 Uninformed Search Techniques conti..
Lecture 10 Uninformed Search Techniques conti..Lecture 10 Uninformed Search Techniques conti..
Lecture 10 Uninformed Search Techniques conti..
 

Similar to Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han

Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesSreedhar Chowdam
 
Firefly exact MCMC for Big Data
Firefly exact MCMC for Big DataFirefly exact MCMC for Big Data
Firefly exact MCMC for Big DataGianvito Siciliano
 
Model Selection and Validation
Model Selection and ValidationModel Selection and Validation
Model Selection and Validationgmorishita
 
2. Linear regression with one variable.pptx
2. Linear regression with one variable.pptx2. Linear regression with one variable.pptx
2. Linear regression with one variable.pptxEmad Nabil
 
Python高级编程(二)
Python高级编程(二)Python高级编程(二)
Python高级编程(二)Qiangning Hong
 
Ap calculus extrema v2
Ap calculus extrema v2Ap calculus extrema v2
Ap calculus extrema v2gregcross22
 
DeepLearningLecture.pptx
DeepLearningLecture.pptxDeepLearningLecture.pptx
DeepLearningLecture.pptxssuserf07225
 
Principle of Maximum Entropy
Principle of Maximum EntropyPrinciple of Maximum Entropy
Principle of Maximum EntropyJiawang Liu
 
Variational Inference in Python
Variational Inference in PythonVariational Inference in Python
Variational Inference in PythonPeadar Coyle
 
snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functionsRebekah Mercer
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)danishrafiq
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsNIT Sikkim
 
Dsoop (co 221) 1
Dsoop (co 221) 1Dsoop (co 221) 1
Dsoop (co 221) 1Puja Koch
 
Robust and Tuneable Family of Gossiping Algorithms
Robust and Tuneable Family of Gossiping AlgorithmsRobust and Tuneable Family of Gossiping Algorithms
Robust and Tuneable Family of Gossiping AlgorithmsVincenzo De Florio
 

Similar to Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han (20)

Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
 
Unit4
Unit4Unit4
Unit4
 
Firefly exact MCMC for Big Data
Firefly exact MCMC for Big DataFirefly exact MCMC for Big Data
Firefly exact MCMC for Big Data
 
Model Selection and Validation
Model Selection and ValidationModel Selection and Validation
Model Selection and Validation
 
Ecc2
Ecc2Ecc2
Ecc2
 
2. Linear regression with one variable.pptx
2. Linear regression with one variable.pptx2. Linear regression with one variable.pptx
2. Linear regression with one variable.pptx
 
Python高级编程(二)
Python高级编程(二)Python高级编程(二)
Python高级编程(二)
 
Ap calculus extrema v2
Ap calculus extrema v2Ap calculus extrema v2
Ap calculus extrema v2
 
Backpropagation - Elisa Sayrol - UPC Barcelona 2018
Backpropagation - Elisa Sayrol - UPC Barcelona 2018Backpropagation - Elisa Sayrol - UPC Barcelona 2018
Backpropagation - Elisa Sayrol - UPC Barcelona 2018
 
DeepLearningLecture.pptx
DeepLearningLecture.pptxDeepLearningLecture.pptx
DeepLearningLecture.pptx
 
Principle of Maximum Entropy
Principle of Maximum EntropyPrinciple of Maximum Entropy
Principle of Maximum Entropy
 
Variational Inference in Python
Variational Inference in PythonVariational Inference in Python
Variational Inference in Python
 
snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functions
 
Code optimization
Code optimizationCode optimization
Code optimization
 
Code optimization
Code optimizationCode optimization
Code optimization
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
 
C Programming Homework Help
C Programming Homework HelpC Programming Homework Help
C Programming Homework Help
 
Dsoop (co 221) 1
Dsoop (co 221) 1Dsoop (co 221) 1
Dsoop (co 221) 1
 
Robust and Tuneable Family of Gossiping Algorithms
Robust and Tuneable Family of Gossiping AlgorithmsRobust and Tuneable Family of Gossiping Algorithms
Robust and Tuneable Family of Gossiping Algorithms
 

More from vpnmentor

On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter vpnmentor
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routingvpnmentor
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak MaheshwariIndia’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwarivpnmentor
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...vpnmentor
 
Alternative cryptocurrencies
Alternative cryptocurrenciesAlternative cryptocurrencies
Alternative cryptocurrenciesvpnmentor
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part IIvpnmentor
 
Mining pools and attacks
Mining pools and attacksMining pools and attacks
Mining pools and attacksvpnmentor
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part Ivpnmentor
 
Alternative cryptocurrencies
Alternative cryptocurrencies Alternative cryptocurrencies
Alternative cryptocurrencies vpnmentor
 
Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3vpnmentor
 
On the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard ModelOn the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard Modelvpnmentor
 
TLS: Past, Present, Future
TLS: Past, Present, FutureTLS: Past, Present, Future
TLS: Past, Present, Futurevpnmentor
 
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 EncryptionOn the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryptionvpnmentor
 

More from vpnmentor (14)

On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak MaheshwariIndia’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...
 
Alternative cryptocurrencies
Alternative cryptocurrenciesAlternative cryptocurrencies
Alternative cryptocurrencies
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part II
 
Mining pools and attacks
Mining pools and attacksMining pools and attacks
Mining pools and attacks
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part I
 
Alternative cryptocurrencies
Alternative cryptocurrencies Alternative cryptocurrencies
Alternative cryptocurrencies
 
Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3
 
On the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard ModelOn the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard Model
 
TLS: Past, Present, Future
TLS: Past, Present, FutureTLS: Past, Present, Future
TLS: Past, Present, Future
 
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 EncryptionOn the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han

  • 1. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Homomorphic Lower Digits Removal and Improved FHE Bootstrapping Hao Chen and Kyoohyung Han* Microsoft Research and Seoul National University satanigh@snu.ac.kr April 30, 2018
  • 2. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Homomorphic Encryption • Homomorphic Encryption (HE) supports operations between encrypted data • HE can be used for out-sourced computation (without revealing private information)
  • 3. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Bootstrapping • The size of noise in ciphertext of HE becomes large during homomorphic evaluations. • If we need large depth computation in encrypted state, bootstrapping is necessary.
  • 4. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Bootstrapping • Bootstrapping = ‘Homomorphic Eval of decryption circuit’. • How can we make bootstrapping more efficient? 1. Express decryption function (or circuit) with lower depth. > Better Bootstrapping in FHE [GHS12] > Bootstrapping in HElib [HS15] > (Batch) FHE over integers for Non-binary Msg Space [NK15] 2. Express decryption function with less non-scalar multiplications. > Various optimization techniques are related.
  • 5. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Homomorphic Lower Digit Removal Homomorphic Lower Digit Removal For a given encryption of a ∈ Zpe , our goal is to return encryption of b = a − [a]pv ∈ Zpe . • Homomorphic Lower Digit Removal is used in bootstrapping for RLWE based FHE. • Homomorphic Lower Digit Removal can also be used for homomorphic flooring (which is need for real number arithmetics).
  • 6. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Homomorphic Lower Digit Removal Homomorphic Lower Digit Removal For a given encryption of a ∈ Zpe , our goal is to return encryption of b = a − [a]pv ∈ Zpe . • Homomorphic Lower Digit Removal is used in bootstrapping for RLWE based FHE. • Homomorphic Lower Digit Removal can also be used for homomorphic flooring (which is need for real number arithmetics). • HE only supports add and mult (i.e polynomial evaluation). • What is good representation of Homomorphic Lower Digit Removal using polynomial?
  • 7. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE The Previous Method in [HS15] Lifting Polynomial For a given p and e, there exists a polynomial F(X) satisfies following condition: F(b) = a ∈ Zpk+1 if b = a ∈ Zpk for a ∈ {0, . . . , p − 1}. The degree of F(X) is p.
  • 8. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE The Previous Method in [HS15] Lifting Polynomial For a given p and e, there exists a polynomial F(X) satisfies following condition: F(b) = a ∈ Zpk+1 if b = a ∈ Zpk for a ∈ {0, . . . , p − 1}. The degree of F(X) is p. Special Operations For a given encryption of a ∈ Zpe , MultByP() returns an encryption of pa ∈ Zpe+1 . For a given encryption of pa ∈ Zpe , DivideByP() returns an encryption of a ∈ Zpe−1 .
  • 9. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE The Previous Method For an encryption of I = d + cp + bp2 + ap3 = a b c d , • Lift( a b c d ): 0 d · · · expensive • Lift( 0 d ): 0 0 d · · · expensive • MultByP( a b c ): a b c 0 · · · cheap • DevideByP( a b c 0 ): a b c · · · cheap Remark The number of non-scalar multiplication while homomorphic evaluation of lifting polynomial is O( √ p) (Paterson-Stockmeyer Algorithm).
  • 10. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE The Previous Method GOAL: a b c d ⇒ a b 0 0 a b c d Lift −−→ 0 d Lift −−→ 0 0 d Lift −−→ 0 0 0 d c 0 and apply DivideByP() c Lift −−→ 0 c Lift −−→ 0 0 c MultByP() −−−−−−→ 0 0 c 0 Depth and Complexity Suppose that the input is in Zpe and we want to remove bottom v digits. The previous method consumes (e log p) depth and (1 2e2 √ 2p) number of non-scalar multiplications.
  • 11. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Our Method Lowest Digit Removal (LDR) Polynomial For a given p and e, there exist a polynomial F such that for every integer 0 ≤ a < pe, we have F(a) = a − [a]p mod pe . The degree of F(X) is at most (e − 1)(p − 1) + 1. • When p = 2 and e = 4, F(X) = 11X4 + 8X3 + 12X2 + X. • If we use lifting polynomial, we can get F (X) = X − X8. • LDR( a b c d ): a b c 0 . • Lowest Digit Extraction (LDE) can also be done by thinking G(X) = X − F(X).
  • 12. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Our Method GOAL: a b c d ⇒ a b 0 0 a b c d Lift −−→ 0 d , a b c d LDE −−−→ 0 0 0 d c 0 and apply DivideByP() c LDE −−−→ 0 0 c MultByP() −−−−−−→ 0 0 c 0 Depth and Complexity Suppose that the input is in Zpe and we want to remove bottom v digits. Our method consumes (v log p + log e) depth and ( √ 2pe · v) number of non-scalar multiplications.
  • 13. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Result • Our method consumes smaller depth and is faster than previous one. • In case of p = 2, 3, lifting polynomial is X2 and X3 resp. Homomorphic evaluation of those functions have some optimizations.
  • 14. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Improved Bootstrapping for (B)FV scheme Decryption Algorithm 1. Inner Product: c1(x) + c2(x) · s(x) mod q = q/t · m(x) + e(x) 2. Rounding: t q (c1(x) + c2(x) · s(x)) = m(x) Step 1 is easy to evaluate in encrypted state, but step 2 is hard to do. To make it easier, we apply a ‘modulus switching’ trick.
  • 15. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Improved Bootstrapping for (B)FV scheme Let t = pr and ciphertext modulus is switched to q = pe. 1. Inner Product: c1(x) + c2(x) · s(x) mod pe = pe−r · m(x) + e(x) 2. Lower Digit Removal: Add pe−r /2 and remove bottom e−r digits of each coefficients. Bootstrapping can be done using our method for removing e − r digits in second step.
  • 16. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Slim Bootstrapping for (B)FV scheme • The plaintext space of BGV and (B)FV scheme is a product of finite fields. • In applications, it is hard to use those finite field structures. • For this reason, we also proposed efficient bootstrapping for plaintext space Zt for t = pr .
  • 17. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE Result • We implemented our method on Simple Encrypted Arithmetic Library v2.3. [SEAL] • Our technique can also be adapted to bootstrapping in HElib. • When plaintext space is Z64 127, recrypt takes only 6.75 seconds.
  • 18. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE
  • 19. Introduction Homomorphic Lower Digit Removal Improved Bootstrapping for FHE References Simple Encrypted Arithmetic Library (SEAL) https://www.microsoft.com/en-us/research/project/simple-encrypted- arithmetic-library/ Craig Gentry, Shai Halevi, and Nigel P. Smart Better Bootstrapping in Fully Homomorphic Encryption PKC 2012 Shai Halevi and Victor Shoup Bootstrapping for HElib EUROCRYPT 2015 Koji Nuida and Kaoru Kurosawa (Batch) Fully Homomorphic Encryption over Integers for Non-binary Message Spaces EUROCRYPT 2015
  • 20. Make sure to check out vpnMentors’ interview with Kyoohyung Han at EuroCrypt 2018 in Tel Aviv