Accelerating Homomorphic Encryption using Approximate Computing Techniques

被引:2
|
作者
Khanna, Shabnam [1 ]
Rafferty, Ciara [1 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol CSIT, Belfast, Antrim, North Ireland
来源
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1 | 2020年
关键词
Homomorphic Encryption; Approximate Computing; Task Skipping; Depth Reduction; Loop Perforation; REDUCTION;
D O I
10.5220/0009828803800387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research proposes approximate computing techniques to accelerate homomorphic encryption (HE). In particular, the CKKS encryption scheme for approximate numbers is targeted. There is a requirement for HE in services dealing with confidential data, however current constructions are not efficient enough for real-time applications. A homomorphic encryption scheme which uses approximate arithmetic (showing faster results than previous HE schemes) already exists, the CKKS scheme, and this research applies a variation of the approximate computing techniques of task skipping and depth reduction (derived from loop perforation) to determine whether further approximating the functions evaluated using CKKS scheme can have a positive impact on performance of homomorphic evaluation. This is demonstrated via the evaluation of the logistic and exponential functions that this is possible, showing positive results. The speed up in running time for HE with task skipping is between 12.1% and 45.5%, depth reduction gives 35-45.5% speed-up with a small error difference than task skipping alone. The combination of both techniques corresponds to a halving of the running time, at the cost of increased error. This novel approach to further approximate homomorphic encryption shows that it is possible for certain functions, where running time is of paramount importance, that further approximations can be made with a lower-impacting greater error.
引用
收藏
页码:380 / 387
页数:8
相关论文
共 50 条
  • [31] Accelerating number theoretic transform in GPU platform for fully homomorphic encryption
    Jia-Zheng Goey
    Wai-Kong Lee
    Bok-Min Goi
    Wun-She Yap
    The Journal of Supercomputing, 2021, 77 : 1455 - 1474
  • [32] Accelerating number theoretic transform in GPU platform for fully homomorphic encryption
    Goey, Jia-Zheng
    Lee, Wai-Kong
    Goi, Bok-Min
    Yap, Wun-She
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1455 - 1474
  • [33] Privacy-Preserving Reinforcement Learning Using Homomorphic Encryption in Cloud Computing Infrastructures
    Park, Jaehyoung
    Kim, Dong Seong
    Lim, Hyuk
    IEEE ACCESS, 2020, 8 : 203564 - 203579
  • [34] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    FU Jing-yi
    NIU Xin-xin
    The Journal of China Universities of Posts and Telecommunications, 2013, 20 (06) : 88 - 95
  • [35] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 397 - 413
  • [36] Secure Cloud Computing Algorithm Using Homomorphic Encryption And Multi-Party Computation
    Das, Debasis
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 391 - 396
  • [37] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571
  • [38] From accuracy to approximation: A survey on approximate homomorphic encryption and its applications
    Liu, Weinan
    You, Lin
    Shao, Yunfei
    Shen, Xinyi
    Hu, Gengran
    Shi, Jiawen
    Gao, Shuhong
    COMPUTER SCIENCE REVIEW, 2025, 55
  • [39] Privacy-preserving approximate GWAS computation based on homomorphic encryption
    Duhyeong Kim
    Yongha Son
    Dongwoo Kim
    Andrey Kim
    Seungwan Hong
    Jung Hee Cheon
    BMC Medical Genomics, 13
  • [40] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225