Accelerating Fully Homomorphic Encryption in Hardware

被引:53
作者
Doroez, Yarkin [1 ]
Ozturk, Erdinc [2 ]
Sunar, Berk [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01906 USA
[2] Istanbul Commerce Univ, Dept Elect & Elect Engn, Istanbul, Turkey
基金
美国国家科学基金会;
关键词
Fully homomorphic encryption; application specific hardware; cryptographic accelerators; large-integer multiplication; MULTIPLICATION; ALGORITHM;
D O I
10.1109/TC.2014.2345388
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a custom architecture for realizing the Gentry-Halevi fully homomorphic encryption (FHE) scheme. This contribution presents the first full realization of FHE in hardware. The architecture features an optimized multi-million bit multiplier based on the Schonhage Strassen multiplication algorithm. Moreover, a number of optimizations including spectral techniques as well as a precomputation strategy is used to significantly improve the performance of the overall design. When synthesized using 90 nm technology, the presented architecture achieves to realize the encryption, decryption, and recryption operations in 18.1 msec, 16.1 msec, and 3.1 sec, respectively, and occupies a footprint of less than 30 million gates.
引用
收藏
页码:1509 / 1521
页数:13
相关论文
共 24 条
[11]  
Garcia L. C. C., 2005, P C CRYPT MOR CRYPT
[12]  
Gathen J., 2003, MODERN COMPUTER ALGE
[13]  
Gentry C., 2009, THESIS STANFORD U ST
[14]  
Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
[15]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[16]  
Kalach K., 2005, The 3rd International IEEE-NEWCAS Conference (IEEE Cat. No. 05EX1015), P267
[17]  
KARABUTSA A, 1962, DOKL AKAD NAUK SSSR+, V145, P293
[18]  
López-Alt A, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1219
[19]  
Munro I., 1973, Journal of Computer and System Sciences, V7, P189, DOI 10.1016/S0022-0000(73)80043-1
[20]  
Rivest RonaldL., 1978, Found. Secure Comput., V4, P169