Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference

被引:136
|
作者
Chen, Hao [1 ]
Dai, Wei [1 ]
Kim, Miran [2 ]
Song, Yongsoo [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] UT Hlth Sci Ctr Houston, Houston, TX USA
来源
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) | 2019年
关键词
multi-key homomorphic encryption; packed ciphertext; ring learning with errors; neural networks; FHE;
D O I
10.1145/3319535.3363207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted data. Lopez-Alt et al. (STOC 2012) proposed a generalized notion of HE, called Multi-Key Homomorphic Encryption (MKHE), which is capable of performing arithmetic operations on ciphertexts encrypted under different keys. In this paper, we present multi-key variants of two HE schemes with packed ciphertexts. We present new relinearization algorithms which are simpler and faster than previous method by Chen et al. (TCC 2017). We then generalize the bootstrapping techniques for HE to obtain multi-key fully homomorphic encryption schemes. We provide a proof-of-concept implementation of both MKHE schemes using Microsoft SEAL. For example, when the dimension of base ring is 8192, homomorphic multiplication between multi-key BFV (resp. CKKS) ciphertexts associated with four parties followed by a relinearization takes about 116 (resp. 67) milliseconds. Our MKHE schemes have a wide range of applications in secure computation between multiple data providers. As a benchmark, we homomorphically classify an image using a pre-trained neural network model, where input data and model are encrypted under different keys. Our implementation takes about 1.8 seconds to evaluate one convolutional layer followed by two fully connected layers on an encrypted image from the MNIST dataset.
引用
收藏
页码:395 / 412
页数:18
相关论文
共 50 条
  • [21] Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
    Li R.
    Jia C.
    Wang Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 11 - 22
  • [22] Decentralized Distributed Federated Learning Based on Multi-Key Homomorphic Encryption
    Shang, Mengxue
    Zhang, Dandan
    Li, Fengyin
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 260 - 265
  • [23] Multi-key Fully Homomorphic Encryption without CRS from RLWE
    Luo, Fucai
    Wang, Haiyan
    Al-Kuwari, Saif
    Han, Weihong
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [24] Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol
    Li, Ningbo
    Zhou, Tanping
    Yang, Xiaoyuan
    Han, Yiliang
    Liu, Wenchao
    Tu, Guangsheng
    IEEE ACCESS, 2019, 7 : 56724 - 56732
  • [25] Privacy-preserving federated learning based on multi-key homomorphic encryption
    Ma, Jing
    Naas, Si-Ahmed
    Sigg, Stephan
    Lyu, Xixiang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) : 5880 - 5901
  • [26] Optimization of NTRU-type Multi-key Fully Homomorphic Encryption Scheme
    Che X.
    Zhou T.
    Li N.
    Zhou H.
    Liu L.
    Yang X.
    Yang, Xiaoyuan (xyyangwj@126.com), 1600, Sichuan University (52): : 186 - 193
  • [27] Privacy preserving security using multi-key homomorphic encryption for face recognition
    Wang, Jing
    Xin, Rundong
    Alfarraj, Osama
    Tolba, Amr
    Tang, Qitao
    EXPERT SYSTEMS, 2025, 42 (02)
  • [28] Random forest evaluation using multi-key homomorphic encryption and lookup tables
    Petrean, Diana-Elena
    Potolea, Rodica
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2023 - 2041
  • [29] Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits
    Feng, Shuai
    Xu, Shuaijianni
    Zhang, Liang Feng
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 17 - 27
  • [30] Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model
    Li, Hui
    Li, Xuelian
    Gao, Juntao
    Wang, Runsong
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 342 - 357