Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT

被引:5
作者
Alves, Pedro Geraldo M. R. [1 ]
Ortiz, Jheyne N. [1 ]
Aranha, Diego F. [2 ]
机构
[1] Univ Estadual Campinas, Campinas, SP, Brazil
[2] Aarhus Univ, Aarhus, Denmark
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT II | 2021年 / 12675卷
关键词
Fully homomorphic encryption; BFV; CUDA; Polynomial multiplication; Privacy-preserving computing;
D O I
10.1007/978-3-662-64331-0_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy guarantees are still insufficient for outsourced data processing in the cloud. While employing encryption is feasible for data at rest or in transit, it is not for computation without remarkable performance slowdown. Thus, handling data in plaintext during processing is still required, which creates vulnerabilities that can be exploited by malicious entities. Homomorphic encryption schemes enable computation over ciphertexts without knowing the related plaintexts or the decryption key. This work focuses on the challenge of developing an efficient implementation of the BFV scheme on CUDA. This is done by combining and adapting different literature approaches, as the double-CRT representation and the Discrete Galois Transform. Moreover, we propose and implement an improved formulation of the DGT inspired by classical algorithms, which computes the transform up to 2.6 times faster than the state-of-the-art. By using these approaches, we obtain up to 3.6 times faster homomorphic multiplication.
引用
收藏
页码:520 / 540
页数:21
相关论文
共 30 条
  • [1] NFLlib: NTT-Based Fast Lattice Library
    Aguilar-Melchor, Carlos
    Barrier, Joris
    Guelton, Serge
    Guinet, Adrien
    Killijian, Marc-Olivier
    Lepoint, Tancrede
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 341 - 356
  • [2] Al Badawi Ahmad, 2019, Advances in Information and Communication Networks. Proceedings of the 2018 Future of Information and Communication Conference (FICC). Advances in Intelligent Systems and Computing (AISC 886), P666, DOI 10.1007/978-3-030-03402-3_47
  • [3] A Subfield Lattice Attack on Overstretched NTRU Assumptions Cryptanalysis of Some FHE and Graded Encoding Schemes
    Albrecht, Martin
    Bai, Shi
    Ducas, Leo
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 153 - 178
  • [4] Alves P, SPOG SECURE PROCESSI
  • [5] Alves PGMR, 2020, 2020861 CRYPT EPRINT
  • [6] [Anonymous], 2008, SC'08: Proceedings of the 2008 ACM/IEEE conference on Supercomputing, DOI [10.1109/SC.2008.5213922, DOI 10.1109/SC.2008.5213922]
  • [7] Badawi A.A., 2018, IACR CRYPTOLOGY EPRI, V2018, P589
  • [8] Badawi A.Q.A., 2018, TCHES, V1, P70
  • [9] FFTS IN EXTERNAL OR HIERARCHICAL MEMORY
    BAILEY, DH
    [J]. JOURNAL OF SUPERCOMPUTING, 1990, 4 (01) : 23 - 35
  • [10] Bajard Jean-Claude, 2017, Selected Areas in Cryptography - SAC 2016. 23rd International Conference. Revised Selected Papers: LNCS 10532, P423, DOI 10.1007/978-3-319-69453-5_23