Improved Filter Permutators for Efficient FHE: Better Instances and Implementations

被引:32
作者
Meaux, Pierrick [1 ]
Carlet, Claude [2 ,3 ]
Journault, Anthony [1 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Catholic Univ Louvain, ICTEAM ELEN Crypto Grp, Louvain La Neuve, Belgium
[2] Univ Paris 08, LAGA, St Denis, France
[3] Univ Bergen, Dept Informat, Bergen, Norway
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019 | 2019年 / 11898卷
关键词
Filter permutator; Homomorphic encryption; Boolean functions; ALGEBRAIC ATTACKS; STREAM CIPHERS;
D O I
10.1007/978-3-030-35423-7_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the design of filter permutators as a general approach to build stream ciphers that can be efficiently evaluated in a fully homomorphic manner. We first introduce improved filter permutators that allow better security analyses, instances and implementations than the previously proposed FLIP family of ciphers. We also put forward the similarities between these improved constructions and a popular PRG design by Goldreich. We then propose a methodology to evaluate the performance of such symmetric cipher designs in a FHE setting, which primarily focuses on the noise level of the symmetric ciphertexts (hence on the amount of operations on these ciphertexts that can be homomorphically evaluated). Evaluations through HElib show that instances of improved filter permutators using direct sums of monomials as filter outperform all existing ciphers in the literature based on this criteria. We also discuss the (limited) overheads of these instances in terms of latency and throughput.
引用
收藏
页码:68 / 91
页数:24
相关论文
共 39 条
[1]   On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [J].
Albrecht, Martin R. .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 :103-129
[2]   Ciphers for MPC and FHE [J].
Albrecht, Martin R. ;
Rechberger, Christian ;
Schneider, Thomas ;
Tiessen, Tyge ;
Zohner, Michael .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :430-454
[3]  
Albrecht MR., 2016, IACR Cryptol. ePrint Arch., V2016, P687
[4]  
[Anonymous], 2000, IACR CRYPTOL EPRINT
[5]  
Applebaum B., 2016, 48 ACM STOC
[6]  
Applebaum B, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P805
[7]  
Applebaum B, 2013, LECT NOTES COMPUT SC, V7785, P599, DOI 10.1007/978-3-642-36594-2_33
[8]  
Armknecht F, 2006, LECT NOTES COMPUT SC, V4004, P147
[9]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[10]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600