Numerical Method for Comparison on Homomorphically Encrypted Numbers

被引:74
作者
Cheon, Jung Hee [1 ]
Kim, Dongwoo [1 ]
Kim, Duhyeong [1 ]
Lee, Hun Hee [1 ]
Lee, Keewoo [1 ]
机构
[1] Seoul Natl Univ, Dept Math Sci, Seoul, South Korea
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II | 2019年 / 11922卷
基金
新加坡国家研究基金会;
关键词
Homomorphic Encryption; Comparison; Min/Max; Iterative method; APPROXIMATION;
D O I
10.1007/978-3-030-34621-8_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a new method to compare numbers which are encrypted by Homomorphic Encryption (HE). Previously, comparison and min/max functions were evaluated using Boolean functions where input numbers are encrypted bit-wise. However, the bit-wise encryption methods require relatively expensive computations for basic arithmetic operations such as addition and multiplication. In this paper, we introduce iterative algorithms that approximately compute the min/max and comparison operations of several numbers which are encrypted word-wise. From the concrete error analyses, we show that our min/max and comparison algorithms have Theta(alpha) and Theta(alpha log alpha) computational complexity to obtain approximate values within an error rate 2(-alpha), while the previous minimax polynomial approximation method requires the exponential complexity Theta(2(alpha/2)) and Theta(root alpha . 2(alpha/2)), respectively. Our algorithms achieve (quasi-)optimality in terms of asymptotic computational complexity among polynomial approximations for min/max and comparison operations. The comparison algorithm is extended to several applications such as computing the top-k elements and counting numbers over the threshold in encrypted state. Our method enables word-wise HEs to enjoy comparable performance in practice with bit-wise HEs for comparison operations while showing much better performance on polynomial operations. Computing an approximate maximum value of any two l-bit integers encrypted by HEAAN, up to error 2(l-10), takes only 1.14 ms in amortized running time, which is comparable to the result based on bit-wise HEs.
引用
收藏
页码:415 / 445
页数:31
相关论文
共 44 条
  • [1] On the concrete hardness of Learning with Errors
    Albrecht, Martin R.
    Player, Rachel
    Scott, Sam
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (03) : 169 - 203
  • [2] Angela J., 2017, INT C SEL AR CRYPT S, V1349, P453, DOI 10.1007/978-3-030-10970-7_21
  • [3] [Anonymous], 2017, SAGE MODULE ESTIMATI
  • [4] [Anonymous], INT C MACH LEARN
  • [5] [Anonymous], 2003, INTERPOLATION APPROX, DOI DOI 10.1007/0-387-21682-0_2
  • [6] [Anonymous], 1930, The theory of approximation
  • [7] [Anonymous], 1978, FDN SEC COMPUT
  • [8] Uniform approximation of sgn x by polynomials and entire functions
    Aremenko, Alexander
    Yuditskii, Peter
    [J]. JOURNAL D ANALYSE MATHEMATIQUE, 2007, 101 (1): : 313 - 324
  • [9] On the best approximation of vertical bar x vertical bar by polynomic linear data.
    Bernstein, S
    [J]. ACTA MATHEMATICA, 1914, 37 (01) : 1 - 57
  • [10] Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4