Skip to main content
Erschienen in: Journal of Cryptology 1/2024

01.03.2024 | Research Article

BLEACH: Cleaning Errors in Discrete Computations Over CKKS

verfasst von: Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul

Erschienen in: Journal of Cryptology | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Approximated homomorphic encryption (HE) schemes such as CKKS are commonly used to perform computations over encrypted real numbers. It is commonly assumed that these schemes are not “exact” and thus they cannot execute circuits with unbounded depth over discrete sets, such as binary or integer numbers, without error overflows. These circuits are usually executed using BGV and B/FV for integers and TFHE for binary numbers. This artificial separation can cause users to favor one scheme over another for a given computation, without even exploring other, perhaps better, options. We show that by treating step functions as “clean-up” utilities and by leveraging the SIMD capabilities of CKKS, we can extend the homomorphic encryption toolbox with efficient tools. These tools use CKKS to run unbounded circuits that operate over binary and small-integer elements and even combine these circuits with fixed-point real numbers circuits. We demonstrate the results using the Turing-complete Conway’s Game of Life. In our evaluation, for boards of size 256\(\times \)256, these tools achieved orders of magnitude faster latency than previous implementations using other HE schemes. We argue and demonstrate that for large enough real-world inputs, performing binary circuits over CKKS, while considering it as an “exact” scheme, results in comparable or even better performance than using other schemes tailored for similar inputs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
Theorem 6 exists in the peer-reviewed paper in Appendix D but not in the ePrint version.
 
Literatur
2.
Zurück zum Zitat E. Aharoni, A. Adir, M. Baruch, N. Drucker, G. Ezov, A. Farkash, L. Greenberg, R. Masalha, G. Moshkowich, D. Murik, H. Shaul, O. Soceanu, HeLayers: a tile tensors framework for large neural networks on encrypted data. PoPETs (2023), https://doi.org/10.56553/popets-2023-0020 E. Aharoni, A. Adir, M. Baruch, N. Drucker, G. Ezov, A. Farkash, L. Greenberg, R. Masalha, G. Moshkowich, D. Murik, H. Shaul, O. Soceanu, HeLayers: a tile tensors framework for large neural networks on encrypted data. PoPETs (2023), https://​doi.​org/​10.​56553/​popets-2023-0020
5.
Zurück zum Zitat A.A. Badawi, J. Bates, F. Bergamaschi, D.B. Cousins, S. Erabelli, N. Genise, S. Halevi, H. Hunt, A. Kim, Y. Lee, Z. Liu, D. Micciancio, I. Quah, Y. Polyakov, S. Rv, K. Rohloff, J. Saylor, D. Suponitsky, M. Triplett, V. Vaikuntanathan, V. Zucca, OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive, Paper 2022/915 (2022), https://eprint.iacr.org/2022/915 A.A. Badawi, J. Bates, F. Bergamaschi, D.B. Cousins, S. Erabelli, N. Genise, S. Halevi, H. Hunt, A. Kim, Y. Lee, Z. Liu, D. Micciancio, I. Quah, Y. Polyakov, S. Rv, K. Rohloff, J. Saylor, D. Suponitsky, M. Triplett, V. Vaikuntanathan, V. Zucca, OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive, Paper 2022/915 (2022), https://​eprint.​iacr.​org/​2022/​915
7.
Zurück zum Zitat F. Boemer, R. Cammarota, D. Demmler, T. Schneider, H. Yalame, MP2ML: A mixed-protocol machine learning framework for private inference. in Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice. pp. 43-45. PPMLP’20, Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3411501.3419425 F. Boemer, R. Cammarota, D. Demmler, T. Schneider, H. Yalame, MP2ML: A mixed-protocol machine learning framework for private inference. in Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice. pp. 43-45. PPMLP’20, Association for Computing Machinery, New York, NY, USA (2020). https://​doi.​org/​10.​1145/​3411501.​3419425
8.
Zurück zum Zitat F. Boemer, A. Costache, R. Cammarota, C. Wierzynski, NGraph-HE2: a high-throughput framework for neural network inference on encrypted data. in Proceedings of the 7th ACM workshop on encrypted computing and applied homomorphic cryptography. pp. 45–56. WAHC’19, Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3338469.3358944 F. Boemer, A. Costache, R. Cammarota, C. Wierzynski, NGraph-HE2: a high-throughput framework for neural network inference on encrypted data. in Proceedings of the 7th ACM workshop on encrypted computing and applied homomorphic cryptography. pp. 45–56. WAHC’19, Association for Computing Machinery, New York, NY, USA (2019). https://​doi.​org/​10.​1145/​3338469.​3358944
9.
Zurück zum Zitat J.P. Bossuat, C. Mouchet, J. Troncoso-Pastoriza, J.P. Hubaux, Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys. in Canteaut, A., Standaert, F.X. (eds.) Advances in Cryptology—EUROCRYPT 2021. pp. 587–617. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77870-5_21 J.P. Bossuat, C. Mouchet, J. Troncoso-Pastoriza, J.P. Hubaux, Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys. in Canteaut, A., Standaert, F.X. (eds.) Advances in Cryptology—EUROCRYPT 2021. pp. 587–617. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-77870-5_​21
17.
19.
Zurück zum Zitat I. Chillotti, M. Joye, D. Ligier, J.B. Orfila, S. Tap, CONCRETE: concrete Operates oN Ciphertexts rapidly by extending TfhE. in WAHC 2020–8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. vol. 15 (2020) I. Chillotti, M. Joye, D. Ligier, J.B. Orfila, S. Tap, CONCRETE: concrete Operates oN Ciphertexts rapidly by extending TfhE. in WAHC 2020–8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. vol. 15 (2020)
24.
31.
Zurück zum Zitat K. Han, D. Ki, Better bootstrapping for approximate homomorphic encryption. in Cryptographers’ Track at the RSA Conference. pp. 364–390. Springer (2020) K. Han, D. Ki, Better bootstrapping for approximate homomorphic encryption. in Cryptographers’ Track at the RSA Conference. pp. 364–390. Springer (2020)
32.
Zurück zum Zitat X. Jiang, M. Kim, K. Lauter, Y. Song, Secure outsourced matrix computation and application to neural networks. in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 1209–1222. CCS ’18, New York, NY, USA (2018). https://doi.org/10.1145/3243734.3243837 X. Jiang, M. Kim, K. Lauter, Y. Song, Secure outsourced matrix computation and application to neural networks. in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 1209–1222. CCS ’18, New York, NY, USA (2018). https://​doi.​org/​10.​1145/​3243734.​3243837
37.
Zurück zum Zitat J. Lee, E. Lee, J.W. Lee, Y. Kim, Y.S. Kim, J.S. No, Precise approximation of convolutional neural networks for homomorphically encrypted data. arXiv preprint arXiv:2105.10879 (2021) J. Lee, E. Lee, J.W. Lee, Y. Kim, Y.S. Kim, J.S. No, Precise approximation of convolutional neural networks for homomorphically encrypted data. arXiv preprint arXiv:​2105.​10879 (2021)
38.
Zurück zum Zitat Y. Lee, J.W. Lee, Y.S. Kim, Y. Kim, J.S. No, H. Kang, High-precision bootstrapping for approximate homomorphic encryption by error variance minimization. in Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology—EUROCRYPT 2022. pp. 551–580. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-06944-4_19 Y. Lee, J.W. Lee, Y.S. Kim, Y. Kim, J.S. No, H. Kang, High-precision bootstrapping for approximate homomorphic encryption by error variance minimization. in Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology—EUROCRYPT 2022. pp. 551–580. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-06944-4_​19
40.
Zurück zum Zitat B. Li, D. Micciancio, On the security of homomorphic encryption on approximate numbers. in Canteaut, A., Standaert, F.X. (eds.) Advances in Cryptology—EUROCRYPT 2021. pp. 648–677. Springer, Cham (2021) B. Li, D. Micciancio, On the security of homomorphic encryption on approximate numbers. in Canteaut, A., Standaert, F.X. (eds.) Advances in Cryptology—EUROCRYPT 2021. pp. 648–677. Springer, Cham (2021)
41.
Zurück zum Zitat J. Liu, M. Juuti, Y. Lu, N. Asokan, Oblivious neural network predictions via MiniONN transformations. in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. pp. 619–631. CCS ’17, Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3133956.3134056 J. Liu, M. Juuti, Y. Lu, N. Asokan, Oblivious neural network predictions via MiniONN transformations. in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. pp. 619–631. CCS ’17, Association for Computing Machinery, New York, NY, USA (2017). https://​doi.​org/​10.​1145/​3133956.​3134056
42.
Zurück zum Zitat Q. Lou, L. Jiang, HEMET: a homomorphic-encryption-friendly privacy-preserving mobile neural network architecture. in Meila, M., Zhang, T. (eds.) Proceedings of the 38th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 139, pp. 7102–7110 (2021), https://proceedings.mlr.press/v139/lou21a.html Q. Lou, L. Jiang, HEMET: a homomorphic-encryption-friendly privacy-preserving mobile neural network architecture. in Meila, M., Zhang, T. (eds.) Proceedings of the 38th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 139, pp. 7102–7110 (2021), https://​proceedings.​mlr.​press/​v139/​lou21a.​html
44.
Zurück zum Zitat D. Micciancio, Y. Polyakov, Bootstrapping in FHEW-like cryptosystems. in Proceedings of the 9th on Workshop on Encrypted Computing and Applied Homomorphic Cryptography. p. 17-28. WAHC ’21, Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3474366.3486924 D. Micciancio, Y. Polyakov, Bootstrapping in FHEW-like cryptosystems. in Proceedings of the 9th on Workshop on Encrypted Computing and Applied Homomorphic Cryptography. p. 17-28. WAHC ’21, Association for Computing Machinery, New York, NY, USA (2021). https://​doi.​org/​10.​1145/​3474366.​3486924
48.
Zurück zum Zitat P. Mohassel, P. Rindal, ABY3: A mixed protocol framework for machine learning. in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 35–52. CCS ’18, Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3243734.3243760 P. Mohassel, P. Rindal, ABY3: A mixed protocol framework for machine learning. in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 35–52. CCS ’18, Association for Computing Machinery, New York, NY, USA (2018). https://​doi.​org/​10.​1145/​3243734.​3243760
50.
Zurück zum Zitat D. Rathee, M. Rathee, N. Kumar, N. Chandran, D. Gupta, A. Rastogi, R. Sharma, CrypTFlow2: practical 2-party secure inference. in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 325–342. Association for Computing Machinery, New York, NY, USA (2020), https://doi.org/10.1145/3372297.3417274 D. Rathee, M. Rathee, N. Kumar, N. Chandran, D. Gupta, A. Rastogi, R. Sharma, CrypTFlow2: practical 2-party secure inference. in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 325–342. Association for Computing Machinery, New York, NY, USA (2020), https://​doi.​org/​10.​1145/​3372297.​3417274
Metadaten
Titel
BLEACH: Cleaning Errors in Discrete Computations Over CKKS
verfasst von
Nir Drucker
Guy Moshkowich
Tomer Pelleg
Hayim Shaul
Publikationsdatum
01.03.2024
Verlag
Springer US
Erschienen in
Journal of Cryptology / Ausgabe 1/2024
Print ISSN: 0933-2790
Elektronische ISSN: 1432-1378
DOI
https://doi.org/10.1007/s00145-023-09483-1

Weitere Artikel der Ausgabe 1/2024

Journal of Cryptology 1/2024 Zur Ausgabe

Premium Partner