Faster Bootstrapping with Polynomial Error Jacob Alperin-Sheriff Chris Peikert
School of Computer Science Georgia Tech
CRYPTO 2014 19 August 2014
1 / 10
Faster Bootstrapping with Polynomial Error Jacob Alperin-Sheriff - - PowerPoint PPT Presentation
Faster Bootstrapping with Polynomial Error Jacob Alperin-Sheriff Chris Peikert School of Computer Science Georgia Tech CRYPTO 2014 19 August 2014 1 / 10 Fully Homomorphic Encryption [RAD78,Gentry09] FHE lets you do this: Eval (
1 / 10
2 / 10
2 / 10
2 / 10
3 / 10
3 / 10
3 / 10
⋆ Homom Addition: Error grows additively. 3 / 10
⋆ Homom Addition: Error grows additively. ⋆ Homom Multiplication: Error grows by poly(λ) factor. 3 / 10
⋆ Homom Addition: Error grows additively. ⋆ Homom Multiplication: Error grows by poly(λ) factor.
3 / 10
⋆ Homom Addition: Error grows additively. ⋆ Homom Multiplication: Error grows by poly(λ) factor.
3 / 10
⋆ Homom Addition: Error grows additively. ⋆ Homom Multiplication: Error grows by poly(λ) factor.
3 / 10
4 / 10
4 / 10
4 / 10
4 / 10
4 / 10
5 / 10
⋆ Treats decryption as an arithmetic function over Zq, not a circuit. 5 / 10
⋆ Treats decryption as an arithmetic function over Zq, not a circuit.
5 / 10
⋆ Treats decryption as an arithmetic function over Zq, not a circuit.
⋆ Key Idea: Embed additive group (Zq, +) into small symmetric group 5 / 10
⋆ Treats decryption as an arithmetic function over Zq, not a circuit.
⋆ Key Idea: Embed additive group (Zq, +) into small symmetric group
5 / 10
⋆ Treats decryption as an arithmetic function over Zq, not a circuit.
⋆ Key Idea: Embed additive group (Zq, +) into small symmetric group
5 / 10
⋆ Treats decryption as an arithmetic function over Zq, not a circuit.
⋆ Key Idea: Embed additive group (Zq, +) into small symmetric group
⋆ Very simple description and error analysis 5 / 10
⋆ Treats decryption as an arithmetic function over Zq, not a circuit.
⋆ Key Idea: Embed additive group (Zq, +) into small symmetric group
⋆ Very simple description and error analysis ⋆ Enjoys full re-randomization of error as a natural side effect
5 / 10
6 / 10
6 / 10
6 / 10
6 / 10
6 / 10
7 / 10
7 / 10
7 / 10
7 / 10
7 / 10
7 / 10
8 / 10
8 / 10
⋆ Recall: Right-associative multiplication yields polynomial error growth. 8 / 10
⋆ Recall: Right-associative multiplication yields polynomial error growth.
8 / 10
⋆ Recall: Right-associative multiplication yields polynomial error growth.
8 / 10
⋆ Prime Number Theorem allows pi, t = O(log λ). 9 / 10
⋆ Prime Number Theorem allows pi, t = O(log λ).
9 / 10
⋆ Prime Number Theorem allows pi, t = O(log λ).
9 / 10
⋆ Prime Number Theorem allows pi, t = O(log λ).
9 / 10
⋆ Prime Number Theorem allows pi, t = O(log λ).
9 / 10
⋆ Prime Number Theorem allows pi, t = O(log λ).
9 / 10
⋆ Barrier in [GSW’13]: single-bit encryption (no “packing”) 10 / 10
⋆ Barrier in [GSW’13]: single-bit encryption (no “packing”)
⋆ Does our representation help or hurt security? 10 / 10
⋆ Barrier in [GSW’13]: single-bit encryption (no “packing”)
⋆ Does our representation help or hurt security?
10 / 10