Nothing Special   »   [go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2024/1052

A New Fine Tuning Method for FHEW/TFHE Bootstrapping with IND-CPAD Security

Deokhwa Hong, Inha University, Incheon, Republic of Korea
Young-Sik Kim, Daegu Gyeongbuk Institute of Science and Technology, Daegue, Republic of Korea
Yongwoo Lee, Inha University, Incheon, Republic of Korea
Eunyoung Seo, Daegu Gyeongbuk Institute of Science and Technology, Daegue, Republic of Korea
Abstract

Fully homomorphic encryption (FHE) schemes enable computations on encrypted data, making them as a crucial component of privacy-enhancing technologies. Ducas and Micciancio introduced the FHEW scheme (Eurocrypt '15), which was further enhanced by Chillotti et al. with TFHE (Asiacrypt '17). These schemes support low-latency homomorphic evaluations of binary (or larger) gates due to their small parameter size. However, the evaluation failure probability in these schemes is highly sensitive to the choice of parameters, resulting in a limited range of viable parameters and a trade-off between failure probability and runtime. Recently, Cheon et al. proposed a key recovery attack on the FHEW/TFHE schemes based on a novel security model for FHE, known as IND-CPA$^\text{D}$ security (CCS '24). Mitigating this attack requires achieving a negligible failure probability (e.g., $2^{-64}$). However, the limited range of parameter options in FHEW/TFHE necessitates the adoption of parameter sets with unnecessarily low failure probabilities, leading to inefficient runtime. We propose a new bootstrapping method for the FHEW/TFHE shcemes that optimizes the trade-off between runtime and failure probability while maintaining ease of implementation. The proposed method allows selecting parameter sets that achieve the desired failure probabilities at various security levels, thereby maximizing runtime efficiency.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Homomorphic encryptionkey recovery attackbootstrapping
Contact author(s)
12191837 @ inha edu
ysk @ dgist ac kr
yongwoo @ inha ac kr
eunyoung00 @ gmail com
History
2024-10-18: revised
2024-06-28: received
See all versions
Short URL
https://ia.cr/2024/1052
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1052,
      author = {Deokhwa Hong and Young-Sik Kim and Yongwoo Lee and Eunyoung Seo},
      title = {A New Fine Tuning Method for {FHEW}/{TFHE} Bootstrapping with {IND}-{CPAD} Security},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1052},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1052}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.