The invention relates generally to improved security using large-word approximate homomorphic encryption
Currently, the Cheon-Kim-Kim-Song (CKKS) homomorphic encryption (HE) scheme is known as being an efficient method to perform approximate homomorphic computations over encrypted real and complex numbers. To achieve the best runtime efficiency, the CKKS variants used in practice typically work with large numbers (e.g. larger than 64 bits) represented in the Residue Number Representation (RNS) obtained using the Chinese Remainder Theorem. Each large number can be decomposed into multiple small numbers (RNS residues) with respect to moduli that are limited to the 64 bit limit of modern CPU-based computer architectures. The use of 64 bit words in the RNS variants of CKKS can introduce two significant constraints in applying CKKS for practical problems.
The first constraint can be related to the use of CKKS for security models where decryption results may be shared. These models correspond to the notion of IND-CPA+ security (ciphertext indistinguishability under chosen plaintext attack). It has recently been demonstrated that the decryption result in the original CKKS can be used for a successful attack on the secret key in the IND-CPA+ setting.
The second constraint applies to scenarios where the CKKS bootstrapping procedure is applied for supporting deep computations, such as in regression training or neural net inference. Some recent results for RNS-based CKKS bootstrapping show that the maximum precision after a first bootstrapping that can be achieved in practice for 128-bit-secure settings can be less than 15 bits (in practical computations this number is significantly lower). The precision can decline as more bootstrapping operations are performed, e.g., to about 12 bits after 20 bootstrapping iterations. This limitation can be present due to the RNS residues (and hence the CKKS scaling factor) cannot be larger than 64 bits (in practice only 60 bits as modular reduction algorithms typically do not support larger moduli) in all existing implementations of CKKS RNS variants.
Advantages of the invention may include mitigating IND-CPA+ attacks by adding random noise and/or rounding result during decryption. Advantages of the invention may be due to using a noise magnitude (or e.g., equivalently rounding precision) that is significantly higher than currently known approximation noise, by at least, for example, 20 or 30 bits. This may result in the RNS moduli needing to be increased by e.g., 20-30 bits, requiring residue arithmetic with numbers larger than 64 bits.
According to one or more embodiments, a method for cryptography based on 128 bit integers, includes: receiving a complex input to be encrypted, wherein the input includes a 128-bit number; performing encrypting by: setting an imaginary part of the complex input to a predetermined value; encrypting the complex input using a Fourier transform and a scaling factor; adding a first noise and a second noise to the encrypted complex input, wherein the second noise obfuscates the first noise; and performing decrypting by: receiving the encrypted complex input with added first noise and second noise; estimating a first standard deviation of the first noise based on an imaginary part of the received encrypted complex input; computing a second standard deviation of the second noise based on the first standard deviation of the first noise and a predetermined parameter; and decrypting the encrypted message using an inverse Fourier transform, the first noise, and the second noise.
According to some embodiments, the predetermined value is zero.
According to some embodiments, the first noise is chosen from a list comprising: a Gaussian distribution; and a uniform random distribution.
According to some embodiments, the second noise is chosen from a list comprising: a Gaussian distribution; and a uniform random distribution.
According to some embodiments, the second noise is at least 20 bits larger than the first noise.
According to some embodiments, a homomorphic operation is performed on the encrypted complex input with added first noise and second noise prior to decrypting.
According to one or more embodiments, a method for cryptography based on 128-bit integers, includes: receiving a complex input x, wherein x ∈ n and each entry in x is 128-bits, wherein encrypting includes: setting the imaginary parts of the complex input x to zero during an encryption process; encrypting the complex input using an encrypting Fourier transform and a scaling factor to obtain an encrypted message m, wherein m=┌(Δ·x)┘, wherein is the encrypting Fourier transform and Δ is the scaling factor; introducing a first noise e; and introducing a second noise e′; and wherein decrypting includes: receiving an encrypted message with added first and second noise m+e+e′; decrypting the encrypted message with added first and second noise using an inverse of the encrypting Fourier transform to obtain an approximation of the encrypted message m and the first noise e, wherein
estimating the standard deviation σe of the first noise e based on an imaginary part of m; computing the standard deviation σe′ of the second noise e′ according to the expression σe′=√{square root over (M+1)}·σe, wherein M is a predetermined parameter; calculating the second noise e′ from its standard deviation; and decoding
According to some embodiments, the first error is introduced using a distribution from a list comprising: a Gaussian distribution; and a uniform random distribution.
According to some embodiments, the second error is introduced using a distribution from a list comprising: a Gaussian distribution; and a uniform random distribution.
According to some embodiments, the magnitude of the second noise is large enough to erase all information about the first noise.
According to some embodiments, the second noise is at least 20 bits larger than the first noise.
According to some embodiments, a homomorphic operation is performed on the encrypted complex input with added first noise and second noise prior to decrypting.
According to one or more embodiments, a system for cryptography based on 128 bit integers includes: at least one processor; and a memory containing instructions which when executed by at least one processor cause the at least one processor to: receive a complex input to be encrypted, wherein the input includes a 128-bit number; perform encrypting by: setting an imaginary part of the complex input to a predetermined value; encrypting the complex input using a Fourier transform and a scaling factor; adding a first noise and a second noise to the encrypted complex input, wherein the second noise obfuscates the first noise; and perform decrypting by: receiving the encrypted complex input with added first noise and second noise; estimating a first standard deviation of the first noise based on an imaginary part of the received encrypted complex input; computing a second standard deviation of the second noise based on the first standard deviation of the first noise and a predetermined parameter; and decrypting the encrypted message using an inverse Fourier transform, the first noise, and the second noise.
According to some embodiments, wherein the at least one processor is a 128 bit processor.
According to some embodiments, a homomorphic operation is performed on the encrypted complex input with added first noise and second noise prior to decrypting.
Non-limiting examples of embodiments of the disclosure are described below with reference to figures attached hereto. Dimensions of features shown in the figures are chosen for convenience and clarity of presentation and are not necessarily shown to scale. The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may be understood by reference to the following detailed description when read with the accompanied drawings. Embodiments are illustrated without limitation in the figures, in which like reference numerals indicate corresponding, analogous, or similar elements, and in which:
It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
Operating system 115A may be or may include code to perform tasks involving coordination, scheduling, arbitration, or managing operation of computing device 100A, for example, scheduling execution of programs. Memory 120A may be or may include, for example, a Random Access Memory (RAM), a read only memory (ROM), a Flash memory, a volatile or non-volatile memory, or other suitable memory units or storage units. At least a portion of Memory 120A may include data storage housed online on the cloud. Memory 120A may be or may include a plurality of different memory units. Memory 120A may store for example, instructions (e.g. code 125A) to carry out a method as disclosed herein. Memory 120A may use a datastore, such as a database.
Executable code 125A may be any application, program, process, task, or script. Executable code 125A may be executed by controller 105A possibly under control of operating system 115A. For example, executable code 125A may be, or may execute, one or more applications performing methods as disclosed herein, such as a machine learning model, or a process providing input to a machine learning model. In some embodiments, more than one computing device 100A or components of device 100A may be used. One or more processor(s) 105A may be configured to carry out embodiments of the present invention by for example executing software or code. Processor 105A may be a 128 bit processor.
Storage 130A may be or may include, for example, a hard disk drive, a floppy disk drive, a compact disk (CD) drive, a universal serial bus (USB) device or other suitable removable and/or fixed storage unit. Data described herein may be stored in a storage 130A and may be loaded from storage 130A into a memory 120A where it may be processed by controller 105A. Storage 130A may include cloud storage. Storage 130A may include storing data in a database.
Input devices 135A may be or may include a mouse, a keyboard, a touch screen or pad or any suitable input device or combination of devices. Output devices 140A may include one or more displays, speakers and/or any other suitable output devices or combination of output devices. Any applicable input/output (I/O) devices may be connected to computing device 100A, for example, a wired or wireless network interface card (NIC), a modem, printer, a universal serial bus (USB) device or external hard drive may be included in input devices 135A and/or output devices 140A.
Embodiments of the invention may include one or more article(s) (e.g. memory 120A or storage 130A) such as a computer or processor non-transitory readable medium, or a computer or processor non-transitory storage medium, such as for example a memory, a disk drive, or a USB flash memory encoding, including, or storing instructions, e.g., computer-executable instructions, which, when executed by a processor or controller, carry out methods disclosed herein.
Server(s) 110 and computers 140 and 150, may include one or more controller(s) or processor(s) 116, 146, and 156, respectively, for executing operations according to embodiments of the invention and one or more memory unit(s) 118, 148, and 158, respectively, for storing data (e.g., encryption and/or decryption keys, and encrypted and/or decrypted data) and/or instructions (e.g., software for applying computations or calculations, keys to encrypt or decrypt data according to embodiments of the invention) executable by the processor(s). Processor(s) 116, 146, and/or 156 may include, for example, a central processing unit (CPU), a digital signal processor (DSP), a microprocessor, a controller, a chip, a microchip, an integrated circuit (IC), or any other suitable multi-purpose or specific processor or controller. Memory unit(s) 118, 148, and/or 158 may include, for example, a random access memory (RAM), a dynamic RAM (DRAM), a flash memory, a volatile memory, a non-volatile memory, a cache memory, a buffer, a short term memory unit, a long term memory unit, or other suitable memory units or storage units.
Computers 140 and 150 may be servers, personal computers, desktop computers, mobile computers, laptop computers, and notebook computers or any other suitable device such as a cellular telephone, personal digital assistant (PDA), video game console, etc., and may include wired or wireless connections or modems. Computers 140 and 150 may include one or more input devices 142 and 152, respectively, for receiving input from a user (e.g., via a pointing device, click-wheel or mouse, keys, touch screen, recorder/microphone, other input components). Computers 140 and 150 may include one or more output devices 144 and 154 (e.g., a monitor or screen) for displaying data to a user provided by or for server(s) 110.
Database 115 may include software processes or applications for storing and retrieving data 117 such as large-word data structures and large-work CKKS computations, and/or encryption and/or decryption keys. Data 117 may also include code (e.g., software code) or logic, e.g., to enable the application of large-work CKKS algorithms according to embodiments of the invention. Database 115 may be internal or external to one or more of server(s) 110 and/or computer(s) 140 and/or 150 (not shown) and may be connected thereto by a local or remote and a wired or wireless connection. In some embodiments, data 117 is stored in an alternate location separate from database 115, e.g., memory unit(s) 118, 148, and/or 158.
Any of system 100 devices may operate as a secure or insecure party. Secure parties may each securely store unencrypted (or encrypted) data and private keys associated with each dataset, party, etc. Insecure parties may not access the unencrypted data or private keys.
According to some embodiments, instead of using machine-word-size 64-bit integers for residue numeral systems (RNS), larger words (e.g. larger than 64 bits) are used to support higher values of the CKKS scaling factor, which increases the precision of computation results. For example, one particular integer data type that may be used by some embodiments of the invention is (unsigned)_int128 supported by g++ and clang++ compilers for CPU systems, which is based on a combination of hardware instructions and some software techniques. According to some embodiments, pure software implementations of 128-bit or higher-bitwidth integers may also be used. On hardware systems that natively support integers larger than 64 bits, these native integer data types may be employed for RNS residues.
Encryption according to method 200 may include setting an imaginary part of the complex input to a predetermined value (Step 204). In some embodiments, the predetermined value is zero. In various embodiments, each imaginary part of the complex input, e.g. the imaginary part of each of the n entries of the input, may be set to the same or different predetermined value.
Encryption according to method 200 may include encrypting the complex input (e.g. the complex input with imaginary part set to the predetermined value) using a Fourier transform and a scaling factor (Step 206). For example, encrypting may include calculating according to EQN. 1, as shown below:
m=┌(Δ·x)┘, EQN. 1
where m is the encrypted output (e.g. encrypted message), is a Fourier transform, Δ is a scaling factor, x is the complex input, and the notation ┌*┘ means to take the nearest integer value in an element-wise way.
In some embodiments, is a Cooley-Tukey design of a discrete Fourier transform (DFT). In some embodiments, an inverse Fourier transform is used for encryption, with a corresponding forward Fourier transform used for decryption.
The scaling factor Δ may be a CKKS scaling factor.
The method can also involve adding a first noise and a second noise to the encrypted complex input, wherein the second noise obfuscates the first noise (Step 208). The first nose e may be introduced to the encrypted complex input, for example by adding it to the encrypted complex input to obtain m+e. In various embodiments, the first noise is introduced using a distribution from a list including: a Gaussian distribution; and a uniform random distribution.
The second noise e′ may be introduced to the encrypted complex input, for example in addition to the first noise to obtain m+e+e′. The second noise e′ may obfuscate the first noise e, for example so that the first noise cannot be easily determined. The magnitude of the second noise may be at least 20 to 30 bits larger than the first noise in order to erase all information about the first noise, a technique which may be referred to as “noise flooding.” In various embodiments, the second noise is introduced using a distribution from a list including: a Gaussian distribution; and a uniform random distribution.
In some embodiments, homomorphic operations are performed on the encrypted message, e.g. on the encrypted complex input with added noise.
Decryption according to method 200 may include receiving an encrypted message m+e+e′, e.g. an encrypted complex input with added noise (Step 210), for example inclusive of a first noise and a second noise.
Decryption according to method 200 may include reversing the encryption steps, for example using an inverse of the encrypting Fourier transform. For example, decrypting may include calculating as shown below in EQN. 2
where is the inverse of the Fourier transform used during encryption.
In some embodiments, the method involves estimating a first standard deviation σe of the first noise e based on the imaginary part of the decoded complex input x′ (Step 212). Because the imaginary part of the complex input is set to a predetermined value (e.g. zero) during encoding, then the imaginary part of the encrypted message may only contains information about the noise which may be used to decode the encrypted message and obtain the original complex input. According to some embodiments, the real part of the decoded complex input x′ is calculated as shown below in EQN. 3:
Re(x′)=½(m(Y)+e(Y)+m(1/Y)+e(1/Y)), EQN. 3
and the imaginary part of x′ as its conjugate as shown below in EQN. 4:
Im(x′)=½(m(Y)+e(Y)−m(1/Y)−e(1/Y)), EQN. 4
wherein, Re denotes taking the real part, Im denotes taking the imaginary part, Y and 1/Y correspond to primitive roots of unity and their inverses, and f (Y) is a polynomial over Y that corresponds to the vector f, e.g. the coefficients of f (Y) are the components in the vector f.
In some embodiments, the method involves determining the standard deviation σe′ of the second noise e′ (e.g. estimate a further, second standard deviation) based on the estimated standard deviation σe of the first noise and a predetermined (e.g. configurable) parameter (Step 214). For example, the standard deviation of the second noise may be calculated as shown below in EQN. 5:
σe′=√{square root over (1+M)}·σe EQN. 5
wherein M is a configurable parameter. For example, M may correspond to the number of decryption results for the same or related ciphertexts that may be made available to an adversary. Related ciphertexts may be ciphertexts which are encrypted with the same public key. Practical noise flooding conditions may be achieved when M is at least 240, but higher or lower values may be used based on a specific application.
Once the standard deviation σe′ of the second noise has been calculated, the second noise e′ may be recreated by generating it from its standard deviation.
Embodiments decrypt (216) the encrypted message using an inverse Fourier transform, the first noise, and the second noise, for example by calculating the decoded complex input as shown below in EQN. 6:
In various embodiments, the invention can involve a method to support CKKS bootstrapping which may, for example, achieve high precision.
A conventional approach for approximating the modular reduction in CKKS bootstrapping is based on approximating the modular reduction using a sine wave as shown below in EQN. 7:
where [x]q denotes a modular reduction of an input x modulo q. The approximation may be followed by a polynomial approximation of the sine wave, e.g., using a Chebyshev interpolation, computed for a specific range {−K+1, K−1}.
Introducing
the expression may be rewritten more simply as shown below in EQN. 8:
for the range where ∈=|x/q|≤2−10. The solid line in the lower graph denotes and error of the sine wave in the upper graph with respect to modular reduction and the dashed line in the lower graph denotes the error of the polynomial approximation with respect to the sine wave in the upper graph. As can be seen in
Embodiments of the invention may provide a more accurate approximation of the modular reduction (e.g. achieving 40-50 bits of precision or even more, instead of 27 bits for the above described scenario) using a trigonometric Hermite interpolation of the modular reduction, thereby supporting CKKS bootstrapping under IND-CPA+security and/or deeper computations under the regular IND-CPA model.
An m-order trigonometric Hermite interpolation may be written as shown below in EQN. 9:
such that: sm(p)=0, s′m(p)=1, and =0 for >1, wherein p corresponds to the points in the range {−K+1, K−1} used in the interpolation. Embodiments use a0=ak=0 in the case of modular reduction.
The Hermite interpolation expressions for approximating the modular reduction may be computed analytically for any order. The first three orders are shown below in EQNS. 10, 11, and 12
As can be seen, s1(t) of EQN. 10 is the same sine wave interpolation used in prior CKKS bootstrapping work (EQN. 8) when
Each sine wave term in s2(t) and s3(t) may be approximated using an initial interpolation s1(t) for a smaller range computed using the Chebyshev interpolation, and then the range may be extended using a recursive application of the double-angle trigonometric formula. These computations may be performed using cosines (with only real-number coefficients).
Unless specifically stated otherwise, as apparent from the foregoing discussion, it is appreciated that throughout the specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulates and/or transforms data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices.
Embodiments of the invention may include an article such as a computer or processor readable non-transitory storage medium, such as for example a memory, a disk drive, or a USB flash memory encoding, including, or storing instructions, e.g., computer-executable instructions, which when executed by a processor or controller, cause the processor or controller to carry out methods disclosed herein.
It should be recognized that embodiments of the invention may solve one or more of the objectives and/or challenges described in the background, and that embodiments of the invention need not meet every one of the above objectives and/or challenges to come within the scope of the present invention. While certain features of the invention have been particularly illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those of ordinary skill in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes in form and details as fall within the true spirit of the invention.
In the above description, an embodiment is an example or implementation of the inventions. The various appearances of “one embodiment,” “an embodiment” or “some embodiments” do not necessarily all refer to the same embodiments.
Although various features of the invention may be described in the context of a single embodiment, the features may also be provided separately or in any suitable combination. Conversely, although the invention may be described herein in the context of separate embodiments for clarity, the invention may also be implemented in a single embodiment.
Reference in the specification to “some embodiments”, “an embodiment”, “one embodiment” or “other embodiments” means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least some embodiments, but not necessarily all embodiments, of the inventions.
It is to be understood that the phraseology and terminology employed herein is not to be construed as limiting and are for descriptive purpose only.
The principles and uses of the teachings of the present invention may be better understood with reference to the accompanying description, figures, and examples.
It is to be understood that the details set forth herein do not construe a limitation to an application of the invention.
Furthermore, it is to be understood that the invention may be carried out or practiced in various ways and that the invention may be implemented in embodiments other than the ones outlined in the description above.
It is to be understood that the terms “including”, “comprising”, “consisting” and grammatical variants thereof do not preclude the addition of one or more components, features, steps, or integers or groups thereof and that the terms are to be construed as specifying components, features, steps, or integers.
If the specification or claims refer to “an additional” element, that does not preclude there being more than one of the additional elements.
It is to be understood that where the claims or specification refer to “a” or “an” element, such reference is not to be construed that there is only one of that element.
It is to be understood that where the specification states that a component, feature, structure, or characteristic “may”, “might”, “may” or “could” be included, that a particular component, feature, structure, or characteristic is not required to be included.
Where applicable, although state diagrams, flow diagrams or both may be used to describe embodiments, the invention is not limited to those diagrams or to the corresponding descriptions. For example, flow need not move through each illustrated box or state, or in exactly the same order as illustrated and described.
Methods of the present invention may be implemented by performing or completing manually, automatically, or a combination thereof, selected steps or tasks.
The descriptions, examples, methods and materials presented in the claims and the specification are not to be construed as limiting but rather as illustrative only.
Meanings of technical and scientific terms used herein are to be commonly understood as by one of ordinary skill in the art to which the invention belongs, unless otherwise defined. The present invention may be implemented in the testing or practice with methods and materials equivalent or similar to those described herein.
While the invention has been described with respect to a limited number of embodiments, these should not be construed as limitations on the scope of the invention, but rather as exemplifications of some of the preferred embodiments. Other possible variations, modifications, and applications are also within the scope of the invention. Accordingly, the scope of the invention should not be limited by what has thus far been described, but by the appended claims and their legal equivalents.
This application claims the benefit of and priority to U.S. Provisional Patent Application No. 63/185,617 filed May 7, 2021, which is owned by the assignee of the instant application and incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
10511434 | Jost | Dec 2019 | B2 |
10684340 | Zhong | Jun 2020 | B1 |
11101976 | Cheon | Aug 2021 | B2 |
20190132156 | Wang | May 2019 | A1 |
20190296910 | Cheung | Sep 2019 | A1 |
20200228307 | Cheon | Jul 2020 | A1 |
20210135837 | Cheung | May 2021 | A1 |
20210319131 | Salomon | Oct 2021 | A1 |
20210328766 | No | Oct 2021 | A1 |
20220198254 | Dalli | Jun 2022 | A1 |
20220376891 | Polyakov | Nov 2022 | A1 |
20230188319 | Froelicher | Jun 2023 | A1 |
20230291552 | Michel | Sep 2023 | A1 |
Number | Date | Country |
---|---|---|
101345618 | Nov 2021 | CN |
Entry |
---|
Jutla, Charanjit Singh, and Nathan Manohar. “Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE.” Cryptology ePrint Archive (2021). |
Li, Balyu, and Daniele Micciancio. “On the security of homomorphic encryption on approximate numbers.” Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Cham, 2021. |
Kim, Andrey, Antonis Papadimitriou, and Yuriy Polyakov. “Approximate homomorphic encryption with reduced approximation error.” Cryptographers' Track at the RSA Conference. Springer, Cham, 2022. |
Number | Date | Country | |
---|---|---|---|
20220376891 A1 | Nov 2022 | US |
Number | Date | Country | |
---|---|---|---|
63185617 | May 2021 | US |