<p>This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the βcloudβ. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a d
On Architecting Fully Homomorphic Encryption-based Computing Systems
β Scribed by Rashmi Agrawal, Ajay Joshi
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 86
- Series
- Synthesis Lectures on Computer Architecture
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book provides an introduction to the key concepts of Fully Homomorphic Encryption (FHE)-based computing, and discusses the challenges associated with architecting FHE-based computing systems. Readers will see that due to FHEβs ability to compute on encrypted data, it is a promising solution to address privacy concerns arising from cloud-based services commonly used for a variety of applications including healthcare, financial, transportation, and weather forecasting. This book explains the fundamentals of the FHE operations and then presents an architectural analysis of the FHE-based computing. The authors also highlight challenges associated with accelerating FHE on various commodity platforms and argue that the FPGA platform provides a sweet spot in making privacy-preserving computing plausible.
β¦ Table of Contents
Preface
Acknowledgements
Contents
1 Introduction
1.1 Privacy-Preserving Computing
1.2 Homomorphic Encryption
1.3 A Brief History of HE
1.3.1 First-Generation HE Schemes
1.3.2 Second-Generation HE Schemes
1.3.3 Third-Generation HE Schemes
1.4 Alternate Cryptographic Technique for PPC
1.4.1 Multi-party Computation
1.4.2 HE Versus MPC
1.5 Non-cryptographic Techniques for PPC
1.5.1 Anonymization
1.5.2 Differential Privacy
1.5.3 HE Versus Non-cryptographic PPC Techniques
1.6 Summary
2 The CKKS FHE Scheme
2.1 CKKS Parameters
2.2 Basic Compute Optimizations in CKKS Scheme
2.2.1 Residue Number System (RNS)
2.2.2 Modular Arithmetic
2.2.3 NTT/iNTT
2.3 Key Generation
2.3.1 Public Keys
2.3.2 Switching Keys
2.4 Client-Side Operations
2.4.1 Encoding
2.4.2 Encryption
2.4.3 Decryption
2.4.4 Decoding
2.4.5 Example of Encode and Decode Operation
2.5 Server-Side Operations
2.5.1 Addition
2.5.2 Multiplication
2.5.3 Rescale
2.5.4 Rotate
2.5.5 Conjugate
2.5.6 Key Switching
2.5.7 Noise Growth
2.5.8 Bootstrapping
2.6 Example of an FHE-Based Computing with CKKS Scheme
2.7 Summary
3 Architectural Analysis of CKKS FHE Scheme
3.1 Compute Bottlenecks
3.1.1 Modular Arithmetic Operations
3.1.2 NTT/iNTT Operations
3.1.3 Choice of Parameters
3.2 Memory Bottlenecks
3.2.1 On-chip Memory Size
3.2.2 Main Memory
3.2.3 Changing Data Access Pattern
3.2.4 Parameters
3.3 Arithmetic Intensity Analysis of Basic Operations
3.4 Arithmetic Intensity Analysis of Bootstrapping
3.5 Arithmetic Intensity Analysis of LR Model Training
3.6 Summary
4 Designing Computing Systems for CKKS FHE Scheme
4.1 CPU-Based Designs
4.1.1 Compute Versus Memory Trade-off
4.2 GPU-Based Designs
4.2.1 Compute Versus Memory Trade-off
4.3 FPGA-Based Designs
4.3.1 Compute Versus Memory Trade-off
4.4 ASIC-Based Designs
4.4.1 Compute Versus Memory Trade-off
4.5 Summary
5 Summary
5.1 Future Perspectives
5.1.1 Increase Main Memory Bandwidth with Improved Utilization
5.1.2 Use In-Memory/Near-Memory Computing/Wafer-Scale Systems
5.1.3 Future Improvements to FHE Schemes
β¦ Subjects
Privacy-Preserving Computing; Homomorphic Encryption; Machine Learning On Private Data; CKKS Scheme; Compute Challenges In FHE
π SIMILAR VOLUMES
This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Ben
<p><span>This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first par
<p>This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is pr
<div><div>This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 yea
<div><div>This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 yea