BROWSE

Related Researcher

Author's Photo

Kim, Miran
Research Interests
  • My research mainly focuses on secure computation, which aims to develop advanced cryptographic primitives to protect the sensitive data of individuals. I have been actively working on the development of privacy-preserving protocols in a wide range of applications such as cyber-physical systems, data query processing, genomic computation, and machine learning.

ITEM VIEW & DOWNLOAD

A Full RNS Variant of Approximate Homomorphic Encryption

Cited 0 times inthomson ciCited 0 times inthomson ci
Title
A Full RNS Variant of Approximate Homomorphic Encryption
Author
Cheon, Jung HeeHan,KyoohyungKim, AndreyKim, MiranSong, Yongsoo
Issue Date
2019- 8
Publisher
Springer Verlag
Citation
25th International Conference on Selected Areas in Cryptography, SAC 2018, pp.347 - 368
Abstract
The technology of Homomorphic Encryption (HE) has improved rapidly in a few years. The newest HE libraries are efficient enough to use in practical applications. For example, Cheon et al. (ASIACRYPT��17) proposed an HE scheme with support for arithmetic of approximate numbers. An implementation of this scheme shows the best performance in computation over the real numbers. However, its implementation could not employ a core optimization technique based on the Residue Number System (RNS) decomposition and the Number Theoretic Transformation (NTT). In this paper, we present a variant of approximate homomorphic encryption which is optimal for implementation on standard computer system. We first introduce a new structure of ciphertext modulus which allows us to use both the RNS decomposition of cyclotomic polynomials and the NTT conversion on each of the RNS components. We also suggest new approximate modulus switching procedures without any RNS composition. Compared to previous exact algorithms requiring multi-precision arithmetic, our algorithms can be performed by using only word size (64-bit) operations. Our scheme achieves a significant performance gain from its full RNS implementation. For example, compared to the earlier implementation, our implementation showed speed-ups 17.3, 6.4, and 8.3 times for decryption, constant multiplication, and homomorphic multiplication, respectively, when the dimension of a cyclotomic ring is 32768. We also give experimental result for evaluations of some advanced circuits used in machine learning or statistical analysis. Finally, we demonstrate the practicability of our library by applying to machine learning algorithm. For example, our single core implementation takes 1.8??min to build a logistic regression model from encrypted data when the dataset consists of 575 samples, compared to the previous best result 3.5??min using four cores. ? 2019, Springer Nature Switzerland AG.
URI
https://scholarworks.unist.ac.kr/handle/201301/48434
URL
https://link.springer.com/chapter/10.1007%2F978-3-030-10970-7_16
DOI
10.1007/978-3-030-10970-7_16
ISSN
0302-9743
Appears in Collections:
CSE_Conference Papers
Files in This Item:
There are no files associated with this item.

find_unist can give you direct access to the published full text of this article. (UNISTARs only)

Show full item record

qrcode

  • mendeley

    citeulike

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

MENU