De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem
-
Published:2023-11-27
Issue:
Volume:
Page:
-
ISSN:1615-5262
-
Container-title:International Journal of Information Security
-
language:en
-
Short-container-title:Int. J. Inf. Secur.
Author:
Prantl Thomas,Horn Lukas,Engel Simon,Iffländer Lukas,Beierlieb Lukas,Krupitzer Christian,Bauer André,Sakarvadia Mansi,Foster Ian,Kounev Samuel
Abstract
AbstractCloud computing has become increasingly popular due to its scalability, cost-effectiveness, and ability to handle large volumes of data. However, entrusting (sensitive) data to a third party raises concerns about data security and privacy. Homomorphic encryption is one solution that allows users to store and process data in a public cloud without the cloud provider having access to it. Currently, homomorphic encryption libraries only support addition and multiplication; other mathematical functions must be implemented by the user. To this end, we discuss and implement the division, exponential, square root, logarithm, minimum, and maximum function, using the CKKS cryptosystem of the OpenFHE library. To demonstrate that complex applications can be realized with this extended function set, we have used it to homomorphically realize the Box–Cox transform, which is used in many real-world applications, e.g., time-series forecasts. Our results show how the number of iterations required to achieve a given accuracy varies depending on the function. In addition, the execution time for each function is independent of the input and is in the range of ten seconds on a reference machine. With this work, we provide users with insights on how to extend the original restricted function set of the CKKS cryptosystem of the OpenFHE library with basic mathematical functions.
Funder
Julius-Maximilians-Universität Würzburg
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference70 articles.
1. Park, J., Han, K., Lee, B.: Green cloud? An empirical analysis of cloud computing and energy efficiency. Manag. Sci. (2022) 2. Handelsblatt: Cloud-Computing in Deutschland: Statistik Zeigt Das Nutzungsprofil Deutscher Unternehmen. (2020). Handelsblatt. Online available under https://www.handelsblatt.com/adv/firmen/cloud-computing-deutschland-statistik.html. Accessed on 22 Jan 2023 3. Rivest, R.L., Adleman, L., Dertouzos, M.L., et al.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978) 4. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009) 5. Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Advances in Cryptology—ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3–7, 2017, Proceedings, Part I 23, pp. 409–437 (2017). Springer
|
|