Advertisement

Efficiency Analysis of TFHE Fully Homomorphic Encryption Software Library Based on GPU

  • Hai-bin Yang
  • Wu-jun YaoEmail author
  • Wen-chao Liu
  • Bin Wei
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)

Abstract

There are a large number of independent matrix and vector operations in the lattice-based homomorphic encryption. These operations are suitable for GPU, which can greatly improve the efficiency of homomorphic operations. In this paper, we analyze the structure of the homomorphic encryption algorithm and verify the reliability of the homomorphic encryption software library, debug and analyze the fully homomorphic encryption software library TFHE and its corresponding GPU version cuFHE, and then compare their efficiency. The experimental results show that the GPU version TFHE is 4.5 times faster than the CPU version TFHE, so the GPU can greatly improve the homomorphic running speed of the homomorphic encryption scheme.

References

  1. 1.
    Tang, D.-H., Zhu, S.-X., Wang, L., et al.: Fully homomorphic encryption scheme from RLWE. J. Commun. 35(1), 173–182 (2014)Google Scholar
  2. 2.
    Huang, H., Gong, T., Chen, P., et al.: Secure two-party distance computation protocol based on privacy homomorphism and scalar product in wireless sensor networks. Tsinghua Sci. Technol. 21(4), 385–396 (2016)CrossRefGoogle Scholar
  3. 3.
    Chen, Z.-G., Wang, J., Song, X.-X.: Survey on fully homomorphic encryption. Appl. Res. Comput. 31(6), 1624–1630 (2014)Google Scholar
  4. 4.
    Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, vol. 9, pp. 169–178 (2009)Google Scholar
  5. 5.
    Zhou, T., Yang, X., Zhang, W., Wu, L., et al.: Efficient fully homomorphic encryption with circularly secure key switching process. a a 1, 1Google Scholar
  6. 6.
    Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology–CRYPTO 2013, pp. 75–92. Springer, Heidelberg (2013)Google Scholar
  7. 7.
    Chillotti, I., Gama, N., Georgieva, M., et al.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 s. In: Advances in Cryptology–ASIACRYPT 2016: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security, Part I, vol. 10031, Hanoi, Vietnam, 4–8 December 2016, pp. 3–33. Springer, Heidelberg (2016)Google Scholar
  8. 8.
    Zhou, T.P., Yang, X.Y., Liu, L.F., et al.: Faster Bootstrapping with Multiple Addends. Cryptology ePrint Archive, Report 2017/735 (2017). http://eprint.iacr.org/2017/735
  9. 9.
    Wang, W., Hu, Y., Chen, L., et al.: Accelerating fully homomorphic encryption using GPU. In: High Performance Extreme Computing, pp. 1–5. IEEE (2013)Google Scholar
  10. 10.
    Dai, W., Doröz, Y., Sunar, B.: Accelerating NTRU based homomorphic encryption using GPUs. In: IEEE High Performance Extreme Computing Conference, pp. 1–6. IEEE (2015)Google Scholar
  11. 11.
    Dai, W., Sunar, B.: cuHE: a homomorphic encryption accelerator library. In: International Conference on Cryptography and Information Security in the Balkans, pp. 169–186. Springer, Cham (2015)Google Scholar
  12. 12.
    Fast Fully Homomorphic Encryption Library over the Torus. https://github.com/tfhe/tfhe
  13. 13.
    Dai, W.: CUDA-accelerated Fully Homomorphic Encryption Library. https://github.com/vernamlab/cuFHE

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hai-bin Yang
    • 1
  • Wu-jun Yao
    • 1
    Email author
  • Wen-chao Liu
    • 1
  • Bin Wei
    • 1
  1. 1.School of Cryptographic EngineeringEngineering University of the Chinese People’s Armed PoliceXi’anChina

Personalised recommendations