22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

1 Introduction 1<br />

2 Background 3<br />

2.1 Notations and Mathematical Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

2.2 BGV-type Cryptosystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

2.3 Computing on Packed Ciphertexts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />

3 General-Purpose Optimizations 6<br />

3.1 A New Variant of Key Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />

3.2 Modulus Switching in Evaluation Representation . . . . . . . . . . . . . . . . . . . . . . . 8<br />

3.3 Dynamic Noise Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />

3.4 Randomized Multiplication by Constants . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

4 Homomorphic Evaluation of AES 9<br />

4.1 Homomorphic Evaluation of the Basic Operations . . . . . . . . . . . . . . . . . . . . . . . 10<br />

4.1.1 AddKey and SubBytes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />

4.1.2 ShiftRows and MixColumns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />

4.1.3 The Cost of One Round Function . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />

4.2 Byte- and Bit-Slice Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />

4.3 Performance Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />

References 13<br />

A More Details 15<br />

A.1 Plaintext Slots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />

A.2 Canonical Embedding Norm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />

A.3 Double CRT Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br />

A.4 Sampling From A q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />

A.5 Canonical embedding norm of random polynomials . . . . . . . . . . . . . . . . . . . . . . 17<br />

B The Basic Scheme 18<br />

B.1 Our Moduli Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

B.2 Modulus Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

B.3 Key Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />

B.4 Key-Generation, Encryption, and Decryption . . . . . . . . . . . . . . . . . . . . . . . . . 21<br />

B.5 Homomorphic Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br />

C Security Analysis and Parameter Settings 23<br />

C.1 Lower-Bounding the Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23<br />

C.1.1 LWE with Sparse Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

C.2 The Modulus Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

C.3 Putting It Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br />

D Scale(c, q t , q t−1 ) in dble-CRT Representation 28<br />

5. Homomorphic Evaluation of the AES Circuit

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!