Verifiable Computing Using Computation Fingerprints Within FHE

05/04/2021
by   Shlomi Dolev, et al.
0

We suggest using Fully Homomorphic Encryption (FHE) to be used, not only to keep the privacy of information but also, to verify computations with no additional significant overhead, using only part of the variables length for verification. This method supports the addition of encrypted values as well as multiplication of encrypted values by the addition of their logarithmic representations and is based on a separation between hardware functionalities. The computer/server performs blackbox additions and is based on the separation of server/device/hardware, such as the enclave, that may deal with additions of logarithmic values and exponentiation. The main idea is to restrict the computer operations and to use part of the variable for computation verification (computation fingerprints) and the other for the actual calculation. The verification part holds the FHE value, of which the calculated result is known (either due to computing locally once or from previous verified computations) and will be checked against the returned FHE value. We prove that a server with bit computation granularity can return consistent encrypted wrong results even when the public key is not provided. For the case of computer word granularity the verification and the actual calculation parts are separated, the verification part (the consecutive bits from the LSB to the MSB of the variables) is fixed across all input vectors. We also consider the case of Single Instruction Multiple Data (SIMD) where the computation fingerprints index in the input vectors is fixed across all vectors.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/28/2022

Verifiable Encodings for Secure Homomorphic Analytics

Homomorphic encryption, which enables the execution of arithmetic operat...
research
01/09/2021

CryptoEmu: An Instruction Set Emulator for Computation Over Ciphers

Fully homomorphic encryption (FHE) allows computations over encrypted da...
research
04/29/2019

Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain

This paper proposes a fully homomorphic encryption encapsulated differen...
research
08/31/2020

Homomorphic Encryption for Quantum Annealing with Spin Reversal Transformations

Homomorphic encryption has been an area of study in classical computing ...
research
04/26/2021

Two-Server Delegation of Computation on Label-Encrypted Data

Catalano and Fiore propose a scheme to transform a linearly-homomorphic ...
research
06/29/2018

Proof-of-work certificates that can be efficiently computed in the cloud

In an emerging computing paradigm, computational capabilities, from proc...
research
09/13/2023

Toward Lossless Homomorphic Encryption for Scientific Computation

This paper presents a comprehensive investigation into encrypted computa...

Please sign up or login with your details

Forgot password? Click here to reset