Paper by: Craig Gentry Presented By: Daniel Henneberger.

25
Fully Homomorphic Encryption Paper by: Craig Gentry Presented By: Daniel Henneberger

Transcript of Paper by: Craig Gentry Presented By: Daniel Henneberger.

Page 1: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Fully Homomorphic Encryption

Paper by: Craig GentryPresented By: Daniel Henneberger

Page 2: Paper by: Craig Gentry Presented By: Daniel Henneberger.

What is homomorphic encryption?

Page 3: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Computations on ciphertext which predictably modifies the plaintext

Operate on messages while they are encrypted

Data can be securely processed in unsecure environments◦ Cloud Computing◦ Databases◦ Voting machines

Homomorphic Encryption

Page 4: Paper by: Craig Gentry Presented By: Daniel Henneberger.

How it works

Page 5: Paper by: Craig Gentry Presented By: Daniel Henneberger.

How it works

Page 6: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Keygen Encrypt Decrypt Evaluate

Page 7: Paper by: Craig Gentry Presented By: Daniel Henneberger.

1978 – Privacy Homomorphism

US government pumps millions in it

History

Page 8: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Additive◦ E(m1) + E(m2) = E(m1+m2)

Multiplicative◦E(m1) * E(m2) = E(m1*m2)

Why just Add and Mul? ◦ Can evaluate any function◦ Turing complete over a ring

Types of Homomorphism

Page 9: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Somewhat Homomorphic◦ You can do only do some functions◦ RSA

Fully Homomorphic◦ You can do all functions

Leveled Fully Homomorphic◦ Keysize can grow with depth of the function

Bootstrappable◦ Can evaluate its own decryption circuit

Types of Homomorphism

Page 10: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Fully Homomorphic Encryption Using Ideal

LatticesCraig Gentry

Stanford University and IBM Watson2009

Page 11: Paper by: Craig Gentry Presented By: Daniel Henneberger.

“Most unbearably complicated topic ever” –Craig Gentry

Page 12: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Before this paper, it was unknown if fully homomorphic encryption could exist

First feasible result Holy grail of encryption

17 results on YouTube!

Importance of this topic

Page 13: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Ideal lattices are a form of difficult to compute mathematical problems

Similar to:◦ Integer Factorization◦ Discrete logarithm problem ◦ Elliptic curves over finite fields (Elliptical curve)

Closest vector problem Learning with errors Unbreakable with quantum computing

◦ Uses arbitrary approximations

MATH: Lattice

Page 14: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Illustration - A lattice in R2

borrowed from tau.ac.il“Recipe”:

1. Take two linearly independent vectors in R2.

2. Close them for addition and for multiplication by an integer scalar.

Each point corresponds to a vector in the lattice

etc. ... etc. ...

Page 15: Paper by: Craig Gentry Presented By: Daniel Henneberger.

A cyclic lattice is ‘ideal’ (ring-based) NTRU – Asymmetric key cryptosystem that

uses ring-based lattices

Low circuit complexity Very fast Allows additive and multiplicative

homomorphism

MATH: Ideal Lattice

Page 16: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Lots of math involved with this:◦ Cyclotomic Polynomials

Too much for this class time

More MATH

Page 17: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Evaluate(pk,C, Encrypt(pk,m1),..., Encrypt(pk,mt)) = Encrypt(pk,C(m1,..., mt))

Steps◦ Create a general bootstrapping result◦ Initial construction using ideal lattices◦ Squash the decryption circuit to permit

bootstrapping

Advances

Page 18: Paper by: Craig Gentry Presented By: Daniel Henneberger.

General Bootstrapping Result

Page 19: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Find a Public key scheme that is homomorphic for shallow circuits and uses ideal lattices◦ NTRUEncrypt

Ciphertext has a form of an ideal lattice + offset

Use a cyclic ring of keys◦ Hard to do◦ Large key size (GB)

Initial construction using ideal lattices

Page 20: Paper by: Craig Gentry Presented By: Daniel Henneberger.

“Squash the Decryption Circuit”

Page 21: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Evaluate its own decryption circuit Provides ability to recrypt plaintext Must be allowed to recrypt augmented

versions to provide mathematical operations

Bootstrap Requirements

Page 22: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Allows ‘unlimited’ additions◦ Recrypt algorithm

Greater multiplicative depth◦ log log (N) - log log (n-1)◦ Still bad

Improvements

Page 23: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Can only evaluate in logarithmic depth◦ Ciphertext grows ◦ Noise increases

Addition- circuits can be corrected (recrypting) Multiplication- noise grows quickly

Not yet practical◦ Client must begin the decryption process to be

bootstrappable◦ Solution is approximate◦ >1 day to compute 1 message

Disadvantages

Page 24: Paper by: Craig Gentry Presented By: Daniel Henneberger.

PollyCracker Fully Homomorphic Encryption over the

Integers Fully Homomorphic Encryption over the

Binary Polynomials

Implementations

Page 25: Paper by: Craig Gentry Presented By: Daniel Henneberger.

Many people have created new variants Implementations All slow

Finding shortcuts

AES-128 – Completed June 15th 2012◦ Computed with 256GB of ram (still limiting factor)◦ 24 Xeon cores◦ Took 5 days per operation

Since this paper