Cryptology ePrint Archive: Report 2022/425

New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks

Charles Gouert and Dimitris Mouris and Nektarios Georgios Tsoutsos

Abstract: Fully homomorphic encryption (FHE) enables arbitrary computation on encrypted data, allowing customers to upload ciphertexts to third-party cloud servers for meaningful computation while mitigating security and privacy risks. Many cryptographic schemes fall under the umbrella of FHE, and each scheme has several open-source implementations with its own strengths and weaknesses. Nevertheless, developers have no straightforward way to choose which FHE scheme and implementation is best suited for their application needs, especially considering that each scheme offers different security, performance, and usability guarantees.

To address this open question and allow programmers to effectively utilize the power of FHE, we employ a series of benchmarks collectively called the Terminator 2 Benchmark Suite and present new insights gained from running these algorithms with a variety of FHE back-ends. Contrary to generic benchmarks that do not take into consideration the inherent challenges of encrypted computation, our methodology is tailored to the security primitives of each target FHE implementation. To ensure fair comparisons, we developed a versatile compiler (called T2) that converts arbitrary benchmarks written in a domain-specific language into identical encrypted programs running on different popular FHE libraries as a backend. Our analysis exposes for the first time the advantages and disadvantages of each FHE library as well as the types of applications most suited for each computational domain (i.e., binary, integer, and floating-point).

Category / Keywords: applications / Benchmarking, data privacy, encrypted computation, fully homomorphic encryption, performance evaluation

Date: received 3 Apr 2022

Contact author: tsoutsos at udel edu

Available format(s): PDF | BibTeX Citation

Version: 20220406:130337 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]