Paper 2023/895

ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations

Anisha Mukherjee, Graz University of Technology, Graz, Austria
Aikata Aikata, Graz University of Technology, Graz, Austria
Ahmet Can Mert, Graz University of Technology, Graz, Austria
Yongwoo Lee, Samsung Advanced Institute of Technology, Suwon, Republic of Korea
Sunmin Kwon, Samsung Advanced Institute of Technology, Suwon, Republic of Korea
Maxim Deryabin, Samsung Advanced Institute of Technology, Suwon, Republic of Korea
Sujoy Sinha Roy, Graz University of Technology, Graz, Austria
Abstract

The promising field of homomorphic encryption enables functions to be evaluated on encrypted data and produce results that mimic the same computations done on plaintexts. It, therefore, comes as no surprise that many ventures at constructing homomorphic encryption schemes have come into the limelight in recent years. Most popular are those that rely on the hard lattice problem, called the Ring Learning with Errors problem (RLWE). One major limitation of these homomorphic encryption schemes is that in order to securely increase the maximum multiplicative depth, they need to increase the polynomial-size thereby also increasing the complexity of the design. We aim to bridge this gap by proposing a homomorphic encryption (HE) scheme based on the Module Learning with Errors problem (MLWE), ModHE that allows us to break the big computations into smaller ones. Given the popularity of module lattice-based post-quantum schemes, it is an evidently interesting research endeavor to also formulate module lattice-based homomorphic encryption schemes. While our proposed scheme is general, as a case study, we port the well-known RLWE-based CKKS scheme to the MLWE setting. The module version of the scheme completely stops the polynomial-size blowups when aiming for a greater circuit depth. Additionally, it presents greater opportunities for designing flexible, reusable, and parallelizable hardware architecture. A hardware implementation is provided to support our claims. We also acknowledge that as we try to decrease the complexity of computations, the amount of computations (such as relinearizations) increases. We hope that the potential and limitations of using such a hardware-friendly scheme will spark further research.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A minor revision of an IACR publication in TCHES 2024
Keywords
Homomorphic encryptionmodule latticehardware reusability
Contact author(s)
anisha mukherjee @ iaik tugraz at
aikata @ iaik tugraz at
ahmet mert @ iaik tugraz at
sujoy sinharoy @ iaik tugraz at
History
2023-10-14: last of 2 revisions
2023-06-09: received
See all versions
Short URL
https://ia.cr/2023/895
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/895,
      author = {Anisha Mukherjee and Aikata Aikata and Ahmet Can Mert and Yongwoo Lee and Sunmin Kwon and Maxim Deryabin and Sujoy Sinha Roy},
      title = {ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations},
      howpublished = {Cryptology ePrint Archive, Paper 2023/895},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/895}},
      url = {https://eprint.iacr.org/2023/895}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.