ArXiv TLDR

Verifiable Fully Homomorphic Encryption

🐦 Tweet
2301.07041

Alexander Viand, Christian Knabenhans, Anwar Hithnawi

cs.CR

TLDR

This paper introduces verifiable FHE to solve integrity and confidentiality issues in existing FHE schemes, proposing a new maliciously-secure notion.

Key contributions

  • Highlights FHE's integrity and confidentiality issues, including key-recovery attacks.
  • Shows existing FHE schemes' honest-but-curious server assumption is insufficient.
  • Analyzes prior FHE integrity, presents attacks exploiting gaps, and proposes a new notion.
  • Instantiates and evaluates the new maliciously-secure verifiable FHE notion.

Why it matters

FHE's lack of integrity is a major hurdle for secure deployment, enabling key-recovery attacks and limiting its use in untrusted environments. This work introduces a new notion for maliciously-secure verifiable FHE, addressing critical security gaps and enhancing FHE's robustness for real-world applications.

Original Abstract

Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect data in use by allowing computation over encrypted data. However, the same malleability that enables homomorphic computations also raises integrity issues, which have so far been mostly overlooked. While FHEs lack of integrity has obvious implications for correctness, it also has severe implications for confidentiality: a malicious server can leverage the lack of integrity to carry out interactive key-recovery attacks. As a result, virtually all FHE schemes and applications assume an honest-but-curious server who does not deviate from the protocol. In practice, however, this assumption is insufficient for a wide range of deployment scenarios. While there has been work that aims to address this gap, these have remained isolated efforts considering only aspects of the overall problem and fail to fully address the needs and characteristics of modern FHE schemes and applications. In this paper, we analyze existing FHE integrity approaches, present attacks that exploit gaps in prior work, and propose a new notion for maliciously-secure verifiable FHE. We then instantiate this new notion with a range of techniques, analyzing them and evaluating their performance in a range of different settings. We highlight their potential but also show where future work on tailored integrity solutions for FHE is still required.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.