Computação sobre dados cifrados em GPGPUs
Abstract
Under the dominant cloud computing paradigm, employing encryption for data storage and transport may not be enough. Security guarantees should also be extended to data processing. Homomorphic encryption schemes are natural candidates for computation over encrypted data since they are able to satisfy the requirements imposed by the cloud environment. This work presents CUYASHE as a GPGPU implementation of the leveled fully homomorphic scheme YASHE. It employs CUDA, the Chinese Remainder Theorem and the Fast Fourier Transform to obtain significant performance improvements. In particular, there was a speedup between 6 and 35 times for homomorphic multiplication.
References
Alves, P. and Aranha, D. (2016). cuYASHE. https://github.com/cuyashe-library/cuyashe. Acessado pela última vez: 19/05/2016.
Aranha, D. F. and Gouvêa, C. P. L. (2016). RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic.
Bos, J., Lauter, K., Loftus, J., and Naehrig, M. (2013). Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. Springer Berlin Heidelberg.
Cooley, J. W. and Tukey, J. W. (1965). An algorithm for the machine calculation of complex Fourier series. Mathematics of Computation, 19:297–301.
Ding, C., Pei, D., and Salomaa, A. (1996). Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. World Scientific Publishing Co., Inc.
Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., and Wernsing, J. (2015). Manual for Using Homomorphic Encryption for Bioinformatics.
Lepoint, T. and Naehrig, M. (2014). A Comparison of the Homomorphic Encryption Schemes FV and YASHE. Springer International Publishing.
NVIDIA (2015). CUDA Toolkit Documentation. http://docs.nvidia.com/cuda/cufft/. Acessado pela última vez: 12/08/2015.
Shoup, V. (2003). NTL: A library for doing number theory. http://www.shoup.net/ntl. Acessado pela ´ultima vez: 05/03/2016.
