CryptoDB
Rosario Cammarota
Publications
Year
Venue
Title
2025
CIC
Security Guidelines for Implementing Homomorphic Encryption
Abstract
<p> Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows performing arbitrary operations on encrypted data. Since the conception of the idea in [RAD78], it has been considered a holy grail of cryptography. After the first construction in 2009 [Gen09], it has evolved to become a practical primitive with strong security guarantees. Most modern constructions are based on well-known lattice problems such as Learning With Errors (LWE). Besides its academic appeal, in recent years FHE has also attracted significant attention from industry, thanks to its applicability to a considerable number of real-world use-cases. An upcoming standardization effort by ISO/IEC aims to support the wider adoption of these techniques. However, one of the main challenges that standards bodies, developers, and end users usually encounter is establishing parameters. This is particularly hard in the case of FHE because the parameters are not only related to the security level of the system, but also to the type of operations that the system is able to handle. In this paper we provide examples of parameter sets for LWE targeting particular security levels, that can be used in the context of FHE constructions. We also give examples of complete FHE parameter sets, including the parameters relevant for correctness and performance, alongside those relevant for security. As an additional contribution, we survey the parameter selection support offered in open-source FHE libraries. </p>
2022
TCHES
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Abstract
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-channel attacks on inference engines are becoming a major threat. Indeed, several recent works have shown reverse engineering of the model internals using such attacks, but the research on building defenses is largely unexplored. There is a critical need to efficiently and securely transform those defenses from cryptography such as masking to ML frameworks. Existing works, however, revealed that a straightforward adaptation of such defenses either provides partial security or leads to high area overheads. To address those limitations, this work proposes a fundamentally new direction to construct neural networks that are inherently more compatible with masking. The key idea is to use modular arithmetic in neural networks and then efficiently realize masking, in either Boolean or arithmetic fashion, depending on the type of neural network layers. We demonstrate our approach on the edge-computing friendly binarized neural networks (BNN) and show how to modify the training and inference of such a network to work with modular arithmetic without sacrificing accuracy. We then design novel masking gadgets using Domain-Oriented Masking (DOM) to efficiently mask the unique operations of ML such as the activation function and the output layer classification, and we prove their security in the glitch-extended probing model. Finally, we implement fully masked neural networks on an FPGA, quantify that they can achieve a similar latency while reducing the FF and LUT costs over the state-of-the-art protected implementations by 34.2% and 42.6%, respectively, and demonstrate their first-order side-channel security with up to 1M traces.
Coauthors
- Afzal Ahmad (1)
- Aydin Aysu (1)
- Jean-Philippe Bossuat (1)
- Rosario Cammarota (2)
- Ilaria Chillotti (1)
- Benjamin R. Curtis (1)
- Wei Dai (1)
- Anuj Dubey (1)
- Huijing Gong (1)
- Erin Hales (1)
- Duhyeong Kim (1)
- Bryan Kumara (1)
- Changmin Lee (1)
- Xianhui Lu (1)
- Carsten Maple (1)
- Muhammad Adeel Pasha (1)
- Alberto Pedrouzo-Ulloa (1)
- Rachel Player (1)
- Yuriy Polyakov (1)
- Luis Antonio Ruiz Lopez (1)
- Yongsoo Song (1)
- Donggeon Yhee (1)