Experimental browser for the Atmosphere
Seamless Switching Between PBS and WoPBS for Scalable TFHE (Rostin Shokri, Nektarios Georgios Tsoutsos) ia.cr/2025/777
May 3, 2025, 8:15 PM
{ "uri": "at://did:plc:fwa55bujvdrwlwlwgqmmxmuf/app.bsky.feed.post/3loc5ri5bw22p", "cid": "bafyreieat4voccqlh5xn6bffcv6z3idmz7zdkis6pzpjdyba6yju3gmqje", "value": { "text": "Seamless Switching Between PBS and WoPBS for Scalable TFHE (Rostin Shokri, Nektarios Georgios Tsoutsos) ia.cr/2025/777", "$type": "app.bsky.feed.post", "embed": { "$type": "app.bsky.embed.images", "images": [ { "alt": "Abstract. Fully Homomorphic Encryption (FHE) enables arbitrary and unlimited computations directly on encrypted data. Notably, the TFHE scheme allows users to encrypt bits or small numbers (4-6 bits) and compute any univariate function using programmable bootstrapping (PBS), while simultaneously refreshing the ciphertext noise. Since both linear and non-linear functions can be evaluated using PBS, it is possible to compute arbitrary functions and circuits of unlimited depth without any accuracy loss. Nevertheless, a major limitation of TFHE, compared to other FHE schemes, is that it operates on a single ciphertext at a time, and the underlying message size remains small. For larger messages with longer bit sizes, the execution overhead of PBS grows exponentially with the number of message bits. A recent approach, called Without-padding PBS (WoPBS), enables computation of much larger lookup tables (10-28 bits), with the execution cost scaling linearly with the number of message bits. The significant encoding mismatch between the PBS and WoPBS, however, complicates the use of both approaches within the same circuit execution.\n\nIn this work, we introduce novel switching algorithms that enable ciphertexts to be converted back and forth between the PBS and WoPBS contexts without impacting the input noise. Moreover, we introduce a new method to bootstrap ciphertexts within the WoPBS context, allowing for unlimited XOR operations at negligible cost. To enhance runtime, we further introduce optimized parameters for both contexts. We validate our techniques through the homomorphic evaluation of AES encryption and decryption, demonstrating transciphering applications that outperform related works.\n", "image": { "$type": "blob", "ref": { "$link": "bafkreieo5q3kv2w3uovpizwscakh2hmqomiyu6swdzqy6mvaay66v2vmpu" }, "mimeType": "image/png", "size": 106595 }, "aspectRatio": { "width": 1200, "height": 800 } }, { "alt": "Image showing part 2 of abstract.", "image": { "$type": "blob", "ref": { "$link": "bafkreicuxc54xyvz7ja3vkvje6cbipfe4lf4gmjmj4p365dh7s2nvi2dla" }, "mimeType": "image/png", "size": 60604 }, "aspectRatio": { "width": 1200, "height": 800 } } ] }, "facets": [ { "index": { "byteEnd": 118, "byteStart": 104 }, "features": [ { "uri": "https://ia.cr/2025/777", "$type": "app.bsky.richtext.facet#link" } ] } ], "createdAt": "2025-05-03T20:15:43.918209Z" } }