-
Notifications
You must be signed in to change notification settings - Fork 182
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security doc update #503
base: main
Are you sure you want to change the base?
Security doc update #503
Conversation
update the section about delta-exact CKKS
update Recommendation for applicative countermeasures
add Multiparty FHE section
small modifs
I have a few comments on the updated SECURITY.md. I usually would refrain to do that here, but this is an open PR on the topic and the fastest communication channel.
lattigo/schemes/ckks/encoder.go Line 515 in 661575c
The contribution of Bossuat et al. is go give tight bounds on the noise to perform this rounding as efficiently as possible, limiting the loss in precision/efficiency.
|
Thanks for the clarification, I will update according.
If I understand well, the rounding is not enough and we need to add exponential amount of noise (noise flooding) to the decrypted value? |
update CKKS section
Yes, that but it is not very practical depending on the number of queries that are allowed, or ensuring that the error does not touch the plaintext so that it can be removed without triggering a carry that propagates to the plaintext, for example by adopting a BFV style encoding on top of the CKKS encoding, so by setting the x lower bits of all plaintext polynomial (in the ring) to zero, leaving enough space for the error to grow without touching the plaintext. How much to quantize can be derived by using these precise noise estimation. But doing so would require non trivial changes in the library, so I would leave it for another PR. Alternatively, a homomorphic sanitization can be done by doing homomorphic bit/byte-extraction and bit/byte-cleaning, which also enables a clean removal of the error at decryption (or flooding in the case of MHE). |
Update Security documentation