PERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING
Accelerate development of technology making threats to technology, one of which is data leakage. To prevent data leakage, we can use total homomorphic encryption that allows computation on encrypted data. There are four generations of total homomorphic encryption, one of which is CKKS which can p...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/65924 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
id |
id-itb.:65924 |
---|---|
spelling |
id-itb.:659242022-06-25T23:18:28ZPERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING IBNU SIDQI, MUCHAMMAD Indonesia Final Project data leakage, CKKS, RLWE, NTT, bootstrapping INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/65924 Accelerate development of technology making threats to technology, one of which is data leakage. To prevent data leakage, we can use total homomorphic encryption that allows computation on encrypted data. There are four generations of total homomorphic encryption, one of which is CKKS which can perform computations up to complex numbers so that it is suitable for online store problems. In the CKKS scheme, there are several processes, namely key generation, encoding, decoding, encryption, decryption, evaluation, rescaling, relinearization, and bootstrapping. The CKKS scheme is based on the RLWE problem so that the polynomials used are cyclotomic polynomial ring so that the NTT process can be implemented to shorten the computation time. The solution of using CKKS uses latigo library because of its speed in program execution. There are API architecture solutions used, namely REST is used because it is easy to implement. Five module solutions are implemented, namely activate for opening the balance, checkBalance to check the balance, topup to top up the balance, transact to store transaction history, and getTransact to get transaction history. The NTT implementation is done by changing the Poly data type in the program by activating the boolean isNTT, while the implementation of bootstrapping is done by adding a bootstrap() function call. Testing is done using two components, namely execution time and variable size. The execution time required for the homomorphic encryption process increases linearly with respect to the parameters, with the maximum processing time in the bootstrapping process and minimum time in the secret key generation process. The total execution time for homomorphic encryption using NTT process is lower than the total execution time without using NTT process. Considering execution time for the bootstrapping process, which reached an average of one minute for all parameters tested, homomorphic encryption cannot be implemented in real-world conditions. text |
institution |
Institut Teknologi Bandung |
building |
Institut Teknologi Bandung Library |
continent |
Asia |
country |
Indonesia Indonesia |
content_provider |
Institut Teknologi Bandung |
collection |
Digital ITB |
language |
Indonesia |
description |
Accelerate development of technology making threats to technology, one of which
is data leakage. To prevent data leakage, we can use total homomorphic encryption
that allows computation on encrypted data. There are four generations of total
homomorphic encryption, one of which is CKKS which can perform computations
up to complex numbers so that it is suitable for online store problems. In the CKKS
scheme, there are several processes, namely key generation, encoding, decoding,
encryption, decryption, evaluation, rescaling, relinearization, and bootstrapping.
The CKKS scheme is based on the RLWE problem so that the polynomials used
are cyclotomic polynomial ring so that the NTT process can be implemented to
shorten the computation time. The solution of using CKKS uses latigo library
because of its speed in program execution. There are API architecture solutions
used, namely REST is used because it is easy to implement. Five module solutions
are implemented, namely activate for opening the balance, checkBalance to check
the balance, topup to top up the balance, transact to store transaction history, and
getTransact to get transaction history. The NTT implementation is done by
changing the Poly data type in the program by activating the boolean isNTT,
while the implementation of bootstrapping is done by adding a bootstrap()
function call. Testing is done using two components, namely execution time and
variable size. The execution time required for the homomorphic encryption process
increases linearly with respect to the parameters, with the maximum processing
time in the bootstrapping process and minimum time in the secret key generation
process. The total execution time for homomorphic encryption using NTT process
is lower than the total execution time without using NTT process. Considering
execution time for the bootstrapping process, which reached an average of one
minute for all parameters tested, homomorphic encryption cannot be implemented
in real-world conditions. |
format |
Final Project |
author |
IBNU SIDQI, MUCHAMMAD |
spellingShingle |
IBNU SIDQI, MUCHAMMAD PERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING |
author_facet |
IBNU SIDQI, MUCHAMMAD |
author_sort |
IBNU SIDQI, MUCHAMMAD |
title |
PERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING |
title_short |
PERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING |
title_full |
PERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING |
title_fullStr |
PERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING |
title_full_unstemmed |
PERFORMANCE ANALYSIS OF HOMOMORPHIC ENCRYPTION CKKS IMPLEMENTATION WITH BOOTSTRAPPING AND NUMBER THEORITIC TRANSFORM PROCESS ON CLOUD COMPUTING |
title_sort |
performance analysis of homomorphic encryption ckks implementation with bootstrapping and number theoritic transform process on cloud computing |
url |
https://digilib.itb.ac.id/gdl/view/65924 |
_version_ |
1822004998554255360 |