Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

contests

2016 | Efficient GPGPU implementation of the Leveled Fully Homomorphic Encryption scheme YASHE

At IV Contest of Theses and Dissertations on Information and Computational Systems Security

Abstract

Under the dominant cloud computing paradigm, employing encryption for data storage and transport may not be enough for assurance of secrecy, because the data owner has no real control over the processing hardware. This way,security guarantees should also be extended to data processing. Homomorphic encryption schemes are natural candidates for computation over encrypted data in the cloud, since they are able to satisfy all security requirements imposed by that environment. This work investigates strategies to efficiently implement the leveled fully homomorphic scheme YASHE on GPGPUs. As result of this research, the CUYASHE library was developed and made available to the community. In particular, it presents a speedup between 6 and 35 times for homomorphic multiplication. This operation is performance-critical for evaluating any function over encrypted data, demonstrating that GPGPUs are an appropriate technology for bootstrapping privacy-preserving cloud computing environments.

Contest finalist.

(In portuguese!)

dissertations

2016 | Efficient GPGPU implementation of the Leveled Fully Homomorphic Encryption scheme YASHE

At Institute of Computing from University of Campinas

Abstract

Security in cloud computing is a relevant topic for research. Multiple branches of industry are embracing this paradigm to reduce operational costs, improve scalability and availability. Surprisingly, several techniques are still missing to properly preserve privacy on the cloud. Employing encryption for data storage and transport is not enough once the data owner has no real control over the processing hardware. This way, security requirements must also be extended to data processing tasks. Homomorphic encryption schemes are natural candidates for computation over encrypted data, since they are able to satisfy the requirements imposed by the cloud environment. This work investigates strategies to efficiently implement the leveled fully homomorphic scheme YASHE. It employs the CUDA platform to provide parallel processing capabilities and the chinese remainder theorem to replace expensive big integer arithmetic by simpler instructions natively supported in hardware. Moreover, this work offers a comparison between the Fast Fourier transform and the Number-Theoretic transform for reducing the complexity of polynomial multiplication. The former is provided by the cuFFT library, while the latter is implemented through the Stockham formulation. As result of this research, the cuYASHE library was developed and made available to the community. When compared with the state-of-the-art implementation in CPU, GPU and FPGA, it shows speed-ups for all operations. In particular, there was an improvement between 6 and 35 times for polynomial multiplication. This operation is performance-critical for evaluating any function over encrypted data, demonstrating that GPUs are an appropriate technology for bootstrapping privacy-preserving cloud computing environments.

(In portuguese!)

journals

2018 | A framework for searching encrypted databases

At Journal of Internet Services and Applications

Abstract

Cloud computing is a ubiquitous paradigm responsible for a fundamental change in the way distributed computingis performed. The possibility to outsource the installation, maintenance and scalability of servers, added to competitive prices, makes this platform highly attractive to the computing industry. Despite this, privacy guarantees are still insufficient for data processed in the cloud, since the data owner has no real control over the processing hardware. This work proposes a framework for database encryption that preserves data secrecy on an untrusted environment and retains searching and updating capabilities. It employs order-revealing encryption to perform selection with time complexity in Θ(log n), and homomorphic encryption to enable computation over ciphertexts. When compared to the current state of the art, our approach provides higher security and flexibility. A proof-of-concept implementation on top of the MongoDB system is offered and applied in the implementation of some of the main predicates required by the winning solution to Netflix Grand Prize.

Extension of SBSeg’s paper.

publications

2011 | Ray tracing in GPGPUs

At 12th International Congress of the Brazilian Geophysical Society

Abstract

Neste trabalho falamos sobre a utilização da arquitetura CUDA, criada pela NVIDIA, na simulação de traçamento de raios. Essa arquitetura permite a execução de programas através do processador da placa gráfica, com o intuito de aproveitar a grande capacidade de poder de processamento paralelo que essa possui. Mostramos que, dessa forma o ganho de performance pode chegar a 82% em relação ao algoritmo sequencial.

(In portuguese!)

2015 | cuYASHE: Computation over encrypted data on GPGPUs

At XV Brazilian Symposium on Information and Computational Systems Security

Abstract

Under the dominant cloud computing paradigm, employing encryption fordata storage and transport may not be enough. Security guarantees should also be extended to data processing, to preserve the privacy of data owners and contractors. Homomorphic encryption schemes are a natural candidate for computing over encrypted data, satisfying these new security requirements. In this work, CUYASHE is presented as a GPGPU implementation of the leveled fully homomorphic scheme YASHE. The implementation employs the CUDA platform, the Chinese Remainder Theorem and the Fast Fourier Transform to obtain significant performance improvements. When compared with the state-of-the-art implementation in CPUs, speedups of 20% for homomorphic addition and 58% for multiplication were observed. These operations are performance-critical for evaluating any function over encrypted data, demonstrating that GPUs are an appropriate technology for bootstraping privacy-preserving cloud computing environments.

(In portuguese!)

2016 | Efficient GPGPU implementation of the Leveled Fully Homomorphic Encryption scheme YASHE

At Congress of the Brazilian Computer Society

Abstract

Under the dominant cloud computing paradigm, employing encryption for data storage and transport may not be enough. Security guarantees should also be extended to data processing. Homomorphic encryption schemes are natural candidates for computation over encrypted data since they are able to satisfy the requirements imposed by the cloud environment. This work presents CUYASHE as a GPGPU implementation of the leveled fully homomorphic scheme YASHE. It employs CUDA, the Chinese Remainder Theorem and the Fast Fourier Transform to obtain significant performance improvements. In particular, there was a speedup between 6 and 35 times for homomorphic multiplication.

(In portuguese!)

2016 | A framework for searching encrypted databases

At XVI Brazilian Symposium on Information and Computational Systems Security

Abstract

Cloud computing is a ubiquitous paradigm. It has been responsible for a fundamental change in the way distributed computing is performed. The possibility to outsource the installation, maintenance and scalability of servers, added to competitive prices, makes this platform highly attractive to the industry. Despite this, privacy guarantees are still insufficient for data processed in the cloud, since the data owner has no real control over the processing hardware. This work proposes a framework for database encryption that preserves data secrecy on an untrusted environment and retains searching and updating capabilities. It employs order-revealing encryption to provide selection with time complexity in Θ(log n),and homomorphic encryption to enable computation over ciphertexts. When compared to the current state of the art, our approach provides higher security and flexibility. A proof-of-concept implementation on top of MongoDB is offered and presents an 11-factor overhead for a selection query over an encrypted database.

Best paper runner-up!

2021 | Faster Homomorphic Encryption over GPGPUs via hierarchical DGT

At Financial Cryptography and Data Security

Abstract

Privacy guarantees are still insufficient for outsourced data processing in the cloud. While employing encryption is feasible for data at rest or in transit, it is not for computation without remarkable performance slowdown. Thus, handling data in plaintext during processing is still required, which creates vulnerabilities that can be exploited by malicious entities. Homomorphic encryption schemes enable computation over ciphertexts without knowing the related plaintexts or the decryption key. This work focuses on the challenge of developing an efficient implementation of the BFV scheme on CUDA. This is done by combining and adapting different literature approaches, as the double-CRT representation and the Discrete Galois Transform. Moreover, we propose and implement an improved formulation of the DGT inspired by classical algorithms, which computes the transform up to 2.6 times faster than the state-of-the-art. By using these approaches, we obtain up to 3.6 times faster homomorphic multiplication.

talks

teaching

2014 | Teaching assistant at Programming Paradigms

Undergraduate course, Institute of Computing, University of Campinas, 2014

2015 | Teaching assistant at Object Oriented Programming

Undergraduate course, Institute of Computing, University of Campinas, 2015

2016 | Teaching assistant at Algorithms and Computer Programming

Undergraduate course, Institute of Computing, University of Campinas, 2016

2017 | Teaching assistant at Algorithms and Computer Programming

Undergraduate course, Institute of Computing, University of Campinas, 2017