Periodic Reporting for period 2 - BELFORT (Hardware Acceleration for Computing on Encrypted Data)
Okres sprawozdawczy: 2023-09-01 do 2025-02-28
This ERC project focuses on the implementation challenges. Dedicated hardware acceleration units are developed to improve performance and reduce energy requirements.
Why is it important for society?
Computing on encrypted data enables multiple new applications. Examples are statistics or machine learning on healthcare, financial, and energy data. This data could be used to monitor pandemics, monitor abnormal financial transactions, or tune supply and demand in an energy market. These operations should be performed on the encrypted data without first decrypting.
What are the overall objectives?
Computing on encrypted data is a relatively new branch in cryptography: it enables calculations on the encrypted data, while data remains encrypted in the cloud and without the need to decrypt it. The result itself will only be decrypted by the final recipient. The challenge with these novel mathematical concepts is a gigantic blow-up in the size of ciphertext data, in the number of calculations on the encrypted data, and in the novel lattice-based arithmetic used. The overall objective is to make computing on encrypted data feasible, from the 1000’s to 100.000 times overhead down to the ambitious limited overhead of a factor 10, compared to unencrypted operations on the data. Not only speed or throughput is important, also the reduction of power and energy consumption is an important objective to evolve towards a green solution.
Computing on encrypted data means that the sensitive data is encrypted at the user’s side, which we call the end-nodes. The encrypted data is next sent on the internet, or stored on a remote server, which we assume is untrusted. The topics we started during this first period are the following:
• At the user’s end, sensitive data needs to be encrypted, and the results of the operations decrypted. The challenge here is that the encryption and decryption operations occur potentially in insecure environments, so these hardware implementations need protection against side-channel and fault attacks. In this first period, we focused on masking, a particular protection mechanism, to protect lattice-based encryption schemes against side-channel and fault attacks. This work is part of WP1. We have results both on the attack side, as well as on the protection side.
Some highlights are:
[Higher-Order Masked Saber. https://doi.org/10.1007/978-3-031-14791-3_5](odnośnik otworzy się w nowym oknie) Google Scholar: 34 citations
[C. Mujdei, L. Wouters, A. Karmakar, A. Beckers, J. Bermudo Mera, I. Verbauwhede (2024): Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication. ACM Trans. Embed. Comput. Syst. 23(2): 27:1-27:23 (2024).] Measuring impact: this paper has already 71 citations on Google Scholar.
• Making applications Computing on Encrypted Data (COED) friendly is a big challenge. In a first experiment, we studied the quantization effect on neural networks to make them more FHE-friendly. This work is part of WP2.
• A major result of the first phase is our FPT processor. This is a domain-specific accelerator suitable for an FPGA platform. It focuses on the programmable bootstrapping step of the Torus Fully Homomorphic Encryption (TFHE). It is designed under WP3 and WP4.
This FPT processor is part of IP transfer that will be transferred from KU Leuven to the spinoff company Belfort Labs.
WP5 and WP6 recently started:
In the context of WP5, we have first results making a distance calculation application FHE friendly. It is currently submitted to a major security conference. Its pre-print is available through IACR eprint. On the technology developed in this work, a patent application has been filed.
In the contecxt of WP6, we are experimenting with designs to fit on multiple FPGA, addressing the parallelism challenges.
This work will be presented at CHES in September 2025:
WP7 also recently started. In WP7, an end-to-end application is developed. We start from real-life use cases, such as the above mentioned Leuvensthein. We will investigate if Leuvensthein is also suitable for DNA matching applications. Other applications being considered are privacy friendly machine learning.
As promised in our proposal, we organized a workshop in May 2024. The focus of this very successful workshop was the hardware acceleration of computing on encrypted data. Through our international connections, all major players in the field were present at our workshop, including representation from major silicon and software companies. At this workshop, we had a major second demonstrator: we had prototype version of the Leuvensthein algorithm running. It also showed during this workshop, that our project was the only one with a working demo.
Based on these early promising results, we applied for and received an ERC Proof of Concept Grant, called “Belfort Match”. Belfort match allows us to further develop the technology and raise the TRL level of the technology.
In September 2024, we also started discussions with Leuven Research and Development (LRD), which is the tech transfer office of the university. We plan to take the results of the ERC project towards a spin-off company (called Belfort Labs).