Table 5: Naive packing for the FC layer using the rescale
operation after the plaintext multiplication and using both
the rescale and relinearization after the ciphertext multipli-
cation. The multiplicative factor of runtime overhead com-
pared to the all weights in plaintext computation.
p (128, 10) (2048,128)
0.0 1 1
0.1 1.3 4.4
0.2 1.55 7.9
0.3 1.7 11.6
0.4 1.9 2.2
0.5 2.15 2.5
0.6 2.3 2.9
0.7 2.5 25.3
0.8 2.7 3.252
0.9 2.95 3.7
1.0 3.11 4.1
Table 6: The convolutional layer using the relinearization
operation after the ciphertext multiplication. All the 9 mul-
tiplications for a filter application are either all ciphertext or
all plaintext. The multiplicative factor of runtime overhead
compared to the all weights in plaintext computation.
p (3,3)
0.0 1
0.1 4.5
0.2 8
0.3 11.7
0.4 15
0.5 18.15
0.6 22.3
0.7 25.5
0.8 29.7
0.9 32.55
1.0 36.11
ers cost of multiplications by a factor of 4. While
similar security-performance trade-offs are very com-
mon in applied cryptography (in searchable symmet-
ric schemes for instance), it is the first time that such
approach is proposed in ML model inference.
Further research will follow. New attack models
must be proposed and new more fine-grained security
definitions must be introduced per use case. At the
same time, the efficiency gain per use case must be
evaluated both theoretically (complexity asymptotic)
as well as experimentally. Our goal will be to leverage
the results of this research and provide new design
guidelines for efficient HE-compilers.
ACKNOWLEDGEMENTS
This work was supported by the project COLLABS,
funded by the European Commission under Grant
Agreements No. 871518. This publication reflects
the views only of the authors, and the Commission
cannot be held responsible for any use which may be
made of the information contained therein.
REFERENCES
(2018). Homomorphic encryption standardization.
https://homomorphicencryption.org/standard/.
Boemer, F., Costache, A., Cammarota, R., and Wierzynski,
C. (2019a). ngraph-he2: A high-throughput frame-
work for neural network inference on encrypted data.
In Brenner, M., Lepoint, T., and Rohloff, K., editors,
Proceedings of the 7th ACM Workshop on Encrypted
Computing & Applied Homomorphic Cryptography,
WAHC@CCS 2019, London, UK, November 11-15,
2019, pages 45–56. ACM.
Boemer, F., Lao, Y., Cammarota, R., and Wierzynski, C.
(2019b). ngraph-he: a graph compiler for deep learn-
ing on homomorphically encrypted data. In Palumbo,
F., Becchi, M., Schulz, M., and Sato, K., editors, Pro-
ceedings of the 16th ACM International Conference
on Computing Frontiers, CF 2019, Alghero, Italy,
April 30 - May 2, 2019, pages 3–13. ACM.
Boura, C., Gama, N., Georgieva, M., and Jetchev, D.
(2020). CHIMERA: combining ring-lwe-based fully
homomorphic encryption schemes. J. Math. Cryptol.,
14(1):316–338.
Chen, H., Cammarota, R., Valencia, F., and Regazzoni, F.
(2019). Plaidml-he: Acceleration of deep learning
kernels to compute on encrypted data. In 37th IEEE
International Conference on Computer Design, ICCD
2019, Abu Dhabi, United Arab Emirates, November
17-20, 2019, pages 333–336. IEEE.
Cheon, J. H., Kim, A., Kim, M., and Song, Y. (2017). Ho-
momorphic encryption for arithmetic of approximate
numbers. In International Conference on the Theory
and Application of Cryptology and Information Secu-
rity, pages 409–437. Springer.
Chou, E., Beal, J., Levy, D., Yeung, S., Haque, A., and
Fei-Fei, L. (2018). Faster cryptonets: Leveraging
sparsity for real-world encrypted inference. CoRR,
abs/1811.09953.
Dathathri, R., Saarikivi, O., Chen, H., Laine, K., Lauter,
K., Maleki, S., Musuvathi, M., and Mytkowicz, T.
(2019a). Chet: an optimizing compiler for fully-
homomorphic neural-network inferencing. In Pro-
ceedings of the 40th ACM SIGPLAN Conference on
Programming Language Design and Implementation,
pages 142–156.
Dathathri, R., Saarikivi, O., Chen, H., Laine, K., Lauter,
K. E., Maleki, S., Musuvathi, M., and Mytkowicz,
T. (2019b). CHET: an optimizing compiler for fully-
homomorphic neural-network inferencing. In McKin-
SECRYPT 2022 - 19th International Conference on Security and Cryptography
168