
Table 2: Average memory usage for different ring dimen-
sions of the Standard Deviation.
Ring Dimensions
Parameter [KB] 2
15
2
16
2
17
CiphertextSize 5.519 12.663 26.740
PublicKeySize 8.224 17.512 36.740
EvalMultKeySize 24.980 52.683 110.217
SecretKeySize 3.269 6.622 13.371
Memory Usage. The higher multiplicative depth of
the Standard Deviation leads to a drastically increased
memory usage (Table 2). This can be attributed to the
fact that the higher depth also increases the modulus,
which in turn affects the memory usage. This shows
that while the ring dimension is a major factor when
it comes to memory usage, other factors such as the
multiplicative depth also influence it.
In the highest ring dimension, which is needed to
reach the highest ScaleModSizes in the 256 bits se-
curity level, the memory usage is more than 10 times
higher than the highest ring dimension for the previ-
ous function. However, as described above, this ring
dimension can be avoided without loss of precision or
security.
5 CONCLUSION
In this paper we evaluated the main parameters for
configuring the CKKS encryption scheme within the
library OpenFHE. The results indicate that both run-
time and precision are strongly affected by the com-
putational complexity of the functions being exe-
cuted.
Our observations provide some guidance on
which parameters affect which aspects of the results.
In general, the computation time and memory usage
are mainly influenced by the ring dimension as well
as the multiplicative depth. The precision on the other
hand is influenced mostly by the ScaleModSize.
The main goal when designing an application us-
ing the CKKS scheme is to optimize the parameters.
It is crucial to choose parameters which have accept-
able precision, but at the same time achieve the low-
est possible ring dimension for the chosen Security
Level. Especially the measurement results for 192
bits of security across all three functions showed that
it is possible to stay in a lower ring dimension while
still retaining close to the maximum precision.
REFERENCES
Ahmad Al Badawi, Jack Bates, Flavio Bergamaschi, David
Bruce Cousins, Saroja Erabelli, Nicholas Genise,
Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo
Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy
Polyakov, Saraswathy R.V., Kurt Rohloff, Jonathan
Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod
Vaikuntanathan, and Vincent Zucca (2022). Openfhe:
Open-source fully homomorphic encryption library.
Albrecht, M., Chase, M., Chen, H., Ding, J., Goldwasser,
S., Gorbunov, S., Halevi, S., Hoffstein, J., Laine,
K., Lauter, K., Lokam, S., Micciancio, D., Moody,
D., Morrison, T., Sahai, A., and Vaikuntanathan, V.
(2019). Homomorphic encryption standard. Cryptol-
ogy ePrint Archive, Paper 2019/939.
Albrecht, M. R., Player, R., and Scott, S. (2015). On the
concrete hardness of learning with errors. Journal of
Mathematical Cryptology, 9(3):169–203.
Badawi, A. A., Alexandru, A., Bates, J., Bergamaschi, F.,
Cousins, D. B., Erabelli, S., Genise, N., Halevi, S.,
Hunt, H., Kim, A., Lee, Y., Liu, Z., Micciancio, D.,
Pascoe, C., Polyakov, Y., Quah, I., R.V., S., Rohloff,
K., Saylor, J., Suponitsky, D., Triplett, M., Vaikun-
tanathan, V., and Zucca, V. (2022). OpenFHE: Open-
source fully homomorphic encryption library. Cryp-
tology ePrint Archive, Paper 2022/915.
Blatt, M., Gusev, A., Polyakov, Y., Rohloff, K., and Vaikun-
tanathan, V. (2020). Optimized homomorphic en-
cryption solution for secure genome-wide association
studies. BMC Medical Genomics, 13:1–13.
Bossuat, J.-P., Cammarota, R., Cheon, J. H., Chillotti, I.,
Curtis, B. R., Dai, W., Gong, H., Hales, E., Kim, D.,
Kumara, B., Lee, C., Lu, X., Maple, C., Pedrouzo-
Ulloa, A., Player, R., Lopez, L. A. R., Song, Y., Yhee,
D., and Yildiz, B. (2024). Security guidelines for
implementing homomorphic encryption. Cryptology
ePrint Archive, Paper 2024/463.
Cheon, J. H., Han, K., Kim, A., Kim, M., and Song, Y.
(2019). A full RNS variant of approximate homomor-
phic encryption. In Selected Areas in Cryptography–
SAC 2018: 25th International Conference, Calgary,
AB, Canada, pages 347–368. Springer.
Cheon, J. H., Kim, A., Kim, M., and Song, Y. (2017). Ho-
momorphic encryption for arithmetic of approximate
numbers. In Advances in Cryptology–ASIACRYPT
2017: 23rd International Conference on the Theory
and Applications of Cryptology and Information Se-
curity, Hong Kong, China, pages 409–437. Springer.
Chowdhary, S., Dai, W., Laine, K., and Saarikivi, O. (2021).
Eva improved: Compiler and extension library for
ckks. In Proceedings of the 9th on Workshop on En-
crypted Computing & Applied Homomorphic Cryp-
tography, pages 43–55.
Halevi, S. and Shoup, V. (2020). Design and implemen-
tation of HElib: a homomorphic encryption library.
Cryptology ePrint Archive, Paper 2020/1481.
Kim, A., Papadimitriou, A., and Polyakov, Y. (2022). Ap-
proximate homomorphic encryption with reduced ap-
proximation error. In Galbraith, S. D., editor, Topics in
Cryptology – CT-RSA 2022, Security and Cryptology,
pages 120–144.
OpenFHE (2024). Security notes for homomorphic encryp-
tion. https://openfhe-development.readthedocs.io/en/
latest/sphinx rsts/intro/security.html.
Towards Efficient Cloud Data Processing: A Comprehensive Guide to CKKS Parameter Selection
509