Shortint
tfhe::shortint
is dedicated to the manipulation of small unsigned integers that fit in a single LWE ciphertext. The actual size depends on the chosen parameters, but is always smaller than 8 bits. For example, with the PARAM_MESSAGE_2_CARRY_2_KS_PBS
parameters, you can encode messages of 2 bits inside a shortint
.
The integer and high-level API leverage shortints to allow homomorphic computations over larger integers.
The steps to homomorphically evaluate a shortint
circuit are described below.
Key generation
tfhe::shortint
provides 3 key types:
ClientKey
ServerKey
PublicKey
The ClientKey
is the key that encrypts and decrypts messages (small integer values). It is meant to be kept private and should never be shared. This key is created from parameter values that will dictate both the security and efficiency of computations. The parameters also set the maximum number of bits of message encrypted in a ciphertext.
The ServerKey
is the key that is used to evaluate the FHE computations. Most importantly, it contains a bootstrapping key and a keyswitching key. This key is created from a ClientKey
that needs to be shared to the server (it is not meant to be kept private). A user with a ServerKey
can compute on the encrypted data sent by the owner of the associated ClientKey
.
Computation/operation methods are tied to the ServerKey
type.
The PublicKey
is the key used to encrypt messages. It can be publicly shared to allow users to encrypt data such that only the ClientKey
holder will be able to decrypt. Encrypting with the PublicKey
does not alter the homomorphic capabilities associated to the ServerKey
.
Encrypting values
Once the keys have been generated, the client key is used to encrypt data:
Encrypting values using a public key
Once the keys have been generated, the client key is used to encrypt data:
Computing and decrypting
Using the server_key
, addition is possible over encrypted values. The resulting plaintext is recovered after the decryption via the secret client key.
Last updated