Hardware assisted fully homomorphic function evaluation and encrypted search

Sujoy Sinha Roy, Frederik Vercauteren, Jo Vliegen, Ingrid Verbauwhede

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)
292 Downloads (Pure)


In this paper we propose a scheme to perform homomorphic evaluations of arbitrary depth with the assistance of a special module recryption box. Existing somewhat homomorphic encryption schemes can only perform homomorphic operations until the noise in the ciphertexts reaches a critical bound depending on the parameters of the homomorphic encryption scheme. The classical approach of bootstrapping also allows for arbitrary depth evaluations, but has a detrimental impact on the size of the parameters, making the whole setup inefficient. We describe two different instantiations of our recryption box for assisting homomorphic evaluations of arbitrary depth. The recryption box refreshes the ciphertexts by lowering the inherent noise and can be used with any instantiation of the parameters, i.e. there is no minimum size unlike bootstrapping. To demonstrate the practicality of the proposal, we design the recryption box on a Xilinx Virtex 6 FPGA board ML605 to support the FV somewhat homomorphic encryption scheme. The recryption box requires 0.43 ms to refresh one ciphertext. Further, we use this recryption box to boost the performance of encrypted search operation. On a 40 core Intel server, we can perform encrypted search in a table of 216 entries in around 20 seconds. This is roughly 20 times faster than the implementation without recryption box.
Original languageEnglish
Pages (from-to)1562-1572
JournalIEEE Transactions on Computers
Issue number9
Early online date22 Mar 2017
Publication statusPublished - 1 Sept 2017


  • Homomorphic encryption
  • FV
  • lattice-based cryptography
  • ring-LWE
  • polynomial multiplication
  • number theoretic transform
  • hardware implementation


Dive into the research topics of 'Hardware assisted fully homomorphic function evaluation and encrypted search'. Together they form a unique fingerprint.

Cite this