Paper 2024/1014

Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS

Jung Hee Cheon, Seoul National University, CryptoLab Inc.
Hyeongmin Choe, Seoul National University
Minsik Kang, Seoul National University
Jaehyung Kim, Stanford University, CryptoLab Inc.
Seonghak Kim, CryptoLab Inc.
Johannes Mono, Ruhr University Bochum, CryptoLab Inc.
Taeyeong Noh, CryptoLab Inc.
Abstract

The CKKS Fully Homomorphic Encryption (FHE) scheme enables approximate arithmetic on encrypted complex numbers for a desired precision. Most implementations use RNS with carefully chosen parameters to balance precision, efficiency, and security. However, a key limitation in RNS-CKKS is the rigid coupling between the scale factor, which determines numerical precision, and the modulus, which ensures security. Since these parameters serve distinct roles—one governing arithmetic correctness and the other defining cryptographic structure—this dependency imposes design constraints, such as a lack of suitable NTT primes and limited precision flexibility, ultimately leading to inefficiencies. We propose Grafting, a novel approach to decouple scale factors from the modulus by introducing (universal) sprouts, reusable modulus factors that optimize word-sized packing while allowing flexible rescaling. With the universal property, sprouts allow rescaling by arbitrary bit-lengths and key-switching at any modulus bit-length without requiring additional key-switching keys. Decoupling the scale factor from the modulus in Grafting yields significant efficiency gains: (1) Optimized RNS packing by decomposing the modulus into machine word-sized components, accelerating computations and reducing the ciphertext and encryption/evaluation key sizes; and (2) A freely adjustable scale factor independent of the modulus, unifying the ring structure across applications and reducing modulus consumption through adaptive scalings. Our experiments demonstrate that Grafting improves performance across standard SHE/FHE parameter sets for ring dimensions $2^{14}$-$2^{16}$ by up to $1.83\times$ and $2.01\times$ for key-switchings and multiplications, respectively, and up to $1.92\times$ for bootstrapping. Grafting also reduces public key and ciphertext sizes by up to $62\%$ without compressions, maintaining the same number of public keys as before. As an application, we showcase the CKKS gate bootstrapping for bits (Bae et al.; Eurocrypt'24), achieving $1.89\times$ speed-up due to the reduced number of RNS factors. Finally, we revisit the homomorphic comparison (Cheon et al.; Asiacrypt'20), evaluating it with carefully chosen scale factors for each iteration, reporting up to $204$-bit fewer modulus consumption ($27\%$ reduction) in the standard parameter set, without precision loss.

Note: The title and the paper is updated, with applications.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Homomorphic EncryptionCKKSResidue Number SystemBootstrapping
Contact author(s)
jhcheon @ snu ac kr
hyeongmin choe528 @ gmail com
kaiser351 @ snu ac kr
jaehyungkim @ cryptolab co kr
ksh @ cryptolab co kr
johannes mono @ rub de
tynoh0219 @ cryptolab co kr
History
2025-04-18: last of 3 revisions
2024-06-24: received
See all versions
Short URL
https://ia.cr/2024/1014
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1014,
      author = {Jung Hee Cheon and Hyeongmin Choe and Minsik Kang and Jaehyung Kim and Seonghak Kim and Johannes Mono and Taeyeong Noh},
      title = {Grafting: Decoupled Scale Factors and Modulus in {RNS}-{CKKS}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1014},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1014}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.