Threshold Fully Homomorphic Encryption
- Threshold Fully Homomorphic Encryption (ThFHE) is a cryptographic scheme that distributes decryption keys among multiple parties, requiring a threshold subset to collaboratively decrypt data securely.
- It employs approximate secret sharing to manage decryption with bounded error, ensuring that error-smudged outputs maintain data integrity under noisy conditions.
- Efficient constructions like ATASSES reduce computational and communication overhead, making ThFHE practical for federated analytics and secure multi-party computation.
Threshold Fully Homomorphic Encryption (ThFHE) enables distributed decryption of fully homomorphic ciphertexts, requiring a minimum quorum of parties to collaborate in the decryption process. Unlike standard FHE, in which a single party holds the decryption key, ThFHE splits the key among parties, and only participation by a threshold subset allows successful decryption of evaluated ciphertexts. This construction preserves data confidentiality in collaborative settings and tolerates partial participation, making it central in privacy-preserving multi-party computation.
1. Distinction Between Full-Threshold and Arbitrary-Threshold ThFHE
In a T-out-of-N ThFHE scheme, each participant receives a key share , and ciphertexts are decryptable only if at least participants contribute. If , all participants must collaborate for decryption; this is referred to as full-threshold ThFHE. In practical settings, especially large-scale deployments, participants may be offline, fail, or decline to participate. Arbitrary-threshold ThFHE (AThFHE) extends the primitive by allowing the threshold parameter to be flexibly chosen at decryption time, permitting any subset of size at least to reconstruct the plaintext. This robustness to non-participants is essential for federated analytics or secure aggregation under dropout scenarios (Chang et al., 20 Jan 2025).
2. Approximate Secret Sharing: Foundational Primitive
Approximate Secret Sharing (ApproxSS) is introduced as a core abstraction to capture the decryption and error-smudging process fundamental to ThFHE. In a T-out-of-N ApproxSS scheme, a message is shared into shares , and any subset of the parties can collaboratively approximate within a bounded error set . The recovery protocol outputs such that . Security requires that any adversary corrupting up to parties learns only a noisy version where is sampled from the prescribed noise distribution , even after full transcript exposure. This abstraction allows generic reduction of the AThFHE construction to the existence of suitable ApproxSS schemes and reveals that decryption in ThFHE is fundamentally a noisy secret-sharing reconstruction problem (Chang et al., 20 Jan 2025).
3. Construction and Reduction: From ApproxSS to ThFHE
The reduction from ApproxSS to ThFHE is explicit for ring-LWE-based FHE schemes (e.g., BFV). Key generation involves each party generating a local FHE secret key and joint construction of public keys for homomorphic evaluation. Each is itself secret-shared among all parties. To decrypt a ciphertext , the protocol proceeds as follows:
- Each of the participants computes locally.
- The aggregator and the parties execute to recover up to bounded error.
- If the cumulative noise is below the decoding threshold determined by the FHE parameters, the plaintext message can be recovered (Chang et al., 20 Jan 2025).
This approach delivers correctness (Theorem 2.4) and security (Theorem 2.5) so long as the ApproxSS primitive satisfies linearity, error-bounded correctness, and (T-1)-privacy amplified with approximate security using the noise distribution .
4. ATASSES: Efficient Arbitrary-Threshold ApproxSS
The ATASSES scheme is introduced as an efficient ATh-ApproxSS realization that overcomes performance bottlenecks in prior constructions. Previous methods, which rely on noisy-share addition and computation of Lagrange coefficients, face share-size blowup and cost per party for large and . ATASSES introduces an encrypted share approach using small-modulus BFV secret-key encryption:
- Each participant generates Shamir shares for the target value and random smudging noise .
- For every block of the share/noise, two secret keys are generated, each Shamir-shared across all parties. The shares are encrypted as and , where are public parameters.
- The aggregator reconstructs collective encryption and then decrypts to recover perturbed by the sum of smudging noises.
This design enables the computation (per party) and communication complexity of ATASSES to be reduced to and , respectively, a substantial asymptotic improvement compared to the and bounds of prior schemes (Chang et al., 20 Jan 2025).
| Scheme | Communication per Party | Computation per Party | Rounds |
|---|---|---|---|
| {0,1}-ApproxSS | 1 | ||
| Type-1 Shamir | 1 | ||
| Type-2 Shamir | 2 | ||
| Type-3 Shamir | 1 (fixed -set) | ||
| ATASSES | 2 |
The proof of correctness leverages linearity properties of both the underlying secret sharing and the SK-encryption, while the RLWE assumption underpins security: leakage is bounded to a random noisy shift (Chang et al., 20 Jan 2025).
5. Empirical Evaluation and Performance
The empirical analysis is based on implementations using the Go Lattigo library (BFV SK-encryption) with modern hardware (Apple M2 Pro) and 98 Mbps network bandwidth. Evaluation across and up to $20 M'$ (where is the slot-size) demonstrates that
- The running time of ATASSES grows mildly with and is dominated by key-share work for small , or block-encryption when .
- Prior one-round ApproxSS schemes become impractical for , and two-round Shamir variants are infeasible beyond .
- ATASSES maintains practical running times up to ; observed speedups at this scale reach – over prior two-round Shamir-based approaches, with the speedup increasing for larger .
Sample timings for :
| 5 | 10 | 15 | 20 | |
|---|---|---|---|---|
| Type-2 | 23.1s | 40.7s | 58.9s | 76.2s |
| ATASSES | 6.0s | 10.1s | 13.9s | 16.4s |
| Speedup | 3.85× | 4.03× | 4.24× | 4.65× |
Such empirical performance confirms the asymptotic improvements and scalability benefits of ATASSES, especially for large consortiums and batch sizes (Chang et al., 20 Jan 2025).
6. Applications, Limitations, and Future Directions
Scalable arbitrary-threshold ThFHE, as realized by ATASSES, unlocks use cases in federated learning, secure genomic computation, and distributed machine learning where client dropout or asynchrony is expected. The protocol's computational and communication complexity enables feasibility in deployments with thousands of participants.
ATASSES is currently semihonest-secure; the addition of verifiable secret sharing (such as via PELTA) and zero-knowledge proofs can upgrade security to the malicious model with moderate overhead. When , the double encryption per block constitutes the main computational overhead; further optimizations such as batching or employing shared-key FHE could reduce constants. ApproxSS generalizations to other rings and approximate-arithmetic settings (e.g., CKKS) remain open research avenues (Chang et al., 20 Jan 2025).
7. Connections with Quantum Threshold Homomorphic Encryption
Recent research extends the threshold paradigm to quantum homomorphic encryption schemes using quantum state sharing. In this setting, a -threshold quantum homomorphic encryption protocol allows any out of quantum evaluators to securely and collaboratively homomorphically evaluate a universal quantum circuit on encrypted input states. The security analysis establishes correctness, privacy against eavesdroppers, and resilience to up to colluding servers. The approach leverages classical and quantum secret sharing of rotation keys and partial decryptions, confirming the applicability of threshold techniques in both classical and quantum domains (Zhang et al., 26 Feb 2025).
A plausible implication is that the conceptual framework of Approximate Secret Sharing and threshold decryption—central to scalable classical ThFHE—may inform future developments in quantum homomorphic protocols, particularly where noise-tolerance or multiparty control over decryption is required.
References:
- "Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity" (Chang et al., 20 Jan 2025)
- "Universal quantum homomorphic encryption based on -threshold quantum state sharing" (Zhang et al., 26 Feb 2025)