mirror of
https://github.com/zama-ai/tfhe-rs.git
synced 2026-01-09 14:47:56 -05:00
docs: add noise squashing documentation
This commit is contained in:
@@ -52,6 +52,7 @@
|
||||
* [Trivial ciphertexts](fhe-computation/advanced-features/trivial_ciphertext.md)
|
||||
* [Zero-knowledge proofs](fhe-computation/advanced-features/zk-pok.md)
|
||||
* [Multi-threading with Rayon crate](fhe-computation/advanced-features/rayon_crate.md)
|
||||
* [Noise squashing](fhe-computation/advanced-features/noise-squashing.md)
|
||||
* [Tooling](fhe-computation/tooling/README.md)
|
||||
* [PBS statistics](fhe-computation/tooling/pbs-stats.md)
|
||||
* [Generic trait bounds](fhe-computation/tooling/trait_bounds.md)
|
||||
|
||||
@@ -0,0 +1,65 @@
|
||||
# Noise squashing
|
||||
|
||||
In the context of confidential blockchain protocols, like the [Zama protocol](https://docs.zama.ai/protocol), for security reasons the threshold decryption requires to hide the intrinsic noise of FHE operations. This can be achieved by the MPC nodes by adding large amounts of random noise before they perform the actual decryption. In order to have enough room for that large noise that needs to be added before decryption, the noise squashing operation is performed.
|
||||
|
||||
**TFHE-rs**' High Level API provides APIs to do just that, here is how one would use those primitives:
|
||||
|
||||
```rust
|
||||
use tfhe::prelude::*;
|
||||
use tfhe::shortint::parameters::{
|
||||
NOISE_SQUASHING_PARAM_MESSAGE_2_CARRY_2_KS_PBS_TUNIFORM_2M128,
|
||||
PARAM_MESSAGE_2_CARRY_2_KS_PBS_TUNIFORM_2M128,
|
||||
};
|
||||
use tfhe::*;
|
||||
|
||||
// We use an identity function to verify FHE operations, it is fine in this context
|
||||
#[allow(clippy::eq_op)]
|
||||
pub fn main() {
|
||||
// Configure computations enabling the noise squashing capability.
|
||||
let config =
|
||||
ConfigBuilder::with_custom_parameters(PARAM_MESSAGE_2_CARRY_2_KS_PBS_TUNIFORM_2M128)
|
||||
.enable_noise_squashing(NOISE_SQUASHING_PARAM_MESSAGE_2_CARRY_2_KS_PBS_TUNIFORM_2M128)
|
||||
.build();
|
||||
|
||||
// Generate the keys
|
||||
let (cks, sks) = generate_keys(config);
|
||||
|
||||
// Set the key once for our various examples
|
||||
set_server_key(sks);
|
||||
|
||||
// FheUint32 case
|
||||
let clear: u32 = 42;
|
||||
// Encrypt
|
||||
let enc = FheUint32::encrypt(clear, &cks);
|
||||
// Simulate a bitand on the blockchain
|
||||
let bitand = &enc & &enc;
|
||||
// Perform the noise squashing
|
||||
let squashed = bitand.squash_noise().unwrap();
|
||||
|
||||
// We don't perform the noise flooding, but here verify that the noise squashing preserves our
|
||||
// data
|
||||
let recovered: u32 = squashed.decrypt(&cks);
|
||||
|
||||
assert_eq!(clear, recovered);
|
||||
|
||||
// FheInt16 case
|
||||
let clear: i16 = -42;
|
||||
let enc = FheInt10::encrypt(clear, &cks);
|
||||
let bitand = &enc & &enc;
|
||||
let squashed = bitand.squash_noise().unwrap();
|
||||
|
||||
let recovered: i16 = squashed.decrypt(&cks);
|
||||
assert_eq!(clear, recovered);
|
||||
|
||||
// Boolean case
|
||||
for clear in [false, true] {
|
||||
let enc = FheBool::encrypt(clear, &cks);
|
||||
let bitand = &enc & &enc;
|
||||
let squashed = bitand.squash_noise().unwrap();
|
||||
|
||||
let recovered: bool = squashed.decrypt(&cks);
|
||||
assert_eq!(clear, recovered);
|
||||
}
|
||||
}
|
||||
|
||||
```
|
||||
@@ -22,6 +22,10 @@ mod test_cpu_doc {
|
||||
"../docs/fhe-computation/advanced-features/encrypted-prf.md",
|
||||
advanced_features_encrypted_prf
|
||||
);
|
||||
doctest!(
|
||||
"../docs/fhe-computation/advanced-features/noise-squashing.md",
|
||||
advanced_features_noise_squashing
|
||||
);
|
||||
doctest!(
|
||||
"../docs/fhe-computation/advanced-features/overflow_operations.md",
|
||||
advanced_features_overflow_operations
|
||||
|
||||
Reference in New Issue
Block a user