HOME

TheInfoList



OR:

PALISADE is an
open-source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
cross platform In computing, cross-platform software (also called multi-platform software, platform-agnostic software, or platform-independent software) is computer software that is designed to work in several computing platforms. Some cross-platform software r ...
software library that provides implementations of lattice cryptography building blocks and
homomorphic encryption Homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without first decrypting it. These resulting computations are left in an encrypted form which, when decrypted, result in an identical ...
schemes.


History

PALISADE adopted the open modular design principles of the predecessor SIPHER software library from the
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
PROCEED program. SIPHER development began in 2010, with a focus on modular open design principles to support rapid application deployment over multiple FHE schemes and hardware accelerator back-ends, including on mobile, FPGA and CPU-based computing systems. PALISADE began building from earlier SIPHER designs in 2014, with an open-source release in 2017 and substantial improvements every subsequent 6 months. PALISADE development was funded originally by the
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
PROCEED and SafeWare programs, with subsequent improvements funded by additional
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
programs, IARPA, the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
, NIH, ONR, the
United States Navy The United States Navy (USN) is the maritime service branch of the United States Armed Forces and one of the eight uniformed services of the United States. It is the largest and most powerful navy in the world, with the estimated tonnage ...
, the
Sloan Foundation The Alfred P. Sloan Foundation is an American philanthropic nonprofit organization. It was established in 1934 by Alfred P. Sloan Jr., then-president and chief executive officer of General Motors. The Sloan Foundation makes grants to support or ...
and commercial entities such as Duality Technologies. PALISADE has subsequently been used in commercial offerings, such as by Duality Technologies who raised funding in a Seed round and a later Series A round led by Intel Capital. In 2022 OpenFHE was released as a fork that also implements CKKS bootstrapping.


Features

PALISADE includes the following features: * Post-quantum public-key encryption * Fully
homomorphic encryption Homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without first decrypting it. These resulting computations are left in an encrypted form which, when decrypted, result in an identical ...
(FHE) ** Brakerski/Fan-Vercauteren (BFV) scheme Z. Brakerski
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
In ''CRYPTO 2012'' (Springer)
for integer arithmetic with
RNS RNS may be an initialism for: *Rabid Neurosis, a music piracy organisation * RNS formalism in the string theory of physics *Reactive nitrogen species *Regulatory News Service *Religion News Service * Rennes - Saint-Jacques Airport, France, IATA co ...
optimizationsBajard JC., Eynard J., Hasan M.A., Zucca V
A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes
In ''SAC 2016'' (Springer)
Halevi S., Polyakov Y., Shoup V
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
In ''CT-RSA 2019'' (Springer)
** Brakerski-Gentry-Vaikuntanathan (BGV) schemeZ. Brakerski, C. Gentry, and V. Vaikuntanathan
Fully Homomorphic Encryption without Bootstrapping
In ''ITCS 2012''
for integer arithmetic with
RNS RNS may be an initialism for: *Rabid Neurosis, a music piracy organisation * RNS formalism in the string theory of physics *Reactive nitrogen species *Regulatory News Service *Religion News Service * Rennes - Saint-Jacques Airport, France, IATA co ...
optimizations ** Cheon-Kim-Kim-Song (CKKS) scheme for real-number arithmetic with
RNS RNS may be an initialism for: *Rabid Neurosis, a music piracy organisation * RNS formalism in the string theory of physics *Reactive nitrogen species *Regulatory News Service *Religion News Service * Rennes - Saint-Jacques Airport, France, IATA co ...
optimizations M. Blatt, A. Gusev, Y. Polyakov, K. Rohloff, and V. Vaikuntanathan
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
2019
Han K. and Ki D.
Better Bootstrapping for Approximate Homomorphic Encryption
In ''CT-RSA 2020''
** Ducas-Micciancio (FHEW) scheme for Boolean circuit evaluation with optimizationsD. Micciancio and Y. Polyakov
Bootstrapping in FHEW-like Cryptosystems
2020
** Chillotti-Gama-Georgieva-Izabachene (TFHE) scheme for Boolean circuit evaluation with extensions * Multiparty extensions of FHE ** Threshold FHE for BGV, BFV, and CKKS schemes **
Proxy re-encryption Proxy re-encryption (PRE) schemes are cryptosystems which allow third parties ( proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another. Examples of use A proxy re-encryption is generally used w ...
for BGV, BFV, and CKKS schemes * Digital signatureGentry C., Peikert C., Vaikuntanathan V
Trapdoors for Hard Lattices and New Cryptographic Constructions
In ''STOC 2008''
* Identity-based encryption * Ciphertext-policy attribute-based encryption


Availability

There are several known git repositories/ports for PALISADE:


C++


PALISADE Stable Release
(official stable release repository)
PALISADE Preview Release
(official development/preview release repository)
PALISADE Digital Signature Extensions

PALISADE Attribute-Based Encryption Extensions
(includes identity-based encryption and ciphertext-policy attribute-based encryption)


JavaScript / WebAssembly


PALISADE WebAssembly
(official WebAssembly port)


Python


Python Demos
(official Python demos)


FreeBSD


PALISADE
(FreeBSD port)


References

{{reflist Homomorphic encryption Cryptographic software Free and open-source software Software using the BSD license Free software programmed in C++