1 unstable release
Uses new Rust 2024
| new 0.3.1 | Oct 24, 2025 |
|---|---|
| 0.3.0 |
|
| 0.2.2 |
|
| 0.1.2 |
|
#1283 in Cryptography
199 downloads per month
Used in poulpy-schemes
2.5MB
62K
SLoC
🐙 Poulpy-Core
Poulpy-Core is a Rust crate built on poulpy-hal, providing scheme- and backend-agnostic RLWE-based homomorphic encryption building blocks.
Getting Started
use poulpy_backend::cpu_spqlios::FFT64;
use poulpy_core::{
GLWEOperations, SIGMA,
layouts::{
GLWECiphertext, GLWEPlaintext, GLWESecret, Infos,
prepared::{GLWESecretPrepared, PrepareAlloc},
},
};
use poulpy_hal::{
api::{ModuleNew, ScratchOwnedAlloc, ScratchOwnedBorrow, VecZnxFillUniform},
layouts::{Module, ScratchOwned},
source::Source,
};
fn main() {
// Ring degree
let log_n: usize = 10;
let n: usize = 1<<log_n;
// Base-2-k (implicit digit decomposition)
let base2k: usize = 14;
// Ciphertext Torus precision (equivalent to ciphertext modulus)
let k_ct: usize = 27;
// Plaintext Torus precision (equivament to plaintext modulus)
let k_pt: usize = base2k;
// GLWE rank
let rank: usize = 1;
// Instantiate Module (DFT Tables)
let module: Module<FFT64> = Module::<FFT64>::new(n as u64);
// Allocates ciphertext & plaintexts
let mut ct: GLWECiphertext<Vec<u8>> = GLWECiphertext::alloc(n, base2k, k_ct, rank);
let mut pt_want: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc(n, base2k, k_pt);
let mut pt_have: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc(n, base2k, k_pt);
// CPRNG
let mut source_xs: Source = Source::new([0u8; 32]);
let mut source_xe: Source = Source::new([1u8; 32]);
let mut source_xa: Source = Source::new([2u8; 32]);
// Scratch space
let mut scratch: ScratchOwned<FFT64> = ScratchOwned::alloc(
GLWECiphertext::encrypt_sk_tmp_bytes(&module, n, base2k, ct.k())
| GLWECiphertext::decrypt_tmp_bytes(&module, n, base2k, ct.k()),
);
// Generate secret-key
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc(n, rank);
sk.fill_ternary_prob(0.5, &mut source_xs);
// Backend-prepared secret
let sk_prepared: GLWESecretPrepared<Vec<u8>, FFT64> = sk.prepare_alloc(&module, scratch.borrow());
// Uniform plaintext
module.vec_znx_fill_uniform(base2k, &mut pt_want.data, 0, k_pt, &mut source_xa);
// Encryption
ct.encrypt_sk(
&module,
&pt_want,
&sk_prepared,
&mut source_xa,
&mut source_xe,
scratch.borrow(),
);
// Decryption
ct.decrypt(&module, &mut pt_have, &sk_prepared, scratch.borrow());
// Diff between pt - Dec(Enc(pt))
pt_want.sub_inplace_ab(&module, &pt_have);
// Ideal vs. actual noise
let noise_have: f64 = pt_want.data.std(base2k, 0) * (ct.k() as f64).exp2();
let noise_want: f64 = SIGMA;
// Check
assert!(noise_have <= noise_want + 0.2);
}
Layouts
This crate defines three categories of layouts for LWE, GLWE, GGLWE, and GGSW objects (and their derivatives), all instantiated using poulpy-hal layouts. Each serves a distinct purpose:
- Standard → Front-end, serializable layouts. These are backend-agnostic and act as inputs/outputs of computations (e.g.,
GGLWEAutomorphismKey). - Compressed → Compact serializable variants of the standard layouts. They are not usable for computation but significantly reduce storage size (e.g.,
GGLWEAutomorphismKeyCompressed). - Prepared → Backend-optimized, opaque layouts used only for computation (write-only). These store preprocessed data for efficient execution on a specific backend (e.g.,
GGLWEAutomorphismKeyPrepared).
All standard and compressed layouts implement the WriterTo and ReaderFrom traits, enabling straightforward serialization/deserialization with any type implementing Write or Read:
pub trait WriterTo {
fn write_to<W: Write>(&self, writer: &mut W) -> Result<()>;
}
pub trait ReaderFrom {
fn read_from<R: Read>(&mut self, reader: &mut R) -> Result<()>;
}
Example Workflow
flowchart TD
A[GGLWEAutomorphismKeyCompressed]-->|decompress|B[GGLWEAutomorphismKey]-->|prepare|C[GGLWEAutomorphismKeyPrepared]
Equivalent Rust:
let mut atk_compressed: GGLWEAutomorphismKeyCompressed<Vec<u8>> =
GGLWEAutomorphismKeyCompressed::alloc(...);
let mut atk: GGLWEAutomorphismKey<Vec<u8>> =
GGLWEAutomorphismKey::alloc(...);
atk.decompress(module, &atk_compressed);
let mut atk_prep: GGLWEAutomorphismKeyPrepared<Vec<u8>, B> = GLWESecretPrepared<Vec<u8>, B> = atk.prepare_alloc(...);
Encryption & Decryption
- Encryption → Supported for all standard and compressed layouts.
- Decryption → Only directly available for
LWECiphertextandGLWECiphertext. However, it remains naturally usable onGGLWEandGGSWobjects, since these are vectors/matrices ofGLWECiphertext.
let mut atk: GGLWEAutomorphismKey<Vec<u8>> =
GGLWEAutomorphismKey::alloc(...);
atk.encrypt_sk(...);
atk.at(row, 0).decrypt(...);
Keyswitching, Automorphism & External Product
Keyswitching, automorphisms, and external products are supported for all ciphertext types where they are well-defined.
This includes subtypes such as GGLWEAutomorphismKey.
For example:
atk.external_product(...);
ggsw.automorphism(...);
Additional Features
- Ciphertexts:
LWEandGLWE GLWEring packingGLWEtrace- Noise analysis for
GLWE,GGLWE,GGSW - Basic operations over
GLWEciphertexts and plaintexts
Tests
A fully generic test suite is available in src/tests/generics.
Dependencies
~12–18MB
~327K SLoC