On the Vulnerability of FHE Computation to Silent Data Corruption

📅 2026-03-24
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work presents the first systematic evaluation of the vulnerability of fully homomorphic encryption (FHE) to transient faults, which can induce silent data corruption (SDC) in real hardware. Due to the inherent inaccessibility of plaintext during encrypted computation, detecting such errors remains a significant challenge. Through large-scale fault injection experiments combined with theoretical analysis of error propagation, this study reveals the severity and propagation patterns of SDC in FHE ciphertext computations. The findings quantitatively demonstrate the high sensitivity of FHE schemes to transient faults, expose the limitations of existing fault-tolerance mechanisms in FHE contexts, and suggest concrete directions for improvement. This research addresses a critical gap in the reliability assessment of FHE systems, providing foundational insights for developing more resilient homomorphic computing frameworks.

Technology Category

Application Category

📝 Abstract
Fully Homomorphic Encryption (FHE) is rapidly emerging as a promising foundation for privacy-preserving cloud services, enabling computation directly on encrypted data. As FHE implementations mature and begin moving toward practical deployment in domains such as secure finance, biomedical analytics, and privacy-preserving AI, a critical question remains insufficiently explored: how reliable is FHE computation on real hardware? This question is especially important because, compared with plaintext computation, FHE incurs much higher computational overhead, making it more susceptible to transient hardware faults. Moreover, data corruptions are likely to remain silent: the FHE service has no access to the underlying plaintext, causing unawareness even though the corresponding decrypted result has already been corrupted. To this end, we conduct a comprehensive evaluation of SDCs in FHE ciphertext computation. Through large-scale fault-injection experiments, we characterize the vulnerability of FHE to transient faults, and through a theoretical analysis of error-propagation behaviors, we gain deeper algorithmic insight into the mechanisms underlying this vulnerability. We further assess the effectiveness of different fault-tolerance mechanisms for mitigating these faults.
Problem

Research questions and friction points this paper is trying to address.

Fully Homomorphic Encryption
Silent Data Corruption
Transient Faults
Hardware Reliability
Encrypted Computation
Innovation

Methods, ideas, or system contributions that make the work stand out.

Fully Homomorphic Encryption
Silent Data Corruption
Fault Injection
Error Propagation
Fault Tolerance
🔎 Similar Papers
No similar papers found.
Jianan Mu
Jianan Mu
Institute of Computing Technology, State Key Laboratory of Processors (SKLP), CAS
Design AutomationAccelaretorPrivacy Preserving Computing
G
Ge Yu
School of Advanced Interdisciplinary Sciences, University of Chinese Academy of Sciences, Beijing, China
Z
Zhaoxuan Kan
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
S
Song Bian
School of Cyber Science and Technology, Beihang University, Beijing, China
L
Liang Kong
Beijing, China
Z
Zizhen Liu
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
C
Cheng Liu
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
J
Jing Ye
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
Huawei Li
Huawei Li
Institute of Computing Technology, Chinese Academy of Sciences
computer engineering