
Research Article
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
@INPROCEEDINGS{10.1007/978-3-031-25538-0_18, author={Jonathan Takeshita and Zachariah Carmichael and Ryan Karl and Taeho Jung}, title={TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation}, proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, proceedings_a={SECURECOMM}, year={2023}, month={2}, keywords={Public key cryptosystems Lattice-based cryptography Private Stream Aggregation}, doi={10.1007/978-3-031-25538-0_18} }
- Jonathan Takeshita
Zachariah Carmichael
Ryan Karl
Taeho Jung
Year: 2023
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
SECURECOMM
Springer
DOI: 10.1007/978-3-031-25538-0_18
Abstract
The massive scale and performance demands of privacy-preserving data aggregation make integration of security and privacy difficult. Traditional tools in private computing are not well-suited to handle these challenges, especially for more limited client devices. Efficient primitives and protocols for secure and private data aggregation are a promising approach for private data analytics with resource-constrained devices. However, even such efficient primitives may be much slower than computation with plain data (i.e., without security/privacy guarantees).
In this paper, we present TERSE, a new Private Stream Aggregation (PSA) protocol for quantum-secure time-series additive data aggregation. Due to its simplicity, low latency, and low communication overhead, TERSE is uniquely well-suited for real-world deployment. In our implementation, TERSE shows very low latency for both clients and servers, achieving encryption latency on a smartphone of 0.0003 ms and aggregation latency of 0.0067 ms for 1000 users. TERSE also shows significant improvements in latency over other state-of-the-art quantum-secure PSA, achieving improvements of 1796(\times )to 12406(\times )for encryption at the client’s end and 848(\times )to 5433(\times )for aggregation and decryption at the server’s end.