tfhe 1.3.3 → 1.4.0-alpha.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -6
- package/package.json +1 -1
- package/tfhe.d.ts +2468 -2195
- package/tfhe.js +6767 -6474
- package/tfhe_bg.wasm +0 -0
package/README.md
CHANGED
|
@@ -45,7 +45,7 @@ production-ready library for all the advanced features of TFHE.
|
|
|
45
45
|
- **Short integer API** that enables exact, unbounded FHE integer arithmetics with up to 8 bits of message space
|
|
46
46
|
- **Size-efficient public key encryption**
|
|
47
47
|
- **Ciphertext and server key compression** for efficient data transfer
|
|
48
|
-
- **Full Rust API, C bindings to the Rust High-Level API, and client-side
|
|
48
|
+
- **Full Rust API, C bindings to the Rust High-Level API, and client-side JavaScript API using WASM**.
|
|
49
49
|
|
|
50
50
|
*Learn more about TFHE-rs features in the [documentation](https://docs.zama.ai/tfhe-rs/readme).*
|
|
51
51
|
<br></br>
|
|
@@ -79,7 +79,7 @@ tfhe = { version = "*", features = ["boolean", "shortint", "integer"] }
|
|
|
79
79
|
```
|
|
80
80
|
|
|
81
81
|
> [!Note]
|
|
82
|
-
> Note: You need
|
|
82
|
+
> Note: You need Rust version 1.84 or newer to compile TFHE-rs. You can check your version with `rustc --version`.
|
|
83
83
|
|
|
84
84
|
> [!Note]
|
|
85
85
|
> Note: AArch64-based machines are not supported for Windows as it's currently missing an entropy source to be able to seed the [CSPRNGs](https://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator) used in TFHE-rs.
|
|
@@ -147,7 +147,7 @@ To run this code, use the following command:
|
|
|
147
147
|
|
|
148
148
|
> [!Note]
|
|
149
149
|
> Note that when running code that uses `TFHE-rs`, it is highly recommended
|
|
150
|
-
to run in release mode with cargo's `--release` flag to have the best
|
|
150
|
+
to run in release mode with cargo's `--release` flag to have the best performance possible.
|
|
151
151
|
|
|
152
152
|
*Find an example with more explanations in [this part of the documentation](https://docs.zama.ai/tfhe-rs/get-started/quick-start)*
|
|
153
153
|
|
|
@@ -201,11 +201,9 @@ When a new update is published in the Lattice Estimator, we update parameters ac
|
|
|
201
201
|
|
|
202
202
|
### Security model
|
|
203
203
|
|
|
204
|
-
By default, the parameter sets used in the High-Level API
|
|
204
|
+
By default, the parameter sets used in the High-Level API have a failure probability $\le 2^{-128}$ to securely work in the IND-CPA^D model using the algorithmic techniques provided in our code base [1].
|
|
205
205
|
If you want to work within the IND-CPA security model, which is less strict than the IND-CPA-D model, the parameter sets can easily be changed and would have slightly better performance. More details can be found in the [TFHE-rs documentation](https://docs.zama.ai/tfhe-rs).
|
|
206
206
|
|
|
207
|
-
The default parameters used in the High-Level API with the GPU backend are chosen considering the IND-CPA security model, and are selected with a bootstrapping failure probability fixed at $p_{error} \le 2^{-64}$. In particular, it is assumed that the results of decrypted computations are not shared by the secret key owner with any third parties, as such an action can lead to leakage of the secret encryption key. If you are designing an application where decryptions must be shared, you will need to craft custom encryption parameters which are chosen in consideration of the IND-CPA^D security model [2].
|
|
208
|
-
|
|
209
207
|
[1] Bernard, Olivier, et al. "Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes". https://eprint.iacr.org/2024/1718.pdf
|
|
210
208
|
|
|
211
209
|
[2] Li, Baiyu, et al. "Securing approximate homomorphic encryption using differential privacy." Annual International Cryptology Conference. Cham: Springer Nature Switzerland, 2022. https://eprint.iacr.org/2022/816.pdf
|
package/package.json
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
"name": "tfhe",
|
|
3
3
|
"type": "module",
|
|
4
4
|
"description": "TFHE-rs is a fully homomorphic encryption (FHE) library that implements Zama's variant of TFHE.",
|
|
5
|
-
"version": "1.
|
|
5
|
+
"version": "1.4.0-alpha.1",
|
|
6
6
|
"license": "BSD-3-Clause-Clear",
|
|
7
7
|
"repository": {
|
|
8
8
|
"type": "git",
|