tfhe 1.3.3 → 1.4.0-alpha.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (5) hide show
  1. package/README.md +4 -6
  2. package/package.json +1 -1
  3. package/tfhe.d.ts +2468 -2195
  4. package/tfhe.js +6767 -6474
  5. package/tfhe_bg.wasm +0 -0
package/README.md CHANGED
@@ -45,7 +45,7 @@ production-ready library for all the advanced features of TFHE.
45
45
  - **Short integer API** that enables exact, unbounded FHE integer arithmetics with up to 8 bits of message space
46
46
  - **Size-efficient public key encryption**
47
47
  - **Ciphertext and server key compression** for efficient data transfer
48
- - **Full Rust API, C bindings to the Rust High-Level API, and client-side Javascript API using WASM**.
48
+ - **Full Rust API, C bindings to the Rust High-Level API, and client-side JavaScript API using WASM**.
49
49
 
50
50
  *Learn more about TFHE-rs features in the [documentation](https://docs.zama.ai/tfhe-rs/readme).*
51
51
  <br></br>
@@ -79,7 +79,7 @@ tfhe = { version = "*", features = ["boolean", "shortint", "integer"] }
79
79
  ```
80
80
 
81
81
  > [!Note]
82
- > Note: You need to use Rust version >= 1.84 to compile TFHE-rs.
82
+ > Note: You need Rust version 1.84 or newer to compile TFHE-rs. You can check your version with `rustc --version`.
83
83
 
84
84
  > [!Note]
85
85
  > Note: AArch64-based machines are not supported for Windows as it's currently missing an entropy source to be able to seed the [CSPRNGs](https://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator) used in TFHE-rs.
@@ -147,7 +147,7 @@ To run this code, use the following command:
147
147
 
148
148
  > [!Note]
149
149
  > Note that when running code that uses `TFHE-rs`, it is highly recommended
150
- to run in release mode with cargo's `--release` flag to have the best performances possible.
150
+ to run in release mode with cargo's `--release` flag to have the best performance possible.
151
151
 
152
152
  *Find an example with more explanations in [this part of the documentation](https://docs.zama.ai/tfhe-rs/get-started/quick-start)*
153
153
 
@@ -201,11 +201,9 @@ When a new update is published in the Lattice Estimator, we update parameters ac
201
201
 
202
202
  ### Security model
203
203
 
204
- By default, the parameter sets used in the High-Level API with the x86 CPU backend have a failure probability $\le 2^{128}$ to securely work in the IND-CPA^D model using the algorithmic techniques provided in our code base [1].
204
+ By default, the parameter sets used in the High-Level API have a failure probability $\le 2^{-128}$ to securely work in the IND-CPA^D model using the algorithmic techniques provided in our code base [1].
205
205
  If you want to work within the IND-CPA security model, which is less strict than the IND-CPA-D model, the parameter sets can easily be changed and would have slightly better performance. More details can be found in the [TFHE-rs documentation](https://docs.zama.ai/tfhe-rs).
206
206
 
207
- The default parameters used in the High-Level API with the GPU backend are chosen considering the IND-CPA security model, and are selected with a bootstrapping failure probability fixed at $p_{error} \le 2^{-64}$. In particular, it is assumed that the results of decrypted computations are not shared by the secret key owner with any third parties, as such an action can lead to leakage of the secret encryption key. If you are designing an application where decryptions must be shared, you will need to craft custom encryption parameters which are chosen in consideration of the IND-CPA^D security model [2].
208
-
209
207
  [1] Bernard, Olivier, et al. "Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes". https://eprint.iacr.org/2024/1718.pdf
210
208
 
211
209
  [2] Li, Baiyu, et al. "Securing approximate homomorphic encryption using differential privacy." Annual International Cryptology Conference. Cham: Springer Nature Switzerland, 2022. https://eprint.iacr.org/2022/816.pdf
package/package.json CHANGED
@@ -2,7 +2,7 @@
2
2
  "name": "tfhe",
3
3
  "type": "module",
4
4
  "description": "TFHE-rs is a fully homomorphic encryption (FHE) library that implements Zama's variant of TFHE.",
5
- "version": "1.3.3",
5
+ "version": "1.4.0-alpha.1",
6
6
  "license": "BSD-3-Clause-Clear",
7
7
  "repository": {
8
8
  "type": "git",