12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758 |
- from openfhe import *
- ## Sample Program: Step 1: Set CryptoContext
- cc = BinFHEContext()
- """
- STD128 is the security level of 128 bits of security based on LWE Estimator
- and HE standard. Other common options are TOY, MEDIUM, STD192, and STD256.
- MEDIUM corresponds to the level of more than 100 bits for both quantum and
- classical computer attacks. The second argument is the bootstrapping method
- (AP or GINX). The default method is GINX. Here we explicitly set AP. GINX
- typically provides better performance: the bootstrapping key is much
- smaller in GINX (by 20x) while the runtime is roughly the same.
- """
- cc.GenerateBinFHEContext(STD128,AP)
- ## Sample Program: Step 2: Key Generation
- # Generate the secret key
- sk = cc.KeyGen()
- print("Generating the bootstrapping keys...\n")
- # Generate the bootstrapping keys (refresh and switching keys)
- cc.BTKeyGen(sk)
- print("Completed the key generation.\n")
- # Sample Program: Step 3: Encryption
- """
- Encrypt two ciphertexts representing Boolean True (1).
- By default, freshly encrypted ciphertexts are bootstrapped.
- If you wish to get a fresh encryption without bootstrapping, write
- ct1 = cc.Encrypt(sk, 1, FRESH)
- """
- ct1 = cc.Encrypt(sk, 1)
- ct2 = cc.Encrypt(sk, 1)
- # Sample Program: Step 4: Evaluation
- # Compute (1 AND 1) = 1; Other binary gate options are OR, NAND, and NOR
- ctAND1 = cc.EvalBinGate(AND, ct1, ct2)
- # Compute (NOT 1) = 0
- ct2Not = cc.EvalNOT(ct2)
- # Compute (1 AND (NOT 1)) = 0
- ctAND2 = cc.EvalBinGate(AND, ct2Not, ct1)
- # Compute OR of the result in ctAND1 and ctAND2
- ctResult = cc.EvalBinGate(OR, ctAND1, ctAND2)
- # Sample Program: Step 5: Decryption
- result = cc.Decrypt(sk, ctResult)
- print(f"Result of encrypted computation of (1 AND 1) OR (1 AND (NOT 1)) = {result}")
|