-
Notifications
You must be signed in to change notification settings - Fork 413
Description
Winners
🥇 1st place: A submission by JoseSK999
🥈 2nd place A submission by Tomtau
🥉 3rd place : A submission by M-Bln
Overview
This TFHE-rs bounty looks to provide a set of APIs working over encrypted string reproducing APIs from the rust std library str type (see documentation at https://doc.rust-lang.org/std/primitive.str.html)
This document will specify the expected structure of the example that you will produce and specify various constraints on the types that will be introduced and the APIs that are expected on the primitives.
How to participate?
1️⃣ Register here.
2️⃣ When ready, submit your code here.
🗓️ Submission deadline: December 17, 2023.
Description
String encoding
The input string encoding is expected to be ASCII.
To avoid leaking the length of the input string we may want to encrypt zeros after the string actual content, to easily mark the end of the string we will make the FheString
null terminated, i.e., it must always end by the value 0u8
encrypted, like C Strings are null terminated.
Note
[ADDED 23.10.2023]
A null character "\0" may mark the early end of a string but is not required (as was first asked in the bounty) as it can make some algorithms more complicated and slower.
The option to have encrypted strings with a padding made with 0s is still required (to leave the option to the user to obfuscate the string's length), differentiating between the two kind of strings (padded or not) can and should be used to chose better algorithms when possible.
Functions to implement
Your submission should at least implement, the following method for an encrypted string:
contains
with clear / encrypted patternends_with
with clear pattern / encrypted patterneq_ignore_case
find
with clear pattern / encrypted patternis_empty
len
repeat
with clear / encrypted number of repetitionsreplace
with clear pattern / encrypted patternreplacen
with clear pattern / encrypted patternrfind
with clear pattern / encrypted patternrsplit
with clear pattern / encrypted patternrsplit_once
with clear pattern / encrypted patternrsplitn
with clear pattern / encrypted patternrsplit_terminator
with clear pattern / encrypted patternsplit
with clear pattern / encrypted patternsplit_ascii_whitespace
split_inclusive
with clear pattern / encrypted patternsplit_terminator
with clear pattern / encrypted patternsplitn
with clear pattern / encrypted patternstarts_with
with clear pattern / encrypted patternstrip_prefix
with clear pattern / encrypted patternstrip_suffix
with clear pattern / encrypted patternto_lowercase
to_uppercase
trim
trim_end
trim_start
+
(concatenation)- Comparisons between strings
>=
,<=
,!=
,==
API to use for the bounty
This bounty should make use of the integer API from TFHE-rs, more precisely we expect you to use RadixCiphertexts
with the default parallelized functions available in the crate.
Structure of the example directory
You will put your code in the directory tfhe/src/examples/fhe_strings
This directory will contain the following:
main.rs:
The code for a command line executable that will take an input string to be encrypted and a pattern for string functions which require it. This executable will encrypt the first string and run all the available APIs on the input string using the pattern when necessary. The results will be compared to the clear APIs provided by rust’s std::str, the ouptuts will be nicely formatted for the user to see that the results match (if there are errors then the bounty would not be considered valid) with timing information for the FHE version.
Use clap (the version pinned in TFHE-rs) to build the command line.
ciphertext.rs:
This module will contain:
FheAsciiChar
: a wrapper type that will hold aRadixCiphertext
from integer which must be able to store at least 8 bits of data to be able to fit a single ASCII char;FheString
: a wrapper type around aVec<FheAsciiChar>
, the lastFheAsciiChar
of the string always encrypts a 0u8, it is possible to have 0u8 earlier than the last char, this would allow the user to hide the actual length of the string that is encrypted, accessors should be made to be able to iterate easily on the inner vec both mutably and immutably, do not provide a from_blocks primitives as it would be easy to misuse, anew
function should be enough to construct the type at encryption time with a client key, see for exampletfhe/src/integer/ciphertext/mod.rs
to see how IntegerRadixCiphertext
are built to give access to their content for use by algorithms.
client_key.rs:
Provide a ClientKey type that can be built from shortint
parameters (that are also used by the integer API) or from an IntegerClientKey
directly, realistically this ClientKey type will wrap the IntegerClientKey and provide primitives to encrypt a rust str (validating before encryption that the str is a valid ASCII str), decrypt it in a fresh String. There should be an encryption primitive that allows the user to specify how many “padding” encryption of zeros should be appended after the 0-terminated string that will be encrypted from the provided input string.
ClientKey must derive serde::Serialize
, serde::Deserialize
and Clone
.
directory server_key:
mod.rs:
Provide a ServerKey that wraps an Integer ServerKey that can be built from a ClientKey from client_key.rs or directly from an Integer ServerKey.
ServerKey must derive serde::Serialize
, serde::Deserialize
and Clone
.
Create files for families of functions that share similar algorithmic needs, e.g., IF IT MAKES SENSE (here we are speculating, this is just an example supposing similar functions will require similar algorithms)
split.rs
Will contain an impl
Block for the above ServerKey
dedicated to split functions like
rsplit
rsplit_terminator
split
split_inclusive
split_terminator
and all relevant helper functions. If some functions are needed everywhere then those functions can be put in the mod.rs file from the directory.
trim.rs
Will contain an impl
Block for the above ServerKey
dedicated to trim functions like
trim
trim_end
trim_start
Note that the above functions will not literally trim blocks off of the provided FheAsciiString
but rather will zero out the correct blocks to make the null terminated string the trimmed version as appropriate.
Also, it could make sense to separate functions depending on the type of the pattern (i.e., encrypted or clear) in separate files.
Other requirements
Each function should have a docstring describing what it does (those can be adapted from the rust std docs) with a doctest demonstrating the usage on simple hard coded cases.
We expect standard algorithms if it makes sense (with links to the papers describing them or publicly available content on the web like a Wikipedia page for example), if some tricks are used proper comments are expected to be provided in the code.
Note
As submissions are evaluated on a 64 cores machine, your code should heavily use parallelization
A Makefile target (see Makefile for the template of our targets) for running the tests of the example is expected. A command to run the binary easily from the terminal is also requested.
The code must compile on the latest stable rust. No #[allow(clippy::...)] are authorized unless absolutely necessary but that should never be required.
The code must pass the make pcc (pre commit check) available from our Makefile, if you get errors then the code needs to be fixed to satisfy the pcc checks.
Good luck!
Reward
🥇Best submission: up to €10,000.
To be considered best submission, a solution must be efficient, effective and demonstrate a deep understanding of the core problem. Alongside the technical correctness, it should also be submitted with a clean code, clear explanations and a complete documentation.
🥈Second-best submission: up to €3,500.
For a solution to be considered the second best submission, it should be both efficient and effective. The code should be neat and readable, while its documentation might not be as exhaustive as the best submission, it should cover the key aspects of the solution.
🥉Third-best submission: up to €1,500.
The third best submission is one that presents a solution that effectively tackles the challenge at hand, even if it may have certain areas of improvement in terms of efficiency or depth of understanding. Documentation should be present, covering the essential components of the solution.
Reward amounts are decided based on code quality and speed performance on a m6i.metal AWS server.
Related links and references
Submission
Apply directly to this bounty by opening an application here.
Questions?
Do you have a specific question about this bounty? Join the live conversation on the FHE.org discord server here. You can also send us an email at: [email protected]
Metadata
Metadata
Assignees
Labels
Type
Projects
Status