LogoLogo
  • Overview
    • Intro
    • Fair Math Actor
      • Fair Math Controller
      • Fair Math VM
      • Setup an Actor
    • Hello (CIFAR) world!
  • FHE Computer
    • Overview
    • Architectural Layers
      • Application Layer
      • Orchestration Layer
      • Verification Layer
      • Execution Layer
      • Data Layer
    • ISA
      • fhe
      • arith
      • tensor
      • polycircuit
    • Operating System
      • Computer State
      • Application
        • Running Applications
        • External Functions
        • Interactive APPS
      • Execution Graph and Tasks
        • Atomic and Composite Instructions
        • Instruction Unrolling
        • Task Dependencies
        • Execution Graph
      • Process
        • Process lifecycle
        • Resource Allocation and Isolation
      • Order Book
        • Matching Mechanism
        • Task Complexity
        • Instruction Complexity
        • Task re-Delegation
      • Context
        • Context Structure
      • FHE Component Repository
    • Fair Math Actors
      • Task State Monitoring
      • Execution Pairs
      • Rewards and Penalties
    • Ethereum Endpoint
    • CIFAR10 App
  • Whitepapers
    • FHE Computer
    • FHERMA
  • FHERMA
  • Resources
    • Computer CLI
    • FHERMA
    • POLYCIRCUIT (CPP)
    • OpenFHE-rs
    • Talks and Podcasts
  • Social
    • Twitter
    • Linkedin
    • Website
    • Github
Powered by GitBook
LogoLogo
On this page
  1. FHE Computer
  2. Operating System
  3. Order Book

Instruction Complexity

The complexity of an instruction depends on its type, the input arguments it processes, and the cryptographic parameters influencing its execution. For operations involving encrypted data, the same instruction can have varying complexity based on the input ciphertexts and the cryptographic context.

Factors Affecting Instruction Complexity

  1. Input Arguments The data passed to the instruction, such as ciphertexts, influences complexity.

  2. Cryptographic Parameters Contextual settings that define the operational environment, including:

    • Ring Dimension (N): Determines the size of polynomial arithmetic, affecting computational cost.

    • Scaling Factor (Δ): Influences the precision of encrypted computations.

    • Security Level: Indicates the cryptographic strength and associated resource requirements.

Example: Encrypted Multiplication

For the instruction fhe.bgv.mult (multiplication of encrypted values), the complexity is affected by:

  • Ciphertexts:

    • Multiplicative Depth (D): Indicates how many operations have been performed on the ciphertext. Higher depth increases complexity due to relinearization and modulus switching.

  • CryptoContext Parameters:

    • Ring Dimension (N): Governs the cost of polynomial operations.

    • Scaling Factor (Δ): Affects the precision and associated computation.

For each instruction there is cost function that evaluates its complexity based on the given input and cryptographic environment.

PreviousTask ComplexityNextTask re-Delegation

Last updated 5 months ago

Page cover image