HECO
Optimizing compiler for Fully Homomorphic Encryption (FHE)
Install / Use
/learn @MarbleHE/HECOREADME
Note Welcome to the Artifact Evaluation version of HECO!
HECO is an end-to-end compiler for FHE that takes high-level imperative programs and emits efficient and secure FHE implementations. Currently, it supports Ring-LWE based schemes B/FV, BGV and CKKS which offer powerful SIMD-like operations and can batch many thousands of values into a single vector-like ciphertext.
About HECO
In FHE (and other advanced cryptographic techniques such as MPC or ZKP), developers must express their applications as an (arithmetic/binary) circuit. Translating a function f so that the resulting circuit can be evaluated efficiently is highly non-trivial and doing so manually requires significant expert knowledge. This is where FHE compilers like HECO come in, by automating the transformation of high-level programs into lower-level representations that can be evaluated using FHE.
HECO's design and novel optimizations are described in the accompanying paper. In contrast to previous compilers, HECO removes a significant burden from the developer by automating the task of translating a program to the restricted SIMD programming paradigm available in FHE. This can result in speeupds by over an order of magnitude (i.e., 10x or more) when compared to a naive baseline.
HECO is built using the MLIR compiler framework and follows a traditional front-, middle- and back-end architecture. It uses two Intermediate Representations (IRs) in the middle-end, High-level IR (HIR) to express programs containing control flow and an abstraction of FHE computing (heco::fhe).
This is then lowered to Scheme-specific IR (SIR), with operations corresponding to the FHE schemes' underlying operations (e.g., addition, multiplication, relineraization, etc.). Currently, HECO targets Microsoft SEAL as its backend. In the future, HECO will be extended with Polynomial-level IR (PIR) and RNS IR (RIR) to directly target hardware (both CPUs and dedicated FHE accelerators).

Using HECO
Python Frontend
Note HECO's original Python Frontend has been deprecated in favour of using the upcoming xDSL frontend system. We are working on extending the frontend with more functionality and completing the toolchain, such that frontend programs can be executed again.
Modes
HECO can be used in three distinct modes, each of which target different user needs.
Transpiler Mode
In transpiler mode, HECO outputs a *.cpp source file that can be inspected or modified before compiling & linking against SEAL. HECO performs the usual high-level optimizations and lowers the program to the Scheme-specific Intermediate Representation (SIR). This is then lowered to the MLIR emitC Dialect, with FHE operations translated to function calls to a SEAL wrapper. The resulting IR is then translated into an actual *.cpp file.
Transpiler mode is designed for advanced users that want to integrate the output into larger, existing software projects and/or modify the compiled code to better match their requirements.
In order to use the transpiler mode, you need to modify the default compilation pipeline (assuming you are starting with an
*.mlirfile containing HIR, this would beheco --full-pass [filename_in].mlir) in two ways.
- Specify the scheme (and some core parameters) to be used by adding, e.g.,
--fhe2bfv=poly_mod_degree=1024and the corresponding lowering to emitC, e.g.,--bfv2emitc, each followed by--canonicalizeand--cseto clean up redundant operations introduced by the lowering.- Translate to an actual
*.cppfile by passing the output throughemitc-translateA full example might look like this:
heco --hir-pass --fhe2bfv=poly_mod_degree=1024 --canonicalize --cse --bfv2emitc --canonicalize --cse [filename_in].mlir > emitc-translate --mlir-to-cpp > [filename_out].cpp.In order to compile the file, you will need to include
wrapper.cpp.incinto the file and link it against SEAL (seeCMakeLists.txt). Note that the current wrapper assumes (for slightly obscure reasons) that the generated code is inside a functionseal::Ciphertext trace(). If this was not the case for your input, you might need to adjust the wrapper. By default, it currently serializes the result of the function into a filetrace.ctxt.
Interactive Mode
In interactive mode, an interpreter consumes both the input data and the intermediate representation. HECO performs the usual high-level optimizations and lowers the program to the Scheme-specific Intermediate Representation (SIR). This is then executed by the interpreter by calling suitable functions in SEAL.
This mode is designed to be easy-to-use and to allow rapid prototyping. While there is a performance overhead due to the interpreted nature of this mode, it should be insignificant in the context of FHE computations.
Note Interactive mode will become available when the new Python frontend is finished.
Compiler Mode
In compiler mode, HECO outputs an exectuable. In this mode, HECO performs the usual high-level optimizations and lowers the program to the Scheme-specific Intermediate Representation (SIR). This is then lowered to LLVM IR representing function calls to SEAL's C API, which is then compiled and linked against SEAL.
Compiler mode assumes that the input to HECO is a complete program, e.g., has a valid main() function. As a result, any input/output behaviour must be realized through the LoadCiphertext/SaveCiphertext operations in the scheme-specific IR.
Compiler mode is designed primarily for situations where HECO-compiled applications will be automatically deployed without developer interaction, such as in continous integration or other automated tooling.
Note Compiler mode is not yet implemented. If you require an executable, please use Transpiler mode and subsequent manual compilation & linking for now.
Installation
HECO uses CMake as its build system for its C++ components and follows MLIR/LLVM conventions.
Prerequisites
Install cmake and clang. In addition, you will need lld and ninja in order to compile the MLIR framework.
On Ubuntu, this can be done by running the following:
sudo apt-get install cmake clang lld ninja-build
If the version of cmake provided by your package manager is too old (<3.20), you might need to manually install a newer version.
Dependencies
HECO includes two dependencies (the Microsoft SEAL FHE library, and the MLIR compiler framework) as git submodules, which you need to initialize after cloning:
git submodule update --init --recursive --progress
For normal use and evaluation, build MLIR and SEAL in Release Mode:
<details> <summary>Unfold this to see instructions for developer friendly installation instead!</summary></details>The following is a reasonable start for a "Developer Friendly" installation of MLIR.
Note that it usesccachein order to speed up follow-up compilations, and it is highly recommended to install and set upccacheas it can save significant time when re-compiling. It also uses themoldlinker instead oflldas the former provides a significant performance boost.mkdir dependencies/llvm-project/build cd dependencies/llvm-project/build cmake -G Ninja ../llvm \ -DLLVM_ENABLE_PROJECTS=mlir \ -DLLVM_BUILD_EXAMPLES=OFF \ -DLLVM_TARGETS_TO_BUILD=X86 \ -DCMAKE_BUILD_TYPE=Debug \ -DLLVM_ENABLE_ASSERTIONS=ON \ -DCMAKE_C_COMPILER=clang \ -DCMAKE_CXX_COMPILER=clang++ \ -DCMAKE_EXE_LINKER_FLAGS_INIT="-fuse-ld=mold" \ -DCMAKE_MODULE_LINKER_FLAGS_INIT="-fuse-ld=mold" \ -DCMAKE_SHARED_LINKER_FLAGS_INIT="-fuse-ld=mold" \ -DLLVM_CCACHE_BUILD=ON \ -DLLVM_INSTALL_UTILS=ON \ -DMLIR_INCLUDE_INTEGRATION_TESTS=ON cmake --build . --target check-mlir cd ../../SEAL cmake -S . -B build cmake --build build sudo cmake --install build cd ../..
mkdir dependencies/llvm-project/build
cd dependencies/llvm-project/build
cmake -G Ninja ../llvm \
-DLLVM_ENABLE_PROJECTS=mlir \
-DLLVM_BUILD_EXAMPLES=OFF \
-DLLVM_TARGETS_TO_BUILD=X86 \
-DCMAKE_BUILD_TYPE=Release \
-DLLVM_ENABLE_ASSERTIONS=OFF \
-DCMAKE_C_COMPILER=clang \
-DCMAKE_CXX_COMPILER=clang++ \
-DLLVM_ENABLE_LLD=ON \
-DLLVM_CCACHE_BUILD=OFF \
-DLLVM_INSTALL_UTILS=ON \
-DMLIR_INCLUDE_INTEGRATION_TESTS=OFF
cmake --build . --target check-mlir
cd ../../SEAL
cmake -S . -B build
cmake --build build
sudo cmake --install build
cd ../..
Building
This setup assumes that you have built MLIR as described above. To build, run the following from the repository root:
<details> <summary>Unfold this to see instructions for developer friendly build instead!</summary>This build
