Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Galois Key

A Galois Key is a specialized cryptographic key in Fully Homomorphic Encryption (FHE) that enables operations like rotation and permutation on ciphertexts without decryption.
Chainscore © 2026
definition
FULLY HOMOMORPHIC ENCRYPTION

What is a Galois Key?

A Galois Key is a specialized cryptographic key used in Fully Homomorphic Encryption (FHE) schemes, particularly those based on the CKKS (Cheon-Kim-Kim-Song) algorithm, to enable encrypted data rotation and conjugation operations.

A Galois Key is a public evaluation key in certain Fully Homomorphic Encryption (FHE) schemes that allows a third party (like a cloud server) to perform specific mathematical operations on encrypted data without decrypting it. Its primary function is to enable encrypted rotation, which cyclically shifts the slots of an encrypted vector, and encrypted complex conjugation. This is distinct from the Relinearization Key, which handles multiplication depth management. The key is named after the mathematical concept of a Galois group, which deals with symmetries and permutations, mirroring the rotation operation it performs on the encrypted data slots.

In the widely used CKKS FHE scheme, data is encoded into plaintext polynomials where each coefficient represents a data slot. Operations like addition and multiplication work slot-wise. The Galois Key is essential for operations that require manipulating the structure of this data, such as summing all elements in a vector or computing a dot product efficiently. For example, to sum all encrypted values in a vector, a series of rotations powered by the Galois Key would be used to align and add the slots iteratively, all while the data remains encrypted.

Generating a Galois Key requires the secret key and involves creating an encryption of a specific automorphism of the secret key. This process is computationally intensive and results in a large key, which is a significant consideration for FHE performance and storage. In practical applications—such as private machine learning inference or secure statistical analysis on encrypted datasets—the client must precompute and provide the necessary Galois Keys to the server alongside the encrypted data, defining the permissible computations in advance.

how-it-works
CRYPTOGRAPHY

How a Galois Key Works

A Galois Key is a specialized cryptographic key used in Fully Homomorphic Encryption (FHE) to enable multiplication operations on encrypted data.

In Fully Homomorphic Encryption (FHE), a Galois Key is a public evaluation key that enables the rotation and conjugation of data within encrypted vectors or polynomials. This operation is mathematically analogous to shifting the positions of elements in an encrypted array without decrypting it. The key is named after the mathematical concept of a Galois group, which underpins the algebraic structure of the ciphertext space in many FHE schemes like CKKS and BFV. Without a Galois key, performing such rotations—a crucial step for operations like convolutions or matrix multiplications on encrypted data—would be impossible.

The generation of a Galois key is a one-time setup cost performed by the secret key holder. It is created by encrypting a specific, structured polynomial that represents the desired cyclic rotation within the underlying algebraic ring. Once published, this key allows any party (e.g., a cloud server) to perform homomorphic rotations on ciphertexts they receive, manipulating the encrypted data meaningfully while it remains fully encrypted. This capability is fundamental for implementing complex encrypted computations, such as evaluating neural networks or performing encrypted database queries that require data reordering.

From a performance perspective, Galois Key operations are computationally intensive but essential for efficiency. A single complex computation might require multiple rotations, each consuming a Galois key operation. In practice, a set of Galois keys for different rotation steps is often pre-generated and provided to the evaluating party. This mechanism is a cornerstone of privacy-preserving computation, enabling practical applications in secure outsourced analytics, confidential machine learning, and private information retrieval where data order and structure must be manipulated in ciphertext form.

key-features
FHE CRYPTOGRAPHY

Key Features of Galois Keys

A Galois Key is a specialized cryptographic object in Fully Homomorphic Encryption (FHE) that enables cyclic rotations of encrypted data, a fundamental operation for performing complex computations like comparisons and sorting on ciphertexts.

01

Enables Data Rotation

The core function of a Galois Key is to perform cyclic rotations on encrypted vectors. This operation shifts the positions of encrypted values within a ciphertext, which is essential for implementing non-linear functions (e.g., comparisons, ReLU) and complex algorithms (e.g., sorting, matrix operations) in FHE.

02

Automated Key Generation

Galois Keys are not manually created. They are automatically generated by the FHE scheme's key generation algorithm alongside the secret and public keys. This process uses the secret key to produce a set of keys, each corresponding to a specific rotation step (e.g., rotate by 1, rotate by 2).

03

Bootstrap-Free Operation

Unlike other FHE operations that increase noise and eventually require bootstrapping, rotations using a Galois Key are typically noise-neutral. This makes them highly efficient and allows for many consecutive rotations without degrading the ciphertext's ability to be decrypted correctly.

04

Essential for SIMD Operations

Galois Keys are critical for Single Instruction, Multiple Data (SIMD) batching in FHE. By rotating encrypted data slots, a single operation can be applied to different data elements, dramatically improving computational throughput. This is fundamental for practical, performant FHE applications.

05

Scheme-Specific Implementation

The exact structure and generation of Galois Keys depend on the underlying FHE scheme. Prominent examples include:

  • CKKS: Uses Galois Keys for efficient rotations on complex numbers.
  • BFV/BGV: Employs them for modular arithmetic on integers.
  • TFHE: Uses a specialized variant called a Bootstrapping Key that also handles rotations.
06

Security & Key Size Trade-off

Galois Keys contribute to the significant public key size in FHE systems. A full set for all possible rotations can be large (megabytes to gigabytes). Schemes often optimize by generating keys only for necessary rotation steps, trading off flexibility for reduced storage and bandwidth requirements.

visual-explainer
FHE KEY MANAGEMENT

Visualizing Galois Key Operations

This section illustrates the specialized cryptographic operations enabled by a Galois Key within Fully Homomorphic Encryption (FHE) schemes, focusing on its role in enabling data rotations and complex computations on encrypted vectors.

A Galois Key is a specialized public key in FHE schemes like CKKS and BFV that enables cyclic rotations of encrypted data vectors. Unlike a standard public key used for encryption and addition/multiplication, the Galois Key is generated specifically to perform operations that reorder the slots within a ciphertext. This is a fundamental operation for performing meaningful computations, such as summing all elements in an array or applying a function across different data positions, without ever decrypting the data. Visualizing this, imagine a row of locked boxes (encrypted data slots); the Galois Key provides a mechanism to securely rotate the entire row left or right while keeping every box sealed.

The core operation enabled is the Galois automorphism, which mathematically corresponds to raising each component of the encrypted plaintext vector to a power of the primitive root of unity. In practice, this results in a cyclical shift. For example, in a machine learning context, an encrypted feature vector [a, b, c, d] could be rotated to [d, a, b, c]. This allows a single encrypted model weight to be applied to every feature in the vector through subsequent homomorphic multiplications and additions, enabling efficient encrypted dot products and convolutional filters. The key is essential for achieving SIMD (Single Instruction, Multiple Data) parallelism in FHE, where a single ciphertext operation processes an entire vector of values simultaneously.

From a system architecture perspective, the generation and use of a Galois Key incur significant computational and storage overhead. Each distinct rotation distance (e.g., rotate by 1 slot, rotate by 2 slots) typically requires its own Galois Key, leading to a large key-switching key set that must be stored and managed by the server performing the computations. This trade-off is critical for performance: more keys enable more flexible and complex encrypted computations but increase the bootstrapping complexity and memory footprint. Visual tools for FHE often highlight these rotations as distinct graphical operations, differentiating them from standard arithmetic gates to emphasize their unique role in manipulating encrypted data structure.

examples
GALOIS KEY

Primary Use Cases & Examples

A Galois Key is a cryptographic object in Fully Homomorphic Encryption (FHE) systems that enables the homomorphic multiplication of ciphertexts. It is essential for performing complex, non-linear operations on encrypted data.

01

Enabling Encrypted Computation

The primary function of a Galois Key is to facilitate the homomorphic multiplication of two ciphertexts within an FHE scheme, such as CKKS or BFV. This operation, combined with homomorphic addition, allows for the evaluation of arbitrary functions (like polynomials) on encrypted data without decryption. It is a core component that makes privacy-preserving computation possible.

02

Bootstrap-Free Operations

In the CKKS scheme, Galois Keys are used for operations that do not increase the inherent noise in a ciphertext as severely as regular multiplication. They enable critical functions like ciphertext rotation (shifting encrypted data slots) and complex conjugation, which are essential for efficient linear algebra operations (e.g., matrix multiplications, dot products) on encrypted vectors.

03

Private Machine Learning Inference

A key application is in private ML inference. A server holding a Galois Key can perform encrypted evaluations of a neural network's activation functions and layers on a client's encrypted data. This allows services like medical diagnosis or financial risk assessment without exposing the raw input data or the model's proprietary weights.

04

Secure Data Analytics

Galois Keys enable analytics on aggregated encrypted data. For example, a data aggregator can compute encrypted statistics (means, variances) or run regression models on sensitive datasets from multiple sources (e.g., hospitals, banks) without ever decrypting the individual data points, preserving confidentiality throughout the computation.

05

Blockchain & Smart Contract Privacy

In confidential blockchain networks, Galois Keys are used within zk-FHE or FHE-based smart contracts. They allow contracts to process private user inputs (e.g., encrypted balances or bids) and produce a verifiable, encrypted output, enabling use cases like private decentralized finance (DeFi) and sealed-bid auctions.

06

Contrast with Relinearization Key

It is crucial to distinguish a Galois Key from a Relinearization Key. While both are used after multiplication:

  • A Galois Key is for operations that manipulate data within a single ciphertext vector (e.g., rotations).
  • A Relinearization Key is for reducing the size of a ciphertext back to its original form after multiplication, controlling noise growth. They are often used in tandem for efficient circuit evaluation.
ecosystem-usage
FHE CRYPTOGRAPHY

Ecosystem Usage: Protocols & Libraries

A Galois Key is a specialized cryptographic key used in Fully Homomorphic Encryption (FHE) schemes, enabling specific mathematical operations on encrypted data. Its primary use in blockchain is to facilitate confidential smart contracts and private computations.

01

Core Function: Permutation Operations

A Galois Key enables cyclic rotations of data within encrypted vectors or polynomials, a fundamental operation for performing complex computations like comparisons and sorting in FHE. This is distinct from a Relinearization Key, which handles ciphertext size management after multiplication.

  • Key Role: Allows operations on specific data slots without decrypting.
  • Example: Rotating encrypted vector [A, B, C] to [C, A, B] for a privacy-preserving database query.
03

Use Case: Encrypted State Transitions

In confidential smart contracts, a Galois Key allows the contract logic to manipulate encrypted user balances or votes.

  • Private Voting: Shuffling encrypted ballots for anonymity before tallying.
  • Dark Pools: Rotating encrypted order book entries to match bids and asks without revealing details.
  • Confidential DeFi: Performing portfolio rebalancing calculations on encrypted token amounts.

This enables state transitions where the new state remains encrypted, preserving privacy.

04

Key Generation & Management

Galois Keys are generated by the secret key holder and must be provided to the computing party (e.g., a blockchain validator).

  • Process: Derived from the main secret key during the FHE setup phase.
  • Trust Model: The key recipient can perform rotations but cannot decrypt the data.
  • Performance: Generating Galois Keys is computationally intensive, often done offline. Each key is specific to a particular rotation distance.
05

Relation to Other FHE Keys

Understanding the Galois Key requires distinguishing it from other keys in the FHE ecosystem:

  • Secret Key: Decrypts data. Must remain private.
  • Public Key: Encrypts data. Can be shared publicly.
  • Evaluation Key / Relinearization Key: Reduces ciphertext size after multiplication.
  • Galois Key: Enables data permutation (rotation) within ciphertexts.

Together, these keys form the complete set required for bootstrapped FHE computations.

06

Blockchain Protocols Utilizing FHE

Several blockchain and Layer-2 networks are integrating FHE, necessitating Galois Key infrastructure.

  • Fhenix: An EVM-compatible L2 using FHE for confidential smart contracts.
  • Inco Network: A modular confidentiality layer leveraging FHE.
  • Zama: Provides fhEVM and fheOS for building encrypted applications.

These protocols handle the secure generation, distribution, and use of Galois Keys within their validator networks to execute private transactions.

security-considerations
GALOIS KEY

Security Considerations

A Galois Key is a cryptographic parameter in Fully Homomorphic Encryption (FHE) systems that enables the homomorphic multiplication of ciphertexts. Its security is paramount for protecting data during computation on blockchains and other privacy-preserving applications.

01

Key Generation & Trust

The security of the entire FHE system depends on the proper generation of the Galois Key. It must be derived from a strong, secret master secret key. If this process is compromised or uses weak randomness, an attacker could potentially decrypt all processed data. This creates a single point of failure in the cryptographic setup.

02

Key Exposure Risks

If a Galois Key is leaked, it does not directly reveal the encrypted data. However, it allows an attacker to perform unlimited homomorphic operations, potentially enabling ciphertext manipulation attacks. For example, they could create malformed ciphertexts to probe the system or amplify noise to cause decryption failures, compromising data integrity.

03

Noise Growth Management

Every homomorphic multiplication using the Galois Key increases the noise within the ciphertext. Unchecked noise growth will eventually corrupt the data, making it undecryptable. The security model requires precise noise budgeting and potentially bootstrapping operations. A flawed implementation can lead to silent data corruption or necessitate insecure parameter choices to accommodate noise.

04

Parameter Selection & Lattice Security

The security of the Galois Key is based on the hardness of Ring Learning With Errors (RLWE) problems. Choosing parameters (like polynomial degree and ciphertext modulus) involves a critical trade-off:

  • Weak parameters risk cryptanalysis and practical attacks.
  • Overly strong parameters cause massive performance overhead, making the system unusable. Parameters must be vetted against current cryptanalytic benchmarks.
05

Trusted Setup vs. Trustless Alternatives

Many FHE schemes require a trusted setup to generate the Galois Key and other public parameters. This ceremony must be performed correctly and the toxic waste securely discarded. To mitigate this risk, research focuses on trustless setup models or Multi-Party Computation (MPC)-based key generation, where no single party knows the complete secret.

06

Side-Channel & Implementation Attacks

Even with perfect mathematical security, the physical implementation is vulnerable. Operations using the Galois Key can leak information via:

  • Timing attacks
  • Power analysis
  • Cache attacks Secure implementation requires constant-time algorithms and hardware-level protections to prevent extraction of the secret key or data.
FHE KEY COMPARISON

Galois Key vs. Relinearization Key

A comparison of two essential public keys used for managing ciphertext size and enabling specific operations in Fully Homomorphic Encryption schemes.

FeatureGalois KeyRelinearization Key

Primary Cryptographic Operation

Automorphism (Galois group action)

Key Switching

Primary Purpose

Enables cyclic rotations of encrypted data vectors

Reduces ciphertext size after multiplication

Effect on Ciphertext Size

No change to size (size-preserving)

Reduces from 3 components back to 2 components

Enables Operation

Slot rotation, row/column shifts in encrypted matrices

Further homomorphic multiplications (maintains usability)

Generated From

Secret key s

Evaluation key (derived from secret key s)

Typical Use Case

Data manipulation (e.g., summing all slots)

After every homomorphic multiplication (to control noise growth)

Scheme Association

Common in BGV, BFV, and CKKS schemes

Universal in FHE schemes supporting multiplication (BGV, BFV, CKKS)

GALOIS KEY

Frequently Asked Questions (FAQ)

A Galois Key is a specialized cryptographic key used in Fully Homomorphic Encryption (FHE) schemes, enabling specific mathematical operations on encrypted data. These questions address its core function, applications, and differences from related keys.

A Galois Key is a public evaluation key in certain Fully Homomorphic Encryption (FHE) schemes, such as CKKS and BFV, that enables cyclic rotations of encrypted data vectors. Unlike a standard public key used for encryption, a Galois Key allows a third party (like a cloud server) to perform specific, pre-defined transformations—specifically, rotating the slots of a ciphertext—without decrypting the data. This operation is fundamental for performing complex computations like matrix multiplications or convolutions on encrypted vectors efficiently. The key is generated alongside other keys (public, private, relinearization) during the FHE setup phase and is named for its use of Galois automorphisms, which are mathematical functions that map elements within a finite field.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Galois Key: Definition & Use in Homomorphic Encryption | ChainScore Glossary