{"id":"https://openalex.org/W4384705451","doi":"https://doi.org/10.1109/ipdps54959.2023.00085","title":"Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs","display_name":"Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4384705451","doi":"https://doi.org/10.1109/ipdps54959.2023.00085"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps54959.2023.00085","pdf_url":null,"source":{"id":"https://openalex.org/S4363607067","display_name":"2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079491959","display_name":"Fan Guang","orcid":"https://orcid.org/0000-0002-5389-0823"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Fan","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082689200","display_name":"Fangyu Zheng","orcid":"https://orcid.org/0000-0003-0490-2485"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangyu Zheng","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cryptography, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cryptography, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101790448","display_name":"Lipeng Wan","orcid":"https://orcid.org/0000-0002-8310-0837"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lipeng Wan","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101926307","display_name":"Lili Gao","orcid":"https://orcid.org/0000-0003-3903-1480"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lili Gao","raw_affiliation_strings":["Department of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009895952","display_name":"Yuan Zhao","orcid":"https://orcid.org/0000-0002-7306-5038"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhao","raw_affiliation_strings":["Ant Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Hangzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017411757","display_name":"Jiankuo Dong","orcid":"https://orcid.org/0000-0003-1693-3000"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiankuo Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780795","display_name":"Yixuan Song","orcid":"https://orcid.org/0000-0001-8226-367X"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixuan Song","raw_affiliation_strings":["Ant Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Hangzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101640450","display_name":"Yuewu Wang","orcid":"https://orcid.org/0009-0003-5170-1253"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuewu Wang","raw_affiliation_strings":["School of Cryptography, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cryptography, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["School of Cyber Security, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.412,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.558059,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":67,"max":78},"biblio":{"volume":null,"issue":null,"first_page":"798","last_page":"808"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9945,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic Encryption","score":0.8036933},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6498245},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.60773045},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.5870096},{"id":"https://openalex.org/keywords/coprocessor","display_name":"Coprocessor","score":0.43480322}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8518872},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8036933},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6498245},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.60773045},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5870096},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.55464834},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.549871},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.54653585},{"id":"https://openalex.org/C86111242","wikidata":"https://www.wikidata.org/wiki/Q859595","display_name":"Coprocessor","level":2,"score":0.43480322},{"id":"https://openalex.org/C84211073","wikidata":"https://www.wikidata.org/wiki/Q117879","display_name":"Floating point","level":2,"score":0.42570385},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3644665},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35575238},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20029771},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15098792},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.095574915}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps54959.2023.00085","pdf_url":null,"source":{"id":"https://openalex.org/S4363607067","display_name":"2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.64}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":null},{"funder":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1498685334","https://openalex.org/W150223756","https://openalex.org/W2031533839","https://openalex.org/W2045836768","https://openalex.org/W2095363965","https://openalex.org/W2157999631","https://openalex.org/W2177209050","https://openalex.org/W2207050309","https://openalex.org/W2309997581","https://openalex.org/W2401959250","https://openalex.org/W2768174108","https://openalex.org/W2803071298","https://openalex.org/W2885339274","https://openalex.org/W2885448650","https://openalex.org/W2897925395","https://openalex.org/W2902726272","https://openalex.org/W2942255051","https://openalex.org/W2969350772","https://openalex.org/W2987932087","https://openalex.org/W3012457899","https://openalex.org/W3028131843","https://openalex.org/W3028867652","https://openalex.org/W3109801878","https://openalex.org/W3158044478","https://openalex.org/W3182478132","https://openalex.org/W3184334856","https://openalex.org/W3209205733","https://openalex.org/W4200126335","https://openalex.org/W4205474236","https://openalex.org/W4206293930","https://openalex.org/W4226147778","https://openalex.org/W4236580217","https://openalex.org/W4237773356","https://openalex.org/W4241295125","https://openalex.org/W4296831830"],"related_works":["https://openalex.org/W4388894064","https://openalex.org/W4386907889","https://openalex.org/W3192883662","https://openalex.org/W3028898974","https://openalex.org/W2912162584","https://openalex.org/W2384844478","https://openalex.org/W2291943064","https://openalex.org/W2209727271","https://openalex.org/W2027176516","https://openalex.org/W1755636270"],"abstract_inverted_index":{"Fully":[0],"Homomorphic":[1],"Encryption":[2],"(FHE)":[3],"allows":[4],"computations":[5],"on":[6,83,112,123],"encrypted":[7],"data":[8,96],"without":[9],"knowledge":[10],"of":[11,21,38,46,51,76,95,117,141,156,163],"the":[12,19,27,35,43,49,61,121,124,148,154,172],"plaintext":[13],"message":[14],"and":[15,24,71,78,89,101,109,161,181],"currently":[16],"has":[17],"been":[18],"focus":[20],"both":[22],"academia":[23],"industry.":[25],"However,":[26],"performance":[28],"issue":[29],"hinders":[30],"its":[31],"large-scale":[32],"application,":[33],"highlighting":[34],"urgent":[36],"requirements":[37],"high-performance":[39],"FHE":[40,69,80,133,187],"implementations.With":[41],"noticing":[42],"tremendous":[44],"potential":[45],"GPUs":[47,67],"in":[48,66,185],"field":[50],"cryptographic":[52],"acceleration,":[53],"this":[54,164],"paper":[55,104,165],"comprehensively":[56],"investigates":[57],"how":[58],"to":[59,129,175],"convert":[60],"available":[62],"computing":[63],"resources":[64],"residing":[65],"into":[68],"workhorses,":[70],"implement":[72],"a":[73,106,136,168],"full":[74],"set":[75],"low-level":[77],"middle-level":[79],"primitives":[81],"based":[82,111],"two":[84],"arithmetic":[85,179],"units":[86,180],"(i.e.,":[87,98],"INT32":[88],"FP64":[90],"units)":[91],"with":[92],"three":[93],"types":[94],"precision":[97],"INT32,":[99],"INT64":[100],"FP64).":[102],"This":[103],"gives":[105],"comprehensive":[107],"evaluation":[108,160],"comparison":[110,162],"each":[113],"road-map.":[114],"Our":[115],"implementations":[116,122],"fundamental":[118],"functions":[119],"outperform":[120],"same":[125],"platform":[126],"by":[127],"1.7\u00d7":[128],"16.7\u00d7.":[130],"Taking":[131],"CKKS":[132],"schemes":[134],"as":[135],"case":[137],"study,":[138],"our":[139],"implementation":[140],"homomorphic":[142],"multiplication":[143],"achieves":[144],"3.2\u00d7":[145],"speedup":[146],"over":[147],"state-of-the-art":[149],"GPU-based":[150,186],"implementation,":[151],"even":[152],"considering":[153],"difference":[155],"platforms.":[157],"The":[158],"detailed":[159],"would":[166],"offer":[167],"vital":[169],"reference":[170],"for":[171],"follow-up":[173],"work":[174],"choose":[176],"appropriate":[177],"underlying":[178],"important":[182],"primitive":[183],"optimizations":[184],"implementations.":[188]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4384705451","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-01-07T02:35:07.402724","created_date":"2023-07-20"}