Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Syste 2020
DOI: 10.1145/3373376.3378523
|View full text |Cite
|
Sign up to set email alerts
|

Heax

Abstract: With the rapid increase in cloud computing, concerns surrounding data privacy, security, and confidentiality also have been increased significantly. Not only cloud providers are susceptible to internal and external hacks, but also in some scenarios, data owners cannot outsource the computation due to privacy laws such as GDPR, HIPAA, or CCPA. Fully Homomorphic Encryption (FHE) is a groundbreaking invention in cryptography that, unlike traditional cryptosystems, enables computation on encrypted data without eve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 158 publications
(33 citation statements)
references
References 47 publications
0
33
0
Order By: Relevance
“…Prior arts can be classified into two major architectural approaches: (i) in-place NTT architectures that use a single computing module to perform computations iteratively and generate the results after a delay gap [14], [15], [16], [17], [18], [19], [20], [21], [22], [23]; and (ii) fully-pipelined NTT architectures that deploy all stages in series and produce coefficients every clock cycle (CC) [24], [25], [26], [27], [28], [29]. The selection of a design method depends on the parameter setting of the HE schemes, desired throughput rate, and available hardware resources on the target computing platform.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior arts can be classified into two major architectural approaches: (i) in-place NTT architectures that use a single computing module to perform computations iteratively and generate the results after a delay gap [14], [15], [16], [17], [18], [19], [20], [21], [22], [23]; and (ii) fully-pipelined NTT architectures that deploy all stages in series and produce coefficients every clock cycle (CC) [24], [25], [26], [27], [28], [29]. The selection of a design method depends on the parameter setting of the HE schemes, desired throughput rate, and available hardware resources on the target computing platform.…”
Section: A Related Workmentioning
confidence: 99%
“…The authors deployed the dual-core NTT for each residue polynomial arithmetic unit supporting multiplication, subtraction, and addition on residual polynomials. Riazi et al subsequently proposed HEAX, an FPGA-based architecture for CKKS-based homomorphic multiplications [19]. HEAX deployed up to 32 BUs (called NTT cores) in parallel, stores all pre-computed TFs in onchip memory, and supports small polynomial sets of maximal seven multiplication depths.…”
Section: A Related Workmentioning
confidence: 99%
“…Over the years, there have been several works that have focused on accelerating HE computing on the cloud side. These works include algorithmic optimizations for CPU [4], [5] and GPU [6], [7], and custom hardware accelerators [8]- [12] running in the cloud. All these works assume that the cloud receives encrypted data from the edge device and that the cloud sends the encrypted result back to the edge device for decryption.…”
Section: Related Workmentioning
confidence: 99%
“…This noise within the ciphertext increases with each succeeding homomorphic operation until it reaches a critical level at which it is impossible to recover the computation output [2]. To increase the noise budget for practical HE applications with a large number of HE computations, we need large scheme parameters (N > 2 12 and log Q > 109).…”
Section: Introductionmentioning
confidence: 99%
“…Despite its appeal, two key challenges prevent widespread HE adoption: performance and programmability. Today, most systems-oriented HE research has focused on overcoming the prohibitive performance overheads with high-performance software libraries [36,44] and custom hardware [40,42]. The performance results are encouraging with some suggesting that HE can approach realtime latency for certain applications with sufficiently large hardware resources [40].…”
Section: Introductionmentioning
confidence: 99%