2018
DOI: 10.1109/lca.2018.2812814
|View full text |Cite
|
Sign up to set email alerts
|

TERMinator Suite: Benchmarking Privacy-Preserving Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…For comparison on general-purpose computation, we use a set of data-oblivious benchmarks from the TERMinator Suite [39] that are grouped into three categories: 1) Basic -heavily based on arithmetic and logical operations: Bubble Sort (bsort), Insertion Sort (isort), Matrix Multiplication (matrix), and Sieve of Erastothenes (sieve); 2) Encoder -implementing bitwise-intensive cryptographic and hash applications: Jenkins (jen) and Speck Cipher (speck); and 3) Microbenchmarks: the addition-intensive Fibonnaci (fib) and the multiplication-intensive Factorial (fact). Table 2 presents the execution time (in seconds) for the benchmarks running on 8-bit and 32-bit SecureInt variables with λ = 80 against TFHE.…”
Section: ) Tfhementioning
confidence: 99%
“…For comparison on general-purpose computation, we use a set of data-oblivious benchmarks from the TERMinator Suite [39] that are grouped into three categories: 1) Basic -heavily based on arithmetic and logical operations: Bubble Sort (bsort), Insertion Sort (isort), Matrix Multiplication (matrix), and Sieve of Erastothenes (sieve); 2) Encoder -implementing bitwise-intensive cryptographic and hash applications: Jenkins (jen) and Speck Cipher (speck); and 3) Microbenchmarks: the addition-intensive Fibonnaci (fib) and the multiplication-intensive Factorial (fact). Table 2 presents the execution time (in seconds) for the benchmarks running on 8-bit and 32-bit SecureInt variables with λ = 80 against TFHE.…”
Section: ) Tfhementioning
confidence: 99%
“…For the former, modern FHE schemes offer one or more mechanisms to manage this noise, with each technique having different capabilities in terms of noise reduction as well as computational overhead. For the latter, if a loop termination condition remains encrypted, a server executing an encrypted program may not be able to decide if or when the execution ends (i.e., there exists a "termination problem" [17,22,65,80,88]).…”
Section: Introductionmentioning
confidence: 99%