SoK: Fully Homomorphic Encryption Accelerators

被引:0
|
作者
Zhang, Junxue [1 ,2 ]
Cheng, Xiaodian [1 ]
Yang, Liu [1 ,2 ]
Hu, Jinbin [1 ]
Liu, Ximeng [3 ]
Chen, Kai [1 ]
机构
[1] The Hong Kong University of Science and Technology, Hong Kong, Hong Kong
[2] Clustar, Hong Kong, Hong Kong
[3] Fuzhou University, Fuzhou, China
基金
中国国家自然科学基金;
关键词
Colliding beam accelerators;
D O I
10.1145/3676955
中图分类号
学科分类号
摘要
Fully Homomorphic Encryption (FHE) is a key technology enabling privacy-preserving computing. However, the fundamental challenge of FHE is its inefficiency, due primarily to the underlying polynomial computations with high computation complexity and extremely time-consuming ciphertext maintenance operations. To tackle this challenge, various FHE accelerators have recently been proposed by both research and industrial communities. This article takes the first initiative to conduct a systematic study on the 14 FHE accelerators: cuHE/cuFHE, nuFHE, HEAT, HEAX, HEXL, HEXL-FPGA, 100×, F1, CraterLake, BTS, ARK, Poseidon, FAB, and TensorFHE. We first make our observations on the evolution trajectory of these existing FHE accelerators to establish a qualitative connection between them. Then, we perform testbed evaluations of representative open-source FHE accelerators to provide a quantitative comparison on them. Finally, with the insights learned from both qualitative and quantitative studies, we discuss potential directions to inform the future design and implementation for FHE accelerators. © 2024 held by the owner/author(s).
引用
收藏
相关论文
共 50 条
  • [21] Better Bootstrapping in Fully Homomorphic Encryption
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 1 - 16
  • [22] MULTIKEY FULLY HOMOMORPHIC ENCRYPTION AND APPLICATIONS
    Lopez-Alt, Adriana
    Tromer, Eran
    Vaikuntanathan, Vinod
    SIAM JOURNAL ON COMPUTING, 2017, 46 (06) : 1827 - 1892
  • [23] Research Progress of Fully Homomorphic Encryption
    Lifang, Bai
    Yuefei, Zhu
    Yongjun, Li
    Shuai, Wang
    Xiaoqi, Yang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3069 - 3087
  • [24] Leakage Resilient Fully Homomorphic Encryption
    Berkoff, Alexandra
    Liu, Feng-Hao
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 515 - 539
  • [25] Fully Homomorphic Encryption with Polylog Overhead
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 465 - 482
  • [26] Fully Homomorphic Encryption: Computations with a Blindfold
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    IEEE SECURITY & PRIVACY, 2016, 14 (01) : 62 - 66
  • [27] Verifiable Decryption for Fully Homomorphic Encryption
    Luo, Fucai
    Wang, Kunpeng
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 347 - 365
  • [28] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [29] Fully homomorphic encryption and its applications
    Beijing International Center for Mathematical Research, Peking University, Beijing
    100871, China
    不详
    100084, China
    Jisuanji Yanjiu yu Fazhan, 12 (2593-2603):
  • [30] Fully homomorphic encryption: A case study
    Rauthan, J. S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (06) : 8417 - 8437