SoK: Fully Homomorphic Encryption Accelerators

被引:0
|
作者
Zhang, Junxue [1 ,2 ]
Cheng, Xiaodian [1 ]
Yang, Liu [1 ,2 ]
Hu, Jinbin [1 ]
Liu, Ximeng [3 ]
Chen, Kai [1 ]
机构
[1] The Hong Kong University of Science and Technology, Hong Kong, Hong Kong
[2] Clustar, Hong Kong, Hong Kong
[3] Fuzhou University, Fuzhou, China
基金
中国国家自然科学基金;
关键词
Colliding beam accelerators;
D O I
10.1145/3676955
中图分类号
学科分类号
摘要
Fully Homomorphic Encryption (FHE) is a key technology enabling privacy-preserving computing. However, the fundamental challenge of FHE is its inefficiency, due primarily to the underlying polynomial computations with high computation complexity and extremely time-consuming ciphertext maintenance operations. To tackle this challenge, various FHE accelerators have recently been proposed by both research and industrial communities. This article takes the first initiative to conduct a systematic study on the 14 FHE accelerators: cuHE/cuFHE, nuFHE, HEAT, HEAX, HEXL, HEXL-FPGA, 100×, F1, CraterLake, BTS, ARK, Poseidon, FAB, and TensorFHE. We first make our observations on the evolution trajectory of these existing FHE accelerators to establish a qualitative connection between them. Then, we perform testbed evaluations of representative open-source FHE accelerators to provide a quantitative comparison on them. Finally, with the insights learned from both qualitative and quantitative studies, we discuss potential directions to inform the future design and implementation for FHE accelerators. © 2024 held by the owner/author(s).
引用
收藏
相关论文
共 50 条
  • [31] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [32] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [33] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [34] On DGHV and BGV Fully Homomorphic Encryption Schemes
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [35] Minimizing ESOP Expressions for Fully Homomorphic Encryption
    Ye, Jheng-Hao
    Chen, Si-Quan
    Shieh, Ming-Der
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [36] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [37] Batched Fully Homomorphic Encryption from TFHE
    Jiang, Yuting
    Wei, Jianghong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 92 - 109
  • [38] Practical Fully Homomorphic Encryption for Fully Masked Neural Networks
    Izabachene, Malika
    Sirdey, Renaud
    Zuber, Martin
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 24 - 36
  • [39] Approximating Max Function in Fully Homomorphic Encryption
    Lee, Hyunjun
    Choi, Jina
    Lee, Younho
    ELECTRONICS, 2023, 12 (07)
  • [40] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254