SoK: Fully Homomorphic Encryption Accelerators

被引:0
|
作者
Zhang, Junxue [1 ,2 ]
Cheng, Xiaodian [1 ]
Yang, Liu [1 ,2 ]
Hu, Jinbin [1 ]
Liu, Ximeng [3 ]
Chen, Kai [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
[2] Clustar, Hong Kong, Peoples R China
[3] Fuzhou Univ, Fuzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Fully homomorphic encryption; accelerator;
D O I
10.1145/3676955
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fully Homomorphic Encryption (FHE) is a key technology enabling privacy-preserving computing. However, the fundamental challenge of FHE is its inefficiency, due primarily to the underlying polynomial computations with high computation complexity and extremely time-consuming ciphertext maintenance operations. To tackle this challenge, various FHE accelerators have recently been proposed by both research and industrial communities. This article takes the first initiative to conduct a systematic study on the 14 FHE accelerators: cuHE/cuFHE, nuFHE, HEAT, HEAX, HEXL, HEXL-FPGA, 100x, F1, CraterLake, BTS, ARK, Poseidon, FAB, and TensorFHE. We first make our observations on the evolution trajectory of these existing FHE accelerators to establish a qualitative connection between them. Then, we perform testbed evaluations of representative open-source FHE accelerators to provide a quantitative comparison on them. Finally, with the insights learned from both qualitative and quantitative studies, we discuss potential directions to inform the future design and implementation for FHE accelerators.
引用
收藏
页数:32
相关论文
共 50 条
  • [21] HECO: Fully Homomorphic Encryption Compiler
    Viand, Alexander
    Jattke, Patrick
    Haller, Miro
    Hithnawi, Anwar
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4715 - 4732
  • [22] Fully Homomorphic Encryption with Auxiliary Inputs
    Wang, Fuqun
    Wang, Kunpeng
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 220 - 238
  • [23] Better Bootstrapping in Fully Homomorphic Encryption
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 1 - 16
  • [24] Research Progress of Fully Homomorphic Encryption
    Lifang, Bai
    Yuefei, Zhu
    Yongjun, Li
    Shuai, Wang
    Xiaoqi, Yang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3069 - 3087
  • [25] MULTIKEY FULLY HOMOMORPHIC ENCRYPTION AND APPLICATIONS
    Lopez-Alt, Adriana
    Tromer, Eran
    Vaikuntanathan, Vinod
    SIAM JOURNAL ON COMPUTING, 2017, 46 (06) : 1827 - 1892
  • [26] Leakage Resilient Fully Homomorphic Encryption
    Berkoff, Alexandra
    Liu, Feng-Hao
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 515 - 539
  • [27] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [28] Fully Homomorphic Encryption with Polylog Overhead
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 465 - 482
  • [29] Verifiable Decryption for Fully Homomorphic Encryption
    Luo, Fucai
    Wang, Kunpeng
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 347 - 365
  • [30] Fully Homomorphic Encryption: Computations with a Blindfold
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    IEEE SECURITY & PRIVACY, 2016, 14 (01) : 62 - 66