2017
DOI: 10.1109/tetc.2016.2619669
|View full text |Cite
|
Sign up to set email alerts
|

Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(35 citation statements)
references
References 21 publications
0
35
0
Order By: Relevance
“…In this paper we design our domain specific processor architecture to support applications with small multiplicative depth, say up to 4. This multiplicative depth is enough to support several statistical applications such as privacy-friendly forecasting for the smart grid [4], evaluation of low-complexity block cipher such as Rasta [25] on ciphertext, private information retrieval or encrypted search in a table of 2 16 entries, encrypted sorting etc. To achieve a multiplicative depth of four and at least 80-bit security [26], we set the size of modulus q to 180-bit, the length of polynomials to 4096 coefficients, the standard deviation of the error distribution to 102 and the width of the larger modulus Q to at least 372-bit.…”
Section: Parameter Setmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper we design our domain specific processor architecture to support applications with small multiplicative depth, say up to 4. This multiplicative depth is enough to support several statistical applications such as privacy-friendly forecasting for the smart grid [4], evaluation of low-complexity block cipher such as Rasta [25] on ciphertext, private information retrieval or encrypted search in a table of 2 16 entries, encrypted sorting etc. To achieve a multiplicative depth of four and at least 80-bit security [26], we set the size of modulus q to 180-bit, the length of polynomials to 4096 coefficients, the standard deviation of the error distribution to 102 and the width of the larger modulus Q to at least 372-bit.…”
Section: Parameter Setmentioning
confidence: 99%
“…In the literature there are several reported hardware implementation that try to speedup performance of HE schemes [11,12,13,14,15,16,17,18,19,20,21]. Several of these reported implementations report only simulation based results.…”
Section: Introductionmentioning
confidence: 99%
“…In 2016, the FPGA-based computing accelerator was used as part of a co-processor homomorphic encryption processing unit to execute important computing applications [19]. Advanced design and computation accelerators based on FPGA are introduced in this study as part of a co-processor homomorphic encryption processing unit.…”
Section: Related Workmentioning
confidence: 99%
“…A non-uniform distribution, which forms no plausible meaning signifies an incorrect plaintext and key. Moreover, the advent of high-processing tools such as FPGA, GPU also makes the brute-force attack to be highly successful [14], [15], [16]. Therefore, an attacker that intercepts an encrypted message has a high chance of recovering the key and subsequently the message encrypted under such key by using the distinguisher techniquewhich is to judge the decryption output based on the distribution/structure of the message.…”
Section: Introductionmentioning
confidence: 99%