2023
DOI: 10.3390/s23104594
|View full text |Cite
|
Sign up to set email alerts
|

Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption

Abstract: The increasing ubiquity of big data and cloud-based computing has led to increased concerns regarding the privacy and security of user data. In response, fully homomorphic encryption (FHE) was developed to address this issue by enabling arbitrary computation on encrypted data without decryption. However, the high computational costs of homomorphic evaluations restrict the practical application of FHE schemes. To tackle these computational and memory challenges, a variety of optimization approaches and accelera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 26 publications
(53 reference statements)
0
0
0
Order By: Relevance
“…The no sw lanes are not shown in the figure but synchronized in the similar way as key sw lane. It should be noted that different from other designs [24,28], the length of each block in the timing chart is not related to the latency of any block as there is no pipeline blocking. Each block is a subpolynomial sequence with the length of 𝑁 𝑠𝑢𝑏 𝑝𝑜𝑙𝑦 , which is 2048 clock cycles in this design.…”
Section: Ciphertext Multiplier Architecturementioning
confidence: 94%
See 3 more Smart Citations
“…The no sw lanes are not shown in the figure but synchronized in the similar way as key sw lane. It should be noted that different from other designs [24,28], the length of each block in the timing chart is not related to the latency of any block as there is no pipeline blocking. Each block is a subpolynomial sequence with the length of 𝑁 𝑠𝑢𝑏 𝑝𝑜𝑙𝑦 , which is 2048 clock cycles in this design.…”
Section: Ciphertext Multiplier Architecturementioning
confidence: 94%
“…A high throughput and pipelined NTT/INTT design proposed in [32] is used in our design. Unlike the NTT/INTT blocks used in other key switching designs [24,26,27,28], our block dose not require RAM access, which ensures the entire pipeline is not blocked by potential access conflict. However, the original NTT/INTT design is on a small parameter set and the twiddle factors for NTT/INTT are saved on chip, which consumes huge area for large parameter set.…”
Section: Ntt and Inttmentioning
confidence: 99%
See 2 more Smart Citations
“…These units are constructed using two-parallel multi-path delay feedback (MDF) architecture, which enables NTT and INTT executions to generate coefficients every clock cycle in a fully pipelined manner. Different from a prior study [18], we targeted various polynomial degrees and larger integer moduli for practical HE schemes. The proposed NTT and INTT units are configurable to support various polynomial degrees by manipulating the multiplexer selection signal.…”
Section: Proposed Configurable Ntt and Intt Architecturesmentioning
confidence: 99%