{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:08:45Z","timestamp":1773248925408,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001348","name":"Agency for Science, Technology and Research","doi-asserted-by":"publisher","award":["RIE2020"],"award-info":[{"award-number":["RIE2020"]}],"id":[{"id":"10.13039\/501100001348","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Advanced Manufacturing and Engineering","award":["A19E3b0099"],"award-info":[{"award-number":["A19E3b0099"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2021,2,1]]},"DOI":"10.1109\/tpds.2020.3021238","type":"journal-article","created":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T20:11:27Z","timestamp":1599077487000},"page":"379-391","source":"Crossref","is-referenced-by-count":45,"title":["Multi-GPU Design and Performance Evaluation of Homomorphic Encryption on GPU Clusters"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7759-7368","authenticated-orcid":false,"given":"Ahmad","family":"Al Badawi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9000-1813","authenticated-orcid":false,"given":"Bharadwaj","family":"Veeravalli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8971-0660","authenticated-orcid":false,"given":"Jie","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5750-0995","authenticated-orcid":false,"given":"Matsumura","family":"Kazuaki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5652-3455","authenticated-orcid":false,"given":"Aung","family":"Khin Mi Mi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Toolkit documentation","author":"nvidia","year":"2014","journal-title":"NVIDIA NVIDIA CUDA C Getting Started Guide for Linux"},{"key":"ref38","author":"wilt","year":"2013","journal-title":"The CUDA Handbook A Comprehensive Guide to GPU Programming"},{"key":"ref33","article-title":"Data protection in virtual environments (DPRIVE)","author":"rondeau","year":"2020"},{"key":"ref32","article-title":"FV-NFLlib: Library implementing the fan-vercauteren homomorphic encryption scheme","year":"2016"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"69","DOI":"10.46586\/tches.v2018.i3.69-88","article-title":"Data flow oriented hardware design of RNS-based polynomial multiplication for SHE acceleration","volume":"2018","author":"cath\u00e9bras","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040950"},{"key":"ref37","article-title":"TESLA K80 GPU accelerator board specification","year":"2015"},{"key":"ref36","author":"cook","year":"2012","journal-title":"CUDA Programming A Developer's Guide to Parallel Computing with GPUs"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732520"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_17"},{"key":"ref10","first-page":"1622","article-title":"Securing the Cloud with Reconfigurable Computing: An FPGA Accelerator for Homomorphic Encryption","author":"alessandro cilardo","year":"2016","journal-title":"Design Automation Test in Europe Conference Exhibition (DATE)"},{"key":"ref40","article-title":"HElib: An implementation of homomorphic encryption","author":"halevi","year":"2014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref12","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref13","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"fan","year":"2012","journal-title":"IACR Cryptology ePrint"},{"key":"ref14","first-page":"83","article-title":"An improved RNS variant of the BFV homomorphic encryption scheme","author":"halevi","year":"2018","journal-title":"Proc RSA Conf Cryptographers' Track"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref28","article-title":"Accelerating fully homomorphic encryption over the integers with super-size hardware multiplier and modular reduction","volume":"2013","author":"cao","year":"2013","journal-title":"IACR Cryptology ePrint"},{"key":"ref4","article-title":"The MNIST database of handwritten digits","author":"lecun","year":"1998"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_8"},{"key":"ref3","article-title":"Faster cryptonets: Leveraging sparsity for real-world encrypted inference","author":"chou","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.17216"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2345388"},{"key":"ref5","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"70","DOI":"10.46586\/tches.v2018.i2.70-95","article-title":"High-performance FV somewhat homomorphic encryption on GPUs: An implementation using CUDA","volume":"2018","author":"al badawi","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref7","first-page":"169","article-title":"cuHE: A homomorphic encryption accelerator library","author":"dai","year":"2015","journal-title":"Proc Int Conf Cryptogr Inf Secur Balkans"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3014636"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_3"},{"key":"ref45","article-title":"MNIST handwritten digit database","author":"lecun","year":"2010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2902961.2902969"},{"key":"ref47","article-title":"NIST special publication 800&#x2013;57 Part 1, Revision 4","author":"barker","year":"2016"},{"key":"ref21","first-page":"12","article-title":"Design and implementation of a homomorphic-encryption library","volume":"6","author":"halevi","year":"2013","journal-title":"IBM Res"},{"key":"ref42","article-title":"PALISADE: Lattice encryption software library","author":"rohloff kurt and","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"ref41","article-title":"SEAL: Simple encrypted arithmetic library","year":"2014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_20"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706645"},{"key":"ref26","first-page":"423","article-title":"A full RNS variant of FV like somewhat homomorphic encryption schemes","author":"bajard","year":"2016","journal-title":"Proc Int Conf Sel Areas Cryptogr"},{"key":"ref43","article-title":"Integer convolution via split-radix fast galois transform","author":"crandall","year":"0","journal-title":"Center for Advanced Computation Reed College 1999"},{"key":"ref25","first-page":"666","article-title":"Efficient polynomial multiplication via modified discrete galois transform and negacyclic convolution","author":"al badawi","year":"2018","journal-title":"Proc Future Inf Commun Conf"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/9173837\/09185077.pdf?arnumber=9185077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:50:26Z","timestamp":1652194226000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9185077\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,1]]},"references-count":47,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2020.3021238","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,1]]}}}