{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:23:15Z","timestamp":1777339395191,"version":"3.51.4"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"National Natural Science Fund of China for Distinguished Young Scholars","award":["62125208"],"award-info":[{"award-number":["62125208"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202467"],"award-info":[{"award-number":["62202467"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1109\/tpds.2022.3228628","type":"journal-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T20:14:32Z","timestamp":1673295272000},"page":"1067-1081","source":"Crossref","is-referenced-by-count":39,"title":["HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8150-1792","authenticated-orcid":false,"given":"Zhiwei","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5109-3495","authenticated-orcid":false,"given":"Peinan","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9215-7632","authenticated-orcid":false,"given":"Rui","family":"Hou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"}]},{"given":"Zhihao","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"}]},{"given":"Jiangfeng","family":"Cao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University at Bloomington, Bloomington, IN, USA"}]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.29007\/drnc"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.04.015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref7","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref8","article-title":"CryptoDL: Deep neural networks over encrypted data","author":"Hesamifard","year":"2017"},{"key":"ref9","article-title":"Faster CryptoNets: Leveraging sparsity for real-world encrypted inference","author":"Chou","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2020.3014636"},{"key":"ref11","first-page":"10035","article-title":"SHE: A fast and accurate deep neural network for encrypted data","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lou"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref14","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"ref21","article-title":"BTS: An accelerator for bootstrappable fully homomorphic encryption","author":"Kim","year":"2021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"ref23","article-title":"BASALISC: Flexible asynchronous hardware accelerator for fully homomorphic encryption","author":"Geelen","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29172-7_11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.70-95"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3096189"},{"key":"ref27","article-title":"Encrypted cloud using GPUs","author":"Zheng","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/2003354"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03980-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_21"},{"key":"ref33","first-page":"1","article-title":"Design and implementation of HElib: A homomorphic encryption library","author":"Halevi","year":"2020","journal-title":"Cryptol. ePrint Arch."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2307\/2004932"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.154"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_21"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2010.5470477"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_19"},{"key":"ref41","article-title":"Better performance at lower occupancy","volume-title":"Proc. GPU Technol. Conf.","author":"Volkov"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3205289.3205294"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2015.7054183"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1959.5219515"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref47","first-page":"3","article-title":"Simple encrypted arithmetic library - seal V2.1","volume-title":"Proc. Int. Conf. Financial Cryptogr. Data Secur.","author":"Hao"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3096189"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"ref50","first-page":"1","article-title":"PTX: Parallel thread execution ISA version 2.3","volume-title":"Dostopno na","volume":"3","author":"Compute","year":"2010"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.102"},{"key":"ref52","article-title":"Nsight compute roofline analysis"},{"key":"ref53","article-title":"Homomorphic encryption security standard","author":"Albrecht","year":"2018"},{"key":"ref55","article-title":"Palisade lattice cryptography library user manual","volume-title":"Cybersecurity Res. Center, New Jersey Inst. Technol.","volume":"15","author":"Polyakov","year":"2017"},{"key":"ref56","article-title":"Cooperative groups: Flexible CUDA thread programming","author":"Harris","year":"2017"},{"key":"ref57","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Paszke"},{"key":"ref58","article-title":"The MNIST database of handwritten digits","author":"LeCun","year":"1998"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408660"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865755"},{"key":"ref63","article-title":"Accelerating BGV scheme of fully homomorphic encryption using GPUs","author":"Dong","year":"2016"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12612-4_5"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3021238"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref70","first-page":"1","article-title":"CUDA-accelerated RNS multiplication in word-wise homomorphic encryption schemes","author":"Shen","year":"2022","journal-title":"Cryptol. ePrint Arch."},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref72","article-title":"CUDA-accelerated fully homomorphic encryption library","author":"Dai","year":"2018"},{"key":"ref73","article-title":"NuFHE, a GPU-powered torus fhe implementation","author":"Opanchuk","year":"2020"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300288"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040950"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023255"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2022.3198628"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/hpca56546.2023.10070953"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988765"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/10043602\/10012383.pdf?arnumber=10012383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T14:40:49Z","timestamp":1709390449000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10012383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":79,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2022.3228628","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}