{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:56Z","timestamp":1755907736898,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,14]]},"DOI":"10.1145\/3656019.3676893","type":"proceedings-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T10:34:08Z","timestamp":1728642848000},"page":"121-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["BoostCom: Towards Efficient Universal Fully Homomorphic Encryption by Boosting the Word-wise Comparisons"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1946-0555","authenticated-orcid":false,"given":"Ardhi Wiratama Baskara","family":"Yudha","sequence":"first","affiliation":[{"name":"University of Central Florida, USA and Advanced Micro Devices, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8674-7139","authenticated-orcid":false,"given":"Jiaqi","family":"Xue","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5462-2567","authenticated-orcid":false,"given":"Qian","family":"Lou","sequence":"additional","affiliation":[{"name":"University of Central Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0722","authenticated-orcid":false,"given":"Huiyang","family":"Zhou","sequence":"additional","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8863-941X","authenticated-orcid":false,"given":"Yan","family":"Solihin","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data. Privacy Enhancing Technology Symposium (PETs) 2023 (2023","author":"Aharoni Ehud","year":"2023","unstructured":"Ehud Aharoni, Allon Adir, Moran Baruch, Nir Drucker, Gilad Ezov, Ariel Farkash, Lev Greenberg, Ramy Masalha, Guy Moshkowich, Dov Murik, Hayim Shaul, and Omri Soceanu. 2023. HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data. Privacy Enhancing Technology Symposium (PETs) 2023 (2023). https:\/\/petsymposium.org\/popets\/2023\/popets-2023-0020.php"},{"key":"e_1_3_2_1_2_1","volume-title":"ACM Annual Conference on Computer and Communications Security.","author":"Aharoni Ehud","year":"2022","unstructured":"Ehud Aharoni, Nir Drucker, and Hayim Shaul. 2022. Advanced HE packing methods with applications to ML. In ACM Annual Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00032"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486926"},{"key":"e_1_3_2_1_6_1","volume-title":"CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes. Cryptology ePrint Archive, Paper 2018\/758. https:\/\/eprint.iacr.org\/2018\/758 https:\/\/eprint.iacr.org\/2018\/758.","author":"Boura Christina","year":"2018","unstructured":"Christina Boura, Nicolas Gama, Mariya Georgieva, and Dimitar Jetchev. 2018. CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes. Cryptology ePrint Archive, Paper 2018\/758. https:\/\/eprint.iacr.org\/2018\/758 https:\/\/eprint.iacr.org\/2018\/758."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"volume-title":"Cape Privacy: Privacy & trust management for machine learning. https:\/\/capeprivacy.com\/.","year":"2021","key":"e_1_3_2_1_8_1","unstructured":"CapePrivacy. 2021. Cape Privacy: Privacy & trust management for machine learning. https:\/\/capeprivacy.com\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_10_1","unstructured":"Jung\u00a0Hee Cheon Dongwoo Kim and Duhyeong Kim. 2019. Efficient Homomorphic Comparison Methods with Optimal Complexity. Cryptology ePrint Archive Paper 2019\/1234. https:\/\/eprint.iacr.org\/2019\/1234 https:\/\/eprint.iacr.org\/2019\/1234."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_12_1","unstructured":"DualityTechnologies. 2022. DualityTechnologies: Data encryption technology and secure collaboration. https:\/\/dualitytech.com\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_15_1","volume-title":"Smart","author":"Gentry Craig","year":"2012","unstructured":"Craig Gentry, Shai Halevi, and Nigel\u00a0P. Smart. 2012. Fully Homomorphic Encryption with Polylog Overhead. In Advances in Cryptology \u2013 EUROCRYPT 2012, David Pointcheval and Thomas Johansson (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 465\u2013482."},{"volume-title":"Samurai Media Limited","author":"Granlund Torbjrn","key":"e_1_3_2_1_16_1","unstructured":"Torbjrn Granlund and Gmp\u00a0Development Team. 2015. GNU MP 6.0 Multiple Precision Arithmetic Library. Samurai Media Limited, London, GBR."},{"key":"e_1_3_2_1_17_1","unstructured":"Shai Halevi and Victor Shoup. 2020. Design and implementation of HElib: a homomorphic encryption library. Cryptology ePrint Archive Paper 2020\/1481. https:\/\/eprint.iacr.org\/2020\/1481 https:\/\/eprint.iacr.org\/2020\/1481."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ilia Iliashenko and Vincent Zucca. 2021. Faster homomorphic comparison operations for BGV and BFV. Cryptology ePrint Archive Paper 2021\/315. https:\/\/eprint.iacr.org\/2021\/315 https:\/\/eprint.iacr.org\/2021\/315.","DOI":"10.2478\/popets-2021-0046"},{"volume-title":"Inpher: Secret computing and privacy-preserving analytics. https:\/\/www.inpher.io\/.","year":"2022","key":"e_1_3_2_1_19_1","unstructured":"Inpher. 2022. Inpher: Secret computing and privacy-preserving analytics. https:\/\/www.inpher.io\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Lei Jiang and Lei Ju. 2022. FHEBench: Benchmarking Fully Homomorphic Encryption Schemes. arxiv:2203.00728\u00a0[cs.CR]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589053"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3155882"},{"key":"e_1_3_2_1_26_1","volume-title":"Jiaqi Xue, and Yan Solihin.","author":"Lou Qian","year":"2023","unstructured":"Qian Lou, Muhammad Santriaji, Ardhi Wiratama\u00a0Baskara Yudha, Jiaqi Xue, and Yan Solihin. 2023. vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash. arxiv:2303.08886\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2303.08886"},{"key":"e_1_3_2_1_27_1","volume-title":"2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1057\u20131073","author":"Huang Zhicong","year":"2021","unstructured":"Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, and Hunter Qu. 2021. PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1057\u20131073."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265583"},{"key":"e_1_3_2_1_29_1","unstructured":"Ozgun Ozerk Can Elgezen Ahmet\u00a0Can Mert Erdinc Ozturk and Erkay Savas. 2021. Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption. Cryptology ePrint Archive Paper 2021\/124. https:\/\/eprint.iacr.org\/2021\/124 https:\/\/eprint.iacr.org\/2021\/124."},{"key":"e_1_3_2_1_30_1","unstructured":"NVIDIA Pascal. 2016. NVIDIA Tesla P100 Whitepaper."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","key":"e_1_3_2_1_34_1","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3227874"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614279"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED55351.2022.00013"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2967740"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3228628"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00024"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS51385.2021.00017"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v15i4.6049"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524059.3532361"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218664"},{"key":"e_1_3_2_1_46_1","unstructured":"Zama. 2022. Concrete ML. https:\/\/www.zama.ai\/concrete-ml."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071133"}],"event":{"name":"PACT '24: International Conference on Parallel Architectures and Compilation Techniques","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Long Beach CA USA","acronym":"PACT '24"},"container-title":["Proceedings of the 2024 International Conference on Parallel Architectures and Compilation Techniques"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656019.3676893","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656019.3676893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:55:15Z","timestamp":1755892515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656019.3676893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,13]]},"references-count":47,"alternative-id":["10.1145\/3656019.3676893","10.1145\/3656019"],"URL":"https:\/\/doi.org\/10.1145\/3656019.3676893","relation":{},"subject":[],"published":{"date-parts":[[2024,10,13]]},"assertion":[{"value":"2024-10-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}