{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T15:30:49Z","timestamp":1773588649090,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","funder":[{"name":"Natural Science Foundation of China","award":["62432005"],"award-info":[{"award-number":["62432005"]}]},{"name":"Natural Science Foundation of China","award":["62402282"],"award-info":[{"award-number":["62402282"]}]},{"name":"Natural Science Foundation of China","award":["62372272"],"award-info":[{"award-number":["62372272"]}]},{"name":"Shandong Provincial Natural Science Foundation","award":["ZR2024QF237"],"award-info":[{"award-number":["ZR2024QF237"]}]},{"name":"Quan Cheng Laboratory grant","award":["QCLZD202302"],"award-info":[{"award-number":["QCLZD202302"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,3,22]]},"DOI":"10.1145\/3779212.3790120","type":"proceedings-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:55:26Z","timestamp":1773150926000},"page":"25-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Developing and Optimizing Fully Homomorphic Encryption Programs on GPUs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4175-760X","authenticated-orcid":false,"given":"Jianyu","family":"Zhao","sequence":"first","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3325-0682","authenticated-orcid":false,"given":"Xueyu","family":"Wu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5389-0823","authenticated-orcid":false,"given":"Guang","family":"Fan","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6440-7550","authenticated-orcid":false,"given":"Mingzhe","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9580-5395","authenticated-orcid":false,"given":"Shoumeng","family":"Yan","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6186-5399","authenticated-orcid":false,"given":"Lei","family":"Ju","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9767-2767","authenticated-orcid":false,"given":"Zhuoran","family":"Ji","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2026,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614302"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jean-Philippe Bossuat Rosario Cammarota Ilaria Chillotti Benjamin R Curtis Wei Dai Huijing Gong Erin Hales Duhyeong Kim Bryan Kumara Changmin Lee et al. 2024. Security guidelines for implementing homomorphic encryption. Cryptology ePrint Archive (2024).","DOI":"10.62056\/anxra69p1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_21"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Machine Learning. PMLR, 812-821","author":"Brutzkus Alon","year":"2019","unstructured":"Alon Brutzkus, Ran Gilad-Bachrach, and Oren Elisha. 2019. Low latency privacy preserving inference. In International Conference on Machine Learning. PMLR, 812-821."},{"key":"e_1_3_2_1_10_1","volume-title":"Selected Areas in Cryptography","author":"Cheon Jung Hee","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2019. A full RNS variant of approximate homomorphic encryption. In Selected Areas in Cryptography. Springer, 347-368."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_12_1","first-page":"6993","volume-title":"DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption. In 33rd USENIX Security Symposium (USENIX Security 24)","author":"Cheon Seonyoung","year":"2024","unstructured":"Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, and Hanjun Kim. 2024. DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption. In 33rd USENIX Security Symposium (USENIX Security 24). 6993-7010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_15_1","volume-title":"Trinity: A General Purpose FHE Accelerator. In 2024 57th IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 338-351","author":"Deng Xianglong","year":"2024","unstructured":"Xianglong Deng, Shengyu Fan, Zhicheng Hu, Zhuoyu Tian, Zihao Yang, Jiangrui Yu, Dingyuan Cao, Dan Meng, Rui Hou, Meng Li, et al., 2024. Trinity: A General Purpose FHE Accelerator. In 2024 57th IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 338-351."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3676641.3716008"},{"key":"e_1_3_2_1_17_1","volume-title":"WarpDrive: GPU-Based Fully Homomorphic Encryption Acceleration Leveraging Tensor and CUDA Cores. In 2025 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 1187-1200","author":"Fan Guang","year":"2025","unstructured":"Guang Fan, Mingzhe Zhang, Fangyu Zheng, Shengyu Fan, Tian Zhou, Xianglong Deng, Wenxu Tang, Liang Kong, Yixuan Song, and Shoumeng Yan. 2025. WarpDrive: GPU-Based Fully Homomorphic Encryption Acceleration Leveraging Tensor and CUDA Cores. In 2025 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 1187-1200."},{"key":"e_1_3_2_1_18_1","volume-title":"Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071017"},{"key":"e_1_3_2_1_20_1","volume-title":"REDsec: Running encrypted discretized neural networks in seconds. Cryptology ePrint Archive","author":"Folkerts Lars","year":"2021","unstructured":"Lars Folkerts, Charles Gouert, and Nektarios Georgios Tsoutsos. 2021. REDsec: Running encrypted discretized neural networks in seconds. Cryptology ePrint Archive (2021)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_22_1","first-page":"83","volume-title":"USA","author":"Halevi Shai","year":"2019","unstructured":"Shai Halevi, Yuriy Polyakov, and Victor Shoup. 2019. An improved RNS variant of the BFV homomorphic encryption scheme. In Topics in Cryptology-CT-RSA 2019: The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings. Springer, 83-105."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1186\/s11782-020-00082-6"},{"key":"e_1_3_2_1_26_1","volume-title":"Jung Hee Cheon, and Younho Lee.","author":"Jung Wonkyung","year":"2021","unstructured":"Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, and Younho Lee. 2021. Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 114-148."},{"key":"e_1_3_2_1_27_1","first-page":"99","article-title":"Next-generation of virtual personal assistants (microsoft cortana, apple siri, amazon alexa and google home). In IEEE 8th annual computing and communication workshop and conference","author":"Kepuska Veton","year":"2018","unstructured":"Veton Kepuska and Gamal Bohouta. 2018. Next-generation of virtual personal assistants (microsoft cortana, apple siri, amazon alexa and google home). In IEEE 8th annual computing and communication workshop and conference. IEEE, 99-103.","journal-title":"IEEE"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95312-6_6"},{"key":"e_1_3_2_1_29_1","volume-title":"Cheddar: A Swift Fully Homomorphic Encryption Library for CUDA GPUs. arXiv preprint arXiv:2407.13055","author":"Kim Jongmin","year":"2024","unstructured":"Jongmin Kim, Wonseok Choi, and Jung Ho Ahn. 2024. Cheddar: A Swift Fully Homomorphic Encryption Library for CUDA GPUs. arXiv preprint arXiv:2407.13055 (2024)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589053"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38551-3_3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Miran Kim Yongsoo Song Shuang Wang Yuhou Xia Xiaoqian Jiang et al. 2018. Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics Vol. 6 2 (2018) e8805.","DOI":"10.2196\/medinform.8805"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3656382"},{"key":"e_1_3_2_1_36_1","volume-title":"Technical report","author":"Laine Kim","year":"2016","unstructured":"Kim Laine and Rachel Player. 2016. Simple encrypted arithmetic library-seal (v2. 0). Technical report, Technical report (2016)."},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Machine Learning. PMLR, 12403-12422","author":"Lee Eunsang","year":"2022","unstructured":"Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, and Woosuk Choi. 2022b. Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions. In International Conference on Machine Learning. PMLR, 12403-12422."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO53902.2022.9741265"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3669940.3707276"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_41_1","volume-title":"Deep learning for healthcare: review, opportunities and challenges. Briefings in bioinformatics","author":"Miotto Riccardo","year":"2018","unstructured":"Riccardo Miotto, Fei Wang, Shuang Wang, Xiaoqian Jiang, and Joel T Dudley. 2018. Deep learning for healthcare: review, opportunities and challenges. Briefings in bioinformatics, Vol. 19, 6 (2018)."},{"key":"e_1_3_2_1_42_1","volume-title":"MPCNN: A Novel Matrix Profile Approach for CNN-based Single Lead Sleep Apnea In Classification Problem","author":"Nguyen Hieu X","year":"2024","unstructured":"Hieu X Nguyen, Duong V Nguyen, Hieu H Pham, and Cuong D Do. 2024. MPCNN: A Novel Matrix Profile Approach for CNN-based Single Lead Sleep Apnea In Classification Problem. IEEE Journal of Biomedical and Health Informatics (2024)."},{"key":"e_1_3_2_1_43_1","volume-title":"HEonGPU: a GPU-based Fully Homomorphic Encryption Library. Cryptology ePrint Archive","author":"\u00d6zcan Ali \u015eah","year":"2024","unstructured":"Ali \u015eah \u00d6zcan and Erkay Sava\u015f. 2024. HEonGPU: a GPU-based Fully Homomorphic Encryption Library. Cryptology ePrint Archive (2024)."},{"key":"e_1_3_2_1_44_1","volume-title":"Jung Hee Cheon, and Jung Ho Ahn","author":"Park Jaiyoung","year":"2023","unstructured":"Jaiyoung Park, Donghwan Kim, Jongmin Kim, Sangpyo Kim, Wonkyung Jung, Jung Hee Cheon, and Jung Ho Ahn. 2023. Toward practical privacy-preserving convolutional neural networks exploiting fully homomorphic encryption. arXiv preprint arXiv:2310.16530 (2023)."},{"key":"e_1_3_2_1_45_1","volume-title":"Wonkyung Jung, and Jung Ho Ahn.","author":"Park Jaiyoung","year":"2022","unstructured":"Jaiyoung Park, Michael Jaemin Kim, Wonkyung Jung, and Jung Ho Ahn. 2022. AESPA: Accuracy preserving low-degree polynomial activation for fast private inference. arXiv preprint arXiv:2201.06699 (2022)."},{"key":"e_1_3_2_1_46_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al., 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_48_1","volume-title":"Encrypted image classification with low memory footprint using fully homomorphic encryption. Cryptology ePrint Archive","author":"Rovida Lorenzo","year":"2024","unstructured":"Lorenzo Rovida and Alberto Leporati. 2024. Encrypted image classification with low memory footprint using fully homomorphic encryption. Cryptology ePrint Archive (2024)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294446"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02984830"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614279"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00107"},{"key":"e_1_3_2_1_54_1","unstructured":"Troy. 2024. The new implementation of Troy a CUDA based GPU parallelized implementation of RLWE homomorphic encryption schemes. https:\/\/github.com\/lightbulb128\/troy-nova."},{"key":"e_1_3_2_1_55_1","first-page":"4715","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Viand Alexander","year":"2023","unstructured":"Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi. 2023. HECO: Fully homomorphic encryption compiler. In 32nd USENIX Security Symposium (USENIX Security 23). 4715-4732."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00068"},{"key":"e_1_3_2_1_57_1","volume-title":"Phantom: a cuda-accelerated word-wise homomorphic encryption library","author":"Yang Hao","year":"2024","unstructured":"Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, and Yunlei Zhao. 2024. Phantom: a cuda-accelerated word-wise homomorphic encryption library. IEEE Transactions on Dependable and Secure Computing (2024)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070984"}],"event":{"name":"ASPLOS '26: 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Pittsburgh PA USA","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T14:01:13Z","timestamp":1773583273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3779212.3790120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,22]]},"references-count":58,"alternative-id":["10.1145\/3779212.3790120","10.1145\/3779212"],"URL":"https:\/\/doi.org\/10.1145\/3779212.3790120","relation":{},"subject":[],"published":{"date-parts":[[2026,3,22]]},"assertion":[{"value":"2026-03-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}