cuHE: A homomorphic encryption accelerator library

W Dai, B Sunar - Cryptography and Information Security in the Balkans …, 2016 - Springer
We introduce a CUDA GPU library to accelerate evaluations with homomorphic schemes
defined over polynomial rings enabled with a number of optimizations including algebraic …

High-performance FV somewhat homomorphic encryption on GPUs: An implementation using CUDA

A Al Badawi, B Veeravalli, CF Mun… - IACR Transactions on …, 2018 - tches.iacr.org
Homomorphic encryption (HE) offers great capabilities that can solve a wide range of
privacy-preserving computing problems. This tool allows anyone to process encrypted data …

Accelerating fully homomorphic encryption using GPU

W Wang, Y Hu, L Chen, X Huang… - 2012 IEEE conference …, 2012 - ieeexplore.ieee.org
As a major breakthrough, in 2009 Gentry introduced the first plausible construction of a fully
homomorphic encryption (FHE) scheme. FHE allows the evaluation of arbitrary functions …

Exploring the feasibility of fully homomorphic encryption

W Wang, Y Hu, L Chen, X Huang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In 2010, Gentry and Halevi presented the first FHE implementation. FHE allows the
evaluation of arbitrary functions directly on encrypted data on untrusted servers. However …

Accelerating fully homomorphic encryption in hardware

Y Doröz, E Öztürk, B Sunar - IEEE Transactions on Computers, 2014 - ieeexplore.ieee.org
We present a custom architecture for realizing the Gentry-Halevi fully homomorphic
encryption (FHE) scheme. This contribution presents the first full realization of FHE in …

Accelerating homomorphic evaluation on reconfigurable hardware

T Pöppelmann, M Naehrig, A Putnam… - … Hardware and Embedded …, 2015 - Springer
Homomorphic encryption allows computation on encrypted data and makes it possible to
securely outsource computational tasks to untrusted environments. However, all proposed …

Implementation and evaluation of a lattice-based key-policy ABE scheme

W Dai, Y Doröz, Y Polyakov, K Rohloff… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
In this paper, we report on our implementation of a lattice-based key-policy attribute-based
encryption (KP-ABE) scheme, which uses short secret keys. The particular KP-ABE scheme …

High throughput implementation of post-quantum key encapsulation and decapsulation on GPU for Internet of Things applications

WK Lee, SO Hwang - IEEE Transactions on Services …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) sensor nodes are placed ubiquitously to collect information, which is
then vulnerable to malicious attacks. For instance, adversaries can perform side channel …

Evaluation of large integer multiplication methods on hardware

C Rafferty, M O'Neill, N Hanley - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Multipliers requiring large bit lengths have a major impact on the performance of many
applications, such as cryptography, digital signal processing (DSP) and image processing …

VLSI design of a large-number multiplier for fully homomorphic encryption

W Wang, X Huang, N Emmart… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper presents the design of a power-and area-efficient high-speed 768000-bit
multiplier, based on fast Fourier transform multiplication for fully homomorphic encryption …