{"id":"https://openalex.org/W4386536202","doi":"https://doi.org/10.1109/jiot.2023.3313443","title":"GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems","display_name":"GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems","publication_year":2023,"publication_date":"2023-09-08","ids":{"openalex":"https://openalex.org/W4386536202","doi":"https://doi.org/10.1109/jiot.2023.3313443"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3313443","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3313443","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108587020","display_name":"Xiaodong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaodong Li","raw_affiliation_strings":["Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102553669","display_name":"Hehe Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hehe Gao","raw_affiliation_strings":["Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101609539","display_name":"Jianyi Zhang","orcid":"https://orcid.org/0000-0001-8765-053X"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianyi Zhang","raw_affiliation_strings":["Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101437939","display_name":"Shuya Yang","orcid":"https://orcid.org/0000-0003-3913-0163"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuya Yang","raw_affiliation_strings":["Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100641352","display_name":"Xin Jin","orcid":"https://orcid.org/0000-0003-3873-1653"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Jin","raw_affiliation_strings":["Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5108587020"],"corresponding_institution_ids":["https://openalex.org/I202334528"],"apc_list":null,"apc_paid":null,"fwci":2.4355,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91142574,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":"4","first_page":"6893","last_page":"6903"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.874455451965332},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6876401901245117},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.6500035524368286},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6292282938957214},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5788590312004089},{"id":"https://openalex.org/keywords/coprocessor","display_name":"Coprocessor","score":0.4970851242542267},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49212998151779175},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4851868748664856},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4773573875427246},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4277312159538269},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4094640612602234},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3522459864616394},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2765243351459503},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23857253789901733},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1551363468170166}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.874455451965332},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6876401901245117},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.6500035524368286},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6292282938957214},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5788590312004089},{"id":"https://openalex.org/C86111242","wikidata":"https://www.wikidata.org/wiki/Q859595","display_name":"Coprocessor","level":2,"score":0.4970851242542267},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49212998151779175},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4851868748664856},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4773573875427246},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4277312159538269},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4094640612602234},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3522459864616394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2765243351459503},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23857253789901733},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1551363468170166}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3313443","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3313443","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1268977951","display_name":null,"funder_award_id":"328202242","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W150223756","https://openalex.org/W2031533839","https://openalex.org/W2065632557","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2435473771","https://openalex.org/W2701059868","https://openalex.org/W2768174108","https://openalex.org/W2768347741","https://openalex.org/W2794888826","https://openalex.org/W2889746123","https://openalex.org/W2896550391","https://openalex.org/W2908477164","https://openalex.org/W2917996064","https://openalex.org/W2942255051","https://openalex.org/W2957780493","https://openalex.org/W3047898095","https://openalex.org/W3092115729","https://openalex.org/W3176904737","https://openalex.org/W3203400980","https://openalex.org/W4205423013","https://openalex.org/W4206573848","https://openalex.org/W4214619252","https://openalex.org/W4220867361","https://openalex.org/W4236580217","https://openalex.org/W4250776762","https://openalex.org/W4281391121","https://openalex.org/W4285196740","https://openalex.org/W4303684721","https://openalex.org/W4306963829","https://openalex.org/W4311091458","https://openalex.org/W4315865278","https://openalex.org/W4318065634","https://openalex.org/W4353007060","https://openalex.org/W6606067566","https://openalex.org/W6746138031","https://openalex.org/W6751853187","https://openalex.org/W6756115552","https://openalex.org/W6757619422","https://openalex.org/W6758469878","https://openalex.org/W6767709616","https://openalex.org/W6851532263"],"related_works":["https://openalex.org/W2947510282","https://openalex.org/W2363701519","https://openalex.org/W2601739120","https://openalex.org/W3028898974","https://openalex.org/W2997530193","https://openalex.org/W4310649982","https://openalex.org/W2292786713","https://openalex.org/W2942137924","https://openalex.org/W3212491810","https://openalex.org/W2384844478"],"abstract_inverted_index":{"Deep":[0],"learning,":[1],"such":[2],"as":[3,160,162],"convolutional":[4],"neural":[5],"networks":[6],"(CNNs),":[7],"has":[8],"been":[9,45],"utilized":[10],"in":[11,28,60,71,204],"a":[12,37,53,79,97,137,149,191,207],"number":[13],"of":[14,17,68,140,195,211,221],"cloud-based":[15],"Internet":[16],"Things":[18],"(IoT)":[19],"applications.":[20,73],"Security":[21],"and":[22,42,63,104,133,225],"privacy":[23,39],"are":[24],"two":[25],"key":[26],"considerations":[27],"any":[29],"commercial":[30],"deployment.":[31],"Fully":[32],"homomorphic":[33,151,218],"encryption":[34],"(FHE)":[35],"is":[36,88,226],"popular":[38],"protection":[40],"approach,":[41],"there":[43],"have":[44],"attempts":[46],"to":[47,58,65,90,142,168],"integrate":[48],"FHE":[49,84,111],"with":[50,107,126],"CNNs.":[51],"However,":[52],"simple":[54],"integration":[55],"may":[56],"lead":[57],"inefficiency":[59],"single-user":[61],"services":[62],"fail":[64],"support":[66,91],"many":[67],"the":[69,108,127,134,155,176,180,216],"requirements":[70],"real-time":[72,150,223],"In":[74],"this":[75],"article,":[76],"we":[77,95,123,147,174],"propose":[78],"novel":[80],"confused":[81,129],"modulo":[82,130],"projection-based":[83,131],"algorithm":[85],"(CMP-FHE)":[86],"that":[87,116,186],"designed":[89],"floating-point":[92],"operations.":[93],"Then,":[94],"developed":[96],"parallelized":[98],"runtime":[99],"library":[100,118,132],"based":[101],"on":[102,179],"CMP-FHE":[103],"compared":[105,124],"it":[106,125],"widely":[109],"employed":[110],"library.":[112],"Our":[113],"results":[114,135,203],"show":[115],"our":[117,187],"achieves":[119,190],"faster":[120,230],"speeds.":[121],"Furthermore,":[122],"state-of-the-art":[128],"demonstrated":[136],"speed":[138],"improvement":[139],"841.67":[141],"3056.25":[143],"times":[144,229],"faster.":[145],"Additionally,":[146],"construct":[148],"CNN":[152,219],"(RT-HCNN)":[153],"under":[154],"ciphertext-based":[156],"framework":[157],"using":[158,163],"CMP-FHE,":[159],"well":[161],"graphics":[164],"processing":[165],"units":[166],"(GPUs)":[167],"facilitate":[169],"acceleration.":[170],"To":[171],"demonstrate":[172,185],"utility,":[173],"evaluate":[175],"proposed":[177,188],"approach":[178,189],"MNIST":[181],"data":[182],"set.":[183],"Findings":[184],"high":[192],"accuracy":[193],"rate":[194],"99.13%.":[196],"Using":[197],"GPUs":[198],"acceleration":[199],"for":[200],"ciphertext":[201],"prediction":[202,209],"us":[205],"achieving":[206],"single":[208],"time":[210],"79.5":[212],"ms.":[213],"This":[214],"represents":[215],"first":[217],"capable":[220],"supporting":[222],"application":[224],"approximately":[227],"58":[228],"than":[231],"Microsoft\u2019s":[232],"Lola":[233],"scheme.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
