{"id":"https://openalex.org/W7127279084","doi":"https://doi.org/10.1109/tii.2025.3648441","title":"HI-CKKS: Is High-Throughput Neglected? Reimagining CKKS Efficiency With Parallelism","display_name":"HI-CKKS: Is High-Throughput Neglected? Reimagining CKKS Efficiency With Parallelism","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7127279084","doi":"https://doi.org/10.1109/tii.2025.3648441"},"language":null,"primary_location":{"id":"doi:10.1109/tii.2025.3648441","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3648441","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124935105","display_name":"Fuyuan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fuyuan Chen","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0000-1447-9962","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017411757","display_name":"Jiankuo Dong","orcid":"https://orcid.org/0000-0003-1693-3000"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiankuo Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-1693-3000","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaoyu Hu","orcid":"https://orcid.org/0009-0006-9381-0177"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Hu","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0006-9381-0177","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124885832","display_name":"Zhenjiang Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenjiang Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0001-1213-8686","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075504049","display_name":"Wangchen Dai","orcid":"https://orcid.org/0000-0002-5192-1649"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wangchen Dai","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-5192-1649","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5124935105"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21896562,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"4","first_page":"3180","last_page":"3191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.32429999113082886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.32429999113082886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.19699999690055847,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.17579999566078186,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8999999761581421},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.7249000072479248},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5210999846458435},{"id":"https://openalex.org/keywords/coprocessor","display_name":"Coprocessor","score":0.5170000195503235},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.48489999771118164},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4090999960899353},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.40720000863075256},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.39399999380111694}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8999999761581421},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8636999726295471},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.7249000072479248},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5336999893188477},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5210999846458435},{"id":"https://openalex.org/C86111242","wikidata":"https://www.wikidata.org/wiki/Q859595","display_name":"Coprocessor","level":2,"score":0.5170000195503235},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.48489999771118164},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4090999960899353},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.40720000863075256},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.39399999380111694},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.35749998688697815},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35179999470710754},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33329999446868896},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.28850001096725464},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.28380000591278076},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2822999954223633},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.25589999556541443},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2025.3648441","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3648441","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6582251787185669}],"awards":[{"id":"https://openalex.org/G2495722029","display_name":null,"funder_award_id":"62572255","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3156605515","display_name":null,"funder_award_id":"62372417","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4021021469","display_name":null,"funder_award_id":"62302238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,22],"rapid":[1],"advancement":[2],"of":[3,7,54,164,239],"the":[4,50,162],"Industrial":[5],"Internet":[6],"Things":[8],"(IIoT)":[9],"has":[10,39],"positioned":[11],"data":[12,36],"privacy":[13,47],"protection":[14],"as":[15,41],"a":[16,42,88,107,144,233],"critical":[17],"challenge":[18],"in":[19,62,117,229,242],"smart":[20],"manufacturing.":[21],"Cheon\u2013Kim\u2013Kim\u2013Song":[23],"(CKKS)":[24],"homomorphic":[25,55,92,147,168,218,240],"encryption":[26,241],"scheme,":[27],"with":[28],"its":[29,59],"floating-point":[30],"approximation":[31],"and":[32,131,167,179,208,231],"single":[33],"instruction":[34,126],"multiple":[35],"support":[37],"capabilities,":[38],"emerged":[40],"vital":[43],"technology":[44],"for":[45,96,151,206,217,226],"IIoT":[46,152,230],"preservation.":[48],"However,":[49],"high":[51],"computational":[52],"complexity":[53],"multiplication":[56,93,148,169],"significantly":[57,135],"constrains":[58],"application":[60],"performance":[61,99,237],"real-world":[63],"industrial":[64],"scenarios.":[65,245],"While":[66],"existing":[67],"optimizations":[68],"primarily":[69],"focus":[70],"on":[71,75,193],"latency":[72],"reduction,":[73],"research":[74],"high-throughput":[76,90],"parallel":[77,146],"optimization":[78,94,123,238],"remains":[79],"notably":[80],"insufficient.":[81],"To":[82],"address":[83],"this,":[84],"we":[85,112,142],"propose":[86],"HI-CKKS,":[87],"GPU-based":[89],"CKKS":[91],"scheme":[95],"IIoT,":[97],"achieving":[98],"breakthroughs":[100],"through":[101],"multilevel":[102],"technical":[103],"innovations.":[104],"By":[105],"designing":[106],"batch-processing":[108],"asynchronous":[109],"execution":[110],"architecture,":[111],"resolve":[113],"host-server":[114],"interaction":[115],"delays":[116],"edge-cloud":[118,243],"collaboration.":[119],"A":[120],"hierarchical":[121],"hybrid":[122],"strategy":[124],"combining":[125],"set":[127],"acceleration,":[128],"kernel":[129],"fusion,":[130],"dynamic":[132],"memory":[133],"management":[134],"enhances":[136],"(I)NTT":[137,207],"operation":[138],"efficiency.":[139],"In":[140],"addition,":[141],"construct":[143],"multidimensional":[145],"model":[149],"tailored":[150],"high-concurrency":[153],"task":[154],"characteristics.":[155],"Experimental":[156],"results":[157],"show":[158],"that":[159],"HI-CKKS":[160,196],"improves":[161],"throughput":[163],"NTT,":[165],"INTT,":[166],"by":[170],"<inline-formula":[171,175,180,198,209],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[172,176,181,199,202,210,213],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[173,177,182,200,203,211,214],"notation=\"LaTeX\">$175.08\\times$</tex-math></inline-formula>,":[174],"notation=\"LaTeX\">$191.27\\times$</tex-math></inline-formula>,":[178],"notation=\"LaTeX\">$679.57\\times$</tex-math></inline-formula>":[183],"over":[184],"CPU":[185],"baselines.":[186],"When":[187],"compared":[188],"to":[189,236],"state-of-the-art":[190],"GPU":[191],"implementations":[192],"similar":[194],"platforms,":[195],"attains":[197],"notation=\"LaTeX\">$1.54\\times$</tex-math></inline-formula>\u2013<inline-formula":[201],"notation=\"LaTeX\">$14.70\\times$</tex-math></inline-formula>":[204],"speedup":[205,216],"notation=\"LaTeX\">$55.8\\times$</tex-math></inline-formula>\u2013<inline-formula":[212],"notation=\"LaTeX\">$266.87\\times$</tex-math></inline-formula>":[215],"multiplication.":[219],"Our":[220],"work":[221],"provides":[222],"an":[223],"efficient":[224],"solution":[225],"secure":[227],"computation":[228],"offers":[232],"new":[234],"approach":[235],"collaborative":[244]},"counts_by_year":[],"updated_date":"2026-04-07T06:01:17.266235","created_date":"2026-02-04T00:00:00"}
