{"id":"https://openalex.org/W2160227338","doi":"https://doi.org/10.1145/2523649.2523681","title":"GPU and CPU parallelization of honest-but-curious secure two-party computation","display_name":"GPU and CPU parallelization of honest-but-curious secure two-party computation","publication_year":2013,"publication_date":"2013-12-09","ids":{"openalex":"https://openalex.org/W2160227338","doi":"https://doi.org/10.1145/2523649.2523681","mag":"2160227338"},"language":"en","primary_location":{"id":"doi:10.1145/2523649.2523681","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2523649.2523681","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080686794","display_name":"Nathaniel Husted","orcid":null},"institutions":[{"id":"https://openalex.org/I592451","display_name":"Indiana University","ror":"https://ror.org/01kg8sb98","country_code":"US","type":"education","lineage":["https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nathaniel Husted","raw_affiliation_strings":["Indiana University"],"affiliations":[{"raw_affiliation_string":"Indiana University","institution_ids":["https://openalex.org/I592451"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075913896","display_name":"Steven Myers","orcid":"https://orcid.org/0000-0001-8885-8770"},"institutions":[{"id":"https://openalex.org/I592451","display_name":"Indiana University","ror":"https://ror.org/01kg8sb98","country_code":"US","type":"education","lineage":["https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steven Myers","raw_affiliation_strings":["Indiana University"],"affiliations":[{"raw_affiliation_string":"Indiana University","institution_ids":["https://openalex.org/I592451"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001754506","display_name":"Abhi Shelat","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhi Shelat","raw_affiliation_strings":["University of Virginia"],"affiliations":[{"raw_affiliation_string":"University of Virginia","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042881560","display_name":"Paul Grubbs","orcid":null},"institutions":[{"id":"https://openalex.org/I592451","display_name":"Indiana University","ror":"https://ror.org/01kg8sb98","country_code":"US","type":"education","lineage":["https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Grubbs","raw_affiliation_strings":["Indiana University"],"affiliations":[{"raw_affiliation_string":"Indiana University","institution_ids":["https://openalex.org/I592451"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080686794"],"corresponding_institution_ids":["https://openalex.org/I592451"],"apc_list":null,"apc_paid":null,"fwci":7.9653,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.97252335,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"169","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.913011908531189},{"id":"https://openalex.org/keywords/simd","display_name":"SIMD","score":0.7460488080978394},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.6905140280723572},{"id":"https://openalex.org/keywords/mimd","display_name":"MIMD","score":0.5664200186729431},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5310288667678833},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5193803906440735},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5044258832931519},{"id":"https://openalex.org/keywords/embarrassingly-parallel","display_name":"Embarrassingly parallel","score":0.49785351753234863},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4867982566356659},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.46326735615730286},{"id":"https://openalex.org/keywords/parallel-algorithm","display_name":"Parallel algorithm","score":0.18311738967895508},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09271347522735596},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08448302745819092}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.913011908531189},{"id":"https://openalex.org/C150552126","wikidata":"https://www.wikidata.org/wiki/Q339387","display_name":"SIMD","level":2,"score":0.7460488080978394},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.6905140280723572},{"id":"https://openalex.org/C21032095","wikidata":"https://www.wikidata.org/wiki/Q1149237","display_name":"MIMD","level":2,"score":0.5664200186729431},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5310288667678833},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5193803906440735},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5044258832931519},{"id":"https://openalex.org/C126909462","wikidata":"https://www.wikidata.org/wiki/Q5369501","display_name":"Embarrassingly parallel","level":3,"score":0.49785351753234863},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4867982566356659},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.46326735615730286},{"id":"https://openalex.org/C120373497","wikidata":"https://www.wikidata.org/wiki/Q1087987","display_name":"Parallel algorithm","level":2,"score":0.18311738967895508},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09271347522735596},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08448302745819092},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2523649.2523681","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2523649.2523681","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1773876632","display_name":null,"funder_award_id":"1111149","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W54526233","https://openalex.org/W173953576","https://openalex.org/W186989516","https://openalex.org/W190228621","https://openalex.org/W1480225633","https://openalex.org/W1502797194","https://openalex.org/W1521253015","https://openalex.org/W1521730416","https://openalex.org/W1534543185","https://openalex.org/W1826277484","https://openalex.org/W1986960937","https://openalex.org/W2013623332","https://openalex.org/W2023951105","https://openalex.org/W2088492763","https://openalex.org/W2106217851","https://openalex.org/W2109621248","https://openalex.org/W2118017137","https://openalex.org/W2119948977","https://openalex.org/W2134340933","https://openalex.org/W2169802112","https://openalex.org/W2188232729","https://openalex.org/W2246792095","https://openalex.org/W2247376876","https://openalex.org/W2350778671","https://openalex.org/W2402235285","https://openalex.org/W2561675875","https://openalex.org/W2914012796","https://openalex.org/W2953366457","https://openalex.org/W6605290416","https://openalex.org/W6606928740"],"related_works":["https://openalex.org/W1980986440","https://openalex.org/W3158884034","https://openalex.org/W4388314704","https://openalex.org/W1971361763","https://openalex.org/W2014030893","https://openalex.org/W2167983067","https://openalex.org/W2065177255","https://openalex.org/W2125719717","https://openalex.org/W4238073022","https://openalex.org/W2095387177"],"abstract_inverted_index":{"Recent":[0],"work":[1],"demonstrates":[2],"the":[3,21,39,50,64,80,111,114,145,176,188,199,211,221],"feasibility":[4],"and":[5,41,58,73,108,128,168],"practical":[6],"use":[7,75],"of":[8,28,49,76,79,94,113,125,135,149,155,170,178,191,204,213],"secure":[9,36,157],"two-party":[10,35],"computation":[11,37,158],"[5,":[12],"9,":[13],"15,":[14],"23].":[15],"In":[16,96,181],"this":[17],"work,":[18],"we":[19,100,109,160,183],"present":[20],"first":[22,65],"Graphical":[23],"Processing":[24],"Unit":[25],"(GPU)-optimized":[26],"implementation":[27,62,90],"an":[29],"optimized":[30,88],"Yao's":[31],"garbled-circuit":[32],"protocol":[33,52],"for":[34,89,224,235],"in":[38],"honest-but-curious":[40],"1-bit-leaked":[42],"malicious":[43],"models.":[44],"We":[45],"implement":[46],"nearly":[47],"all":[48],"modern":[51,119,192],"advancements,":[53],"such":[54],"as":[55],"Free-XOR,":[56],"Pipelining,":[57],"OT":[59],"extension.":[60],"Our":[61],"is":[63,87],"allowing":[66],"entire":[67],"circuits":[68,143],"to":[69,220],"be":[70],"generated":[71],"concurrently,":[72],"makes":[74],"a":[77,123,133,156],"modification":[78],"XOR":[81],"technique":[82],"so":[83],"that":[84,152,162,172,185],"circuit":[85],"generation":[86],"on":[91,118,141,187,215,231],"SIMD":[92,189],"architectures":[93,234],"GPUs.":[95],"our":[97],"best":[98],"cases":[99],"generate":[101],"about":[102,126,132],"75":[103],"million":[104],"gates":[105],"per":[106],"second":[107],"exceed":[110],"state":[112],"art":[115],"performance":[116,177],"metrics":[117],"CPU":[120],"systems":[121,130],"by":[122,131],"factor":[124,134],"200,":[127],"GPU":[129],"2.3.":[136],"While":[137],"many":[138,150,225],"recent":[139],"works":[140],"garbled":[142],"exploit":[144],"embarrassingly":[146],"parallel":[147,233],"nature":[148],"tasks":[151],"are":[153,164],"part":[154],"protocol,":[159],"show":[161],"there":[163],"still":[165],"various":[166],"forms":[167],"levels":[169],"parallelization":[171],"may":[173],"yet":[174],"improve":[175],"these":[179],"protocols.":[180],"particular,":[182],"highlight":[184],"implementations":[186],"architecture":[190,203],"GPUs":[193],"require":[194],"significantly":[195],"different":[196],"approaches":[197],"than":[198],"general":[200],"purpose":[201],"MIMD":[202],"multi-core":[205],"CPUs,":[206],"which":[207],"again":[208],"differ":[209],"from":[210],"needs":[212],"parallelizing":[214],"compute":[216],"clusters.":[217],"Additionally,":[218],"modifications":[219],"security":[222],"models":[223],"common":[226],"protocols":[227],"have":[228],"large":[229],"effects":[230],"reasonable":[232],"implementation.":[236]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
