{"id":"https://openalex.org/W4289600035","doi":"https://doi.org/10.1145/3508352.3549415","title":"Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic","display_name":"Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic","publication_year":2022,"publication_date":"2022-10-30","ids":{"openalex":"https://openalex.org/W4289600035","doi":"https://doi.org/10.1145/3508352.3549415"},"language":"en","primary_location":{"id":"doi:10.1145/3508352.3549415","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508352.3549415","pdf_url":null,"source":{"id":"https://openalex.org/S4363608844","display_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071386756","display_name":"Eduardo Chielle","orcid":"https://orcid.org/0000-0002-1938-912X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eduardo Chielle","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026224233","display_name":"Oleg Mazonka","orcid":"https://orcid.org/0000-0001-5131-9044"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Oleg Mazonka","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022868555","display_name":"Homer Gamil","orcid":"https://orcid.org/0000-0003-3256-783X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Homer Gamil","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michail Maniatakos","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071386756"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6236,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.6716225,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.710024893283844},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7083940505981445},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.6974032521247864},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.6461992263793945},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6387642025947571},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5494422912597656},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5158388018608093},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4907034635543823},{"id":"https://openalex.org/keywords/arbitrary-precision-arithmetic","display_name":"Arbitrary-precision arithmetic","score":0.48665791749954224},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46959224343299866},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.42431578040122986},{"id":"https://openalex.org/keywords/saturation-arithmetic","display_name":"Saturation arithmetic","score":0.42014995217323303},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4044642448425293},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2705814838409424},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23554083704948425},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11873370409011841}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.710024893283844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7083940505981445},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.6974032521247864},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.6461992263793945},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6387642025947571},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5494422912597656},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5158388018608093},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4907034635543823},{"id":"https://openalex.org/C83581934","wikidata":"https://www.wikidata.org/wiki/Q527381","display_name":"Arbitrary-precision arithmetic","level":2,"score":0.48665791749954224},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46959224343299866},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.42431578040122986},{"id":"https://openalex.org/C182775192","wikidata":"https://www.wikidata.org/wiki/Q913725","display_name":"Saturation arithmetic","level":3,"score":0.42014995217323303},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4044642448425293},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2705814838409424},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23554083704948425},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11873370409011841},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508352.3549415","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508352.3549415","pdf_url":null,"source":{"id":"https://openalex.org/S4363608844","display_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W913176383","https://openalex.org/W1994870682","https://openalex.org/W2012032225","https://openalex.org/W2056140283","https://openalex.org/W2125730340","https://openalex.org/W2131728778","https://openalex.org/W2177209050","https://openalex.org/W2383940294","https://openalex.org/W2464661970","https://openalex.org/W2511192821","https://openalex.org/W2554750353","https://openalex.org/W2768174108","https://openalex.org/W2792498333","https://openalex.org/W2890611886","https://openalex.org/W2913096406","https://openalex.org/W2955155286","https://openalex.org/W3015844221","https://openalex.org/W3028867652","https://openalex.org/W3207326900","https://openalex.org/W3211895232","https://openalex.org/W3212932635","https://openalex.org/W6712237015","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W2074843875","https://openalex.org/W2131286165","https://openalex.org/W2426876014","https://openalex.org/W4294326371","https://openalex.org/W2334917338","https://openalex.org/W2400405359","https://openalex.org/W2061436543","https://openalex.org/W2949327565","https://openalex.org/W2164110602","https://openalex.org/W50302539"],"abstract_inverted_index":{"The":[0],"dramatic":[1],"increase":[2],"of":[3,30,49,196],"data":[4,32],"breaches":[5],"in":[6,25,118],"modern":[7],"computing":[8],"platforms":[9],"has":[10],"emphasized":[11],"that":[12,130,184],"access":[13],"control":[14],"is":[15,46,94,114],"not":[16],"sufficient":[17],"to":[18,84,174,178,193],"protect":[19],"sensitive":[20],"user":[21],"data.":[22],"Recent":[23],"advances":[24],"cryptography":[26],"allow":[27],"end-to-end":[28],"processing":[29],"encrypted":[31],"without":[33],"the":[34,58,89,148,153,166,172,179],"need":[35],"for":[36,200],"decryption":[37],"using":[38,70,76],"Fully":[39],"Homomorphic":[40],"Encryption":[41],"(FHE).":[42],"Such":[43],"computation":[44,136,190],"however,":[45],"still":[47],"orders":[48,195],"magnitude":[50,197],"slower":[51,138],"than":[52],"direct":[53],"(unencrypted)":[54],"computation.":[55],"Depending":[56],"on":[57,80],"underlying":[59],"cryptographic":[60,155],"scheme,":[61],"FHE":[62,209],"schemes":[63],"can":[64,109,191],"work":[65],"natively":[66],"either":[67],"at":[68],"bit-level":[69,92,111,141,188],"Boolean":[71],"circuits,":[72],"or":[73],"over":[74],"integers":[75,81],"modular":[77,107,135,186],"arithmetic.":[78],"Operations":[79],"are":[82],"limited":[83],"addition/subtraction":[85],"and":[86,104,133,139,151,160,187],"multiplication.":[87],"On":[88],"other":[90],"hand,":[91],"arithmetic":[93,108,169,189],"much":[95],"more":[96,99],"comprehensive":[97,140],"allowing":[98],"operations,":[100],"such":[101],"as":[102,204,206],"comparison":[103],"division.":[105],"While":[106],"emulate":[110],"computation,":[112,142],"there":[113],"a":[115,125,211],"significant":[116],"cost":[117],"performance.":[119],"In":[120],"this":[121],"work,":[122],"we":[123],"propose":[124],"novel":[126],"method,":[127],"dubbed":[128],"bridging,":[129],"blends":[131],"faster":[132],"restricted":[134],"with":[137,152],"making":[143],"them":[144],"both":[145],"usable":[146],"within":[147],"same":[149,154],"application":[150],"scheme":[156],"instantiation.":[157],"We":[158],"introduce":[159],"open":[161],"source":[162],"C++":[163],"types":[164],"representing":[165],"two":[167],"distinct":[168],"modes,":[170],"offering":[171],"possibility":[173],"convert":[175],"from":[176],"one":[177,207],"other.":[180],"Experimental":[181],"results":[182],"show":[183],"bridging":[185],"lead":[192],"1--2":[194],"performance":[198],"improvement":[199],"tested":[201],"synthetic":[202],"benchmarks,":[203],"well":[205],"real-world":[208],"application:":[210],"genotype":[212],"imputation":[213],"case":[214],"study.":[215]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-08-03T00:00:00"}
