{"id":"https://openalex.org/W4408151365","doi":"https://doi.org/10.1145/3658617.3697775","title":"Low Multiplicative Depth Polynomial Evaluation Architectures for Homomorphic Encrypted Data","display_name":"Low Multiplicative Depth Polynomial Evaluation Architectures for Homomorphic Encrypted Data","publication_year":2025,"publication_date":"2025-01-20","ids":{"openalex":"https://openalex.org/W4408151365","doi":"https://doi.org/10.1145/3658617.3697775"},"language":"en","primary_location":{"id":"doi:10.1145/3658617.3697775","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3658617.3697775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080354346","display_name":"Jianfei Wang","orcid":"https://orcid.org/0009-0004-0132-3319"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianfei Wang","raw_affiliation_strings":["Xi'an Jiaotong Univ., Xi'an, China"],"raw_orcid":"https://orcid.org/0009-0004-0132-3319","affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong Univ., Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jia Hou","orcid":"https://orcid.org/0009-0008-5744-5429"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Hou","raw_affiliation_strings":["Xi'an Jiaotong Univ., Xi'an, China"],"raw_orcid":"https://orcid.org/0009-0008-5744-5429","affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong Univ., Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015408140","display_name":"Fahong Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fahong Zhang","raw_affiliation_strings":["Xi'an Jiaotong Univ., Xi'an, China"],"raw_orcid":"https://orcid.org/0009-0006-9711-0549","affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong Univ., Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yishuo Meng","orcid":"https://orcid.org/0000-0002-3402-6386"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yishuo Meng","raw_affiliation_strings":["Xi'an Jiaotong Univ., Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0002-3402-6386","affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong Univ., Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100728012","display_name":"Yang Su","orcid":"https://orcid.org/0000-0003-3619-7936"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Su","raw_affiliation_strings":["Engineering Univ. of People's Armed Police, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0003-3619-7936","affiliations":[{"raw_affiliation_string":"Engineering Univ. of People's Armed Police, Xi'an, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100719382","display_name":"Chen Yang","orcid":"https://orcid.org/0000-0002-8221-7670"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Yang","raw_affiliation_strings":["Xi'an Jiaotong Univ., Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0002-8221-7670","affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong Univ., Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080354346"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01529944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1302","last_page":"1307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9492157101631165},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.7299627065658569},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6698408126831055},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.5885621309280396},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.41078051924705505},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40160897374153137},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3496483266353607},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2695710062980652},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11485838890075684}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9492157101631165},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.7299627065658569},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6698408126831055},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.5885621309280396},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41078051924705505},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40160897374153137},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3496483266353607},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2695710062980652},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11485838890075684},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658617.3697775","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3658617.3697775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G963865091","display_name":null,"funder_award_id":"62176206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2177209050","https://openalex.org/W2801958627","https://openalex.org/W2990280959","https://openalex.org/W3094696138","https://openalex.org/W3173128495","https://openalex.org/W3195598474","https://openalex.org/W4225468027","https://openalex.org/W4302734258","https://openalex.org/W4311219689","https://openalex.org/W4312706139","https://openalex.org/W4318273611","https://openalex.org/W4361986437"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4406779505","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W4407007798","https://openalex.org/W2155069045"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,203,210,218],"reduce":[3,56,79],"the":[4,47,60,67,71,91,96,110,114,134,167,182,222],"multiplicative":[5,22,68,88,154,214],"depth":[6,23,69],"required":[7],"by":[8],"high-order":[9],"polynomial":[10,24,94,116,170,179],"evaluation":[11,25,117,180],"for":[12,119,139],"homomorphic":[13,120],"encrypted":[14,121],"data,":[15],"we":[16],"propose":[17],"two":[18],"novel":[19],"and":[20,36,51,64,106,125,161,165,174,190,198,216],"low":[21],"algorithms:":[26],"an":[27],"x4-step":[28],"nesting":[29],"algorithm":[30,39],"based":[31],"on":[32,133],"parity":[33],"extraction":[34],"(x4-NAPE)":[35],"a":[37,84,149],"parallel":[38],"with":[40,46,90,186],"high":[41],"data":[42,122],"utilization":[43],"(PAHU).":[44],"Compared":[45],"conventional":[48],"Schoolbook":[49,104,173,189],"method":[50],"Horner's":[52,107,175,191],"rule,":[53,176,192],"x4-NAPE":[54,160,197],"can":[55,82,200],"about":[57],"50%":[58,211],"of":[59,66,87,93,113,153,159,169,172,181,188,196],"ciphertext-ciphertext":[61],"multiplication":[62],"(CCM)":[63],"75%":[65],"in":[70,206,213,221],"ideal":[72],"limiting":[73],"case.":[74],"While":[75],"PAHU":[76,162,199],"does":[77],"not":[78],"CCM,":[80],"it":[81],"achieve":[83,201],"logarithmic":[85],"growth":[86,97],"depth,":[89,155,215],"increase":[92],"length,":[95,184],"rate":[98],"is":[99],"much":[100],"slower":[101],"than":[102],"x4-NAPE,":[103],"method,":[105],"rule.":[108],"Moreover,":[109],"hardware":[111,129,137],"architectures":[112,130,158,187,195],"above":[115],"algorithms":[118],"are":[123,131],"investigated":[124],"proposed.":[126],"The":[127,143],"proposed":[128,157,194],"assessed":[132],"FPGA-based":[135],"reconfigurable":[136],"platform":[138],"FHE":[140],"named":[141],"ReMCA.":[142],"assessment":[144],"results":[145],"demonstrate":[146],"that":[147],"under":[148],"fixed":[150],"upper":[151],"limit":[152],"our":[156,193],"support":[163],"2.67\u00d7":[164],"14.3\u00d7":[166],"range":[168],"lengths":[171],"respectively.":[177],"For":[178],"same":[183],"compared":[185],"up":[202,209,217],"1.13\u00d7":[204],"improvement":[205,220],"execution":[207],"time,":[208],"reduction":[212],"2.39\u00d7":[219],"depth-time":[223],"product.":[224]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
