{"id":"https://openalex.org/W4396956522","doi":"https://doi.org/10.1145/3665280","title":"Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption","display_name":"Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption","publication_year":2024,"publication_date":"2024-05-16","ids":{"openalex":"https://openalex.org/W4396956522","doi":"https://doi.org/10.1145/3665280"},"language":"en","primary_location":{"id":"doi:10.1145/3665280","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3665280","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3665280","source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3665280","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071386756","display_name":"Eduardo Chielle","orcid":"https://orcid.org/0000-0002-1938-912X"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Eduardo Chielle","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0002-1938-912X","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026224233","display_name":"Oleg Mazonka","orcid":"https://orcid.org/0000-0001-5131-9044"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Oleg Mazonka","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0001-5131-9044","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022868555","display_name":"Homer Gamil","orcid":"https://orcid.org/0000-0003-3256-783X"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Homer Gamil","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0003-3256-783X","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Michail Maniatakos","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0001-6899-0651","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071386756"],"corresponding_institution_ids":["https://openalex.org/I120250893"],"apc_list":null,"apc_paid":null,"fwci":1.3171,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82814649,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"23","issue":"4","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7170780301094055},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.6867685914039612},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.6501131057739258},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.64687180519104},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5923179984092712},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5801118612289429},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5678385496139526},{"id":"https://openalex.org/keywords/arbitrary-precision-arithmetic","display_name":"Arbitrary-precision arithmetic","score":0.5288192629814148},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.4735381007194519},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46806707978248596},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.4417988359928131},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3901814818382263},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3737006187438965},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3074449300765991},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2828337550163269},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2819686830043793},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09591922163963318}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7170780301094055},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.6867685914039612},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.6501131057739258},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.64687180519104},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5923179984092712},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5801118612289429},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5678385496139526},{"id":"https://openalex.org/C83581934","wikidata":"https://www.wikidata.org/wiki/Q527381","display_name":"Arbitrary-precision arithmetic","level":2,"score":0.5288192629814148},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.4735381007194519},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46806707978248596},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.4417988359928131},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3901814818382263},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3737006187438965},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3074449300765991},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2828337550163269},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2819686830043793},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09591922163963318},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3665280","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3665280","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3665280","source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3665280","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3665280","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3665280","source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396956522.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W104209573","https://openalex.org/W774911181","https://openalex.org/W1966731635","https://openalex.org/W2123845384","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2383940294","https://openalex.org/W2514873781","https://openalex.org/W2554750353","https://openalex.org/W2768174108","https://openalex.org/W2792498333","https://openalex.org/W2794927157","https://openalex.org/W2902229412","https://openalex.org/W2955155286","https://openalex.org/W2963311060","https://openalex.org/W2982522610","https://openalex.org/W3015844221","https://openalex.org/W3028867652","https://openalex.org/W3079221395","https://openalex.org/W3108801278","https://openalex.org/W3207326900","https://openalex.org/W3211895232","https://openalex.org/W3212932635","https://openalex.org/W3215903849","https://openalex.org/W4220735296","https://openalex.org/W4365799995","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W4391920153","https://openalex.org/W2131286165","https://openalex.org/W2047843551","https://openalex.org/W2170171009","https://openalex.org/W3113453580","https://openalex.org/W4211076402","https://openalex.org/W2400405359","https://openalex.org/W4292473383","https://openalex.org/W2334917338","https://openalex.org/W2061436543"],"abstract_inverted_index":{"Fully":[0],"Homomorphic":[1],"Encryption":[2],"(FHE)":[3],"enables":[4,88,139],"computation":[5,16,90,145],"directly":[6],"on":[7,24,99],"encrypted":[8],"data.":[9],"This":[10,85,138],"property":[11],"is":[12,40],"desirable":[13],"for":[14,51,174],"outsourced":[15],"of":[17,28,101,118,142,153,170,194],"sensitive":[18],"data":[19],"as":[20,55,96],"it":[21,97,107],"relies":[22],"solely":[23],"the":[25,29,102,116,140,143,151,157],"underlying":[26],"security":[27],"cryptosystem":[30],"and":[31,65,136,150,177,183,196],"not":[32],"in":[33,115],"access":[34],"control":[35],"policies.":[36],"Even":[37],"though":[38],"FHE":[39,60],"still":[41],"significantly":[42],"slower":[43],"than":[44],"unencrypted":[45],"computation,":[46],"practical":[47],"times":[48],"are":[49],"possible":[50],"applications":[52],"easily":[53],"representable":[54],"low-order":[56,77],"polynomials,":[57,78],"since":[58],"most":[59],"schemes":[61],"support":[62],"modular":[63,105,134,154],"addition":[64],"multiplication":[66],"over":[67],"ciphertexts.":[68],"If,":[69],"however,":[70],"an":[71],"application":[72],"cannot":[73],"be":[74,83,92],"expressed":[75],"with":[76],"then":[79],"Boolean":[80],"logic":[81],"must":[82],"emulated.":[84],"bit-level":[86,132,148],"arithmetic":[87,135,149,155],"any":[89],"to":[91,133,167],"performed":[93],"homomorphically.":[94],"Nevertheless,":[95],"runs":[98],"top":[100],"natively":[103],"supported":[104],"arithmetic,":[106],"has":[108],"poor":[109],"performance,":[110],"which":[111],"hinders":[112],"its":[113],"use":[114,141],"majority":[117],"scenarios.":[119],"In":[120],"this":[121],"work,":[122],"we":[123],"propose":[124],"Bridging,":[125],"a":[126],"technique":[127],"that":[128,163],"allows":[129],"conversion":[130],"from":[131,189],"vice-versa.":[137],"comprehensive":[144],"provided":[146],"by":[147],"performance":[152,172,187],"within":[156],"same":[158],"application.":[159],"Experimental":[160],"results":[161],"show":[162],"Bridging":[164,186],"can":[165],"lead":[166],"1-2":[168],"orders":[169],"magnitude":[171],"improvement":[173],"tested":[175],"benchmarks":[176],"two":[178,190],"real-world":[179],"applications:":[180],"URL":[181],"denylisting":[182],"genotype":[184],"imputation.":[185],"comes":[188],"factors:":[191],"reduced":[192],"number":[193],"operations":[195],"smaller":[197],"multiplicative":[198],"depth.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
