{"id":"https://openalex.org/W4410552898","doi":"https://doi.org/10.23919/date64628.2025.10992987","title":"A Unified Vector Processing Unit for Fully Homomorphic Encryption","display_name":"A Unified Vector Processing Unit for Fully Homomorphic Encryption","publication_year":2025,"publication_date":"2025-03-31","ids":{"openalex":"https://openalex.org/W4410552898","doi":"https://doi.org/10.23919/date64628.2025.10992987"},"language":"en","primary_location":{"id":"doi:10.23919/date64628.2025.10992987","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date64628.2025.10992987","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Design, Automation &amp;amp; Test in Europe Conference (DATE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064837494","display_name":"Jiangbin Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiangbin Dong","raw_affiliation_strings":["Xi&#x0027;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Xi&#x0027;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100650705","display_name":"Xinhua Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinhua Chen","raw_affiliation_strings":["Fudan University"],"affiliations":[{"raw_affiliation_string":"Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026297396","display_name":"Mingyu Gao","orcid":"https://orcid.org/0000-0001-8433-7281"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyu Gao","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064837494"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":1.4341,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81734611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9000629186630249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6931829452514648},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48880550265312195},{"id":"https://openalex.org/keywords/unit","display_name":"Unit (ring theory)","score":0.4378354847431183},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3676442503929138},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2877543270587921},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1583881974220276},{"id":"https://openalex.org/keywords/mathematics-education","display_name":"Mathematics education","score":0.05263897776603699}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9000629186630249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6931829452514648},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48880550265312195},{"id":"https://openalex.org/C122637931","wikidata":"https://www.wikidata.org/wiki/Q118084","display_name":"Unit (ring theory)","level":2,"score":0.4378354847431183},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3676442503929138},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2877543270587921},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1583881974220276},{"id":"https://openalex.org/C145420912","wikidata":"https://www.wikidata.org/wiki/Q853077","display_name":"Mathematics education","level":1,"score":0.05263897776603699}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date64628.2025.10992987","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date64628.2025.10992987","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Design, Automation &amp;amp; Test in Europe Conference (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1971286892","https://openalex.org/W1979502974","https://openalex.org/W2015667369","https://openalex.org/W2069285815","https://openalex.org/W2077110374","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2346205343","https://openalex.org/W2527617455","https://openalex.org/W2625052843","https://openalex.org/W2768174108","https://openalex.org/W2787647763","https://openalex.org/W2794974431","https://openalex.org/W2885339274","https://openalex.org/W2899140612","https://openalex.org/W3006531732","https://openalex.org/W3012235108","https://openalex.org/W3012457899","https://openalex.org/W3094696138","https://openalex.org/W3157477139","https://openalex.org/W3158044478","https://openalex.org/W3207326900","https://openalex.org/W4205117993","https://openalex.org/W4243564683","https://openalex.org/W4281609193","https://openalex.org/W4281792301","https://openalex.org/W4307925365","https://openalex.org/W4360831815","https://openalex.org/W4380881143","https://openalex.org/W4389159461","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4408218896","https://openalex.org/W2539930818","https://openalex.org/W4406779505","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W4408501329","https://openalex.org/W2155069045"],"abstract_inverted_index":{"Fully":[0],"homomorphic":[1],"encryption":[2],"(FHE)":[3],"algorithms":[4],"enable":[5],"privacy-preserving":[6],"computing":[7],"directly":[8],"on":[9,145],"encrypted":[10],"data":[11,43,69,139],"without":[12],"leaking":[13],"sensitive":[14],"contents,":[15],"while":[16],"their":[17],"excessive":[18],"computational":[19],"overheads":[20],"could":[21],"be":[22,50],"alleviated":[23],"by":[24,53],"specialized":[25,147],"hardware":[26,81,158],"accelerators.":[27,86],"The":[28],"vector":[29,54,72,117,134,189],"architecture":[30],"has":[31],"been":[32],"prominently":[33],"used":[34],"for":[35,170,186],"FHE":[36,47,85],"accelerators":[37],"to":[38,105,126,151,163,177],"match":[39],"the":[40,57,98,112,129,133,137,146,157,172,187],"underlying":[41],"polynomial":[42],"structures.":[44],"While":[45],"most":[46],"operations":[48,110],"can":[49],"efficiently":[51],"supported":[52],"processing":[55],"units,":[56],"number":[58],"theoretic":[59],"transform":[60],"(NTT)":[61],"and":[62,67,74,97,108,136,141,166,175,181],"automorphism":[63,109],"operators":[64],"involve":[65],"complex":[66],"irregular":[68],"permutations":[70],"among":[71,111],"elements,":[73],"thus":[75],"are":[76,143],"handled":[77],"with":[78,161],"separate":[79],"dedicated":[80],"units":[82],"in":[83,103,128],"existing":[84],"In":[87],"this":[88],"paper,":[89],"we":[90],"present":[91],"an":[92],"efficient":[93],"inter-lane":[94,148,173],"network":[95],"design":[96],"corresponding":[99],"dataflow":[100],"control":[101],"scheme,":[102],"order":[104],"realize":[106],"NTT":[107],"multiple":[113],"lanes":[114],"of":[115,132],"a":[116],"unit.":[118,190],"An":[119],"arbitrarily":[120],"large":[121],"operator":[122],"is":[123],"first":[124],"decomposed":[125],"fit":[127],"fixed":[130],"width":[131],"unit,":[135],"required":[138],"permutation":[140],"transposition":[142],"conducted":[144],"network.":[149],"Compared":[150],"previous":[152],"designs,":[153],"our":[154],"solution":[155],"reduces":[156],"resources":[159],"needed,":[160],"up":[162,176],"9.4x":[164],"area":[165,180],"6.0x":[167],"power":[168,184],"savings":[169,185],"only":[171],"network,":[174],"1.2":[178],"x":[179,183],"1.1":[182],"whole":[188]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
