{"id":"https://openalex.org/W4392192334","doi":"https://doi.org/10.3390/cryptography8010008","title":"FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data","display_name":"FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data","publication_year":2024,"publication_date":"2024-02-27","ids":{"openalex":"https://openalex.org/W4392192334","doi":"https://doi.org/10.3390/cryptography8010008"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010008","pdf_url":"https://www.mdpi.com/2410-387X/8/1/8/pdf?version=1709082104","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/8/1/8/pdf?version=1709082104","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054339065","display_name":"Sagarika Behera","orcid":"https://orcid.org/0000-0001-6109-2832"},"institutions":[{"id":"https://openalex.org/I65674248","display_name":"Visvesvaraya Technological University","ror":"https://ror.org/00ha14p11","country_code":"IN","type":"education","lineage":["https://openalex.org/I65674248"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sagarika Behera","raw_affiliation_strings":["Department of Computer Science and Engineering, CMR Institute of Technology, Visvesveraya Technological University, Belagavi 590018, India"],"raw_orcid":"https://orcid.org/0000-0001-6109-2832","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, CMR Institute of Technology, Visvesveraya Technological University, Belagavi 590018, India","institution_ids":["https://openalex.org/I65674248"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029269130","display_name":"Jhansi Rani Prathuri","orcid":"https://orcid.org/0000-0002-4180-0341"},"institutions":[{"id":"https://openalex.org/I4058158","display_name":"Merrimack College","ror":"https://ror.org/00bqy3h17","country_code":"US","type":"education","lineage":["https://openalex.org/I4058158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jhansi Rani Prathuri","raw_affiliation_strings":["Department of Computer and Data Sciences, School of Engineering and Computational Sciences, Merrimack College, North Andover, MA 01845, USA"],"raw_orcid":"https://orcid.org/0000-0002-4180-0341","affiliations":[{"raw_affiliation_string":"Department of Computer and Data Sciences, School of Engineering and Computational Sciences, Merrimack College, North Andover, MA 01845, USA","institution_ids":["https://openalex.org/I4058158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054339065"],"corresponding_institution_ids":["https://openalex.org/I65674248"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":3.6425,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.93457144,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"8","issue":"1","first_page":"8","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8956626653671265},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.8006606698036194},{"id":"https://openalex.org/keywords/acceleration","display_name":"Acceleration","score":0.7029308676719666},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6398329734802246},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6306235790252686},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5819542407989502},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5230711102485657},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22516679763793945},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.16923832893371582},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10407093167304993},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09162712097167969}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8956626653671265},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.8006606698036194},{"id":"https://openalex.org/C117896860","wikidata":"https://www.wikidata.org/wiki/Q11376","display_name":"Acceleration","level":2,"score":0.7029308676719666},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6398329734802246},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6306235790252686},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5819542407989502},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5230711102485657},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22516679763793945},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.16923832893371582},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10407093167304993},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09162712097167969},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010008","pdf_url":"https://www.mdpi.com/2410-387X/8/1/8/pdf?version=1709082104","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5202aa897994408389575d5db7b855da","is_oa":true,"landing_page_url":"https://doaj.org/article/5202aa897994408389575d5db7b855da","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 1, p 8 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010008","pdf_url":"https://www.mdpi.com/2410-387X/8/1/8/pdf?version=1709082104","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4392192334.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W1485846902","https://openalex.org/W1494049356","https://openalex.org/W1850468005","https://openalex.org/W1979120705","https://openalex.org/W2031533839","https://openalex.org/W2071825329","https://openalex.org/W2120918807","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2768174108","https://openalex.org/W2894792791","https://openalex.org/W2899140612","https://openalex.org/W2934510082","https://openalex.org/W2942255051","https://openalex.org/W2969350772","https://openalex.org/W3001052280","https://openalex.org/W3084652823","https://openalex.org/W3119182752","https://openalex.org/W3134922354","https://openalex.org/W3140753276","https://openalex.org/W3173128495","https://openalex.org/W3202975447","https://openalex.org/W3204445038","https://openalex.org/W3205982643","https://openalex.org/W3207326900","https://openalex.org/W4221154335","https://openalex.org/W4224214214","https://openalex.org/W4226334377","https://openalex.org/W4288055305","https://openalex.org/W4306176121","https://openalex.org/W4312377706","https://openalex.org/W4312730617","https://openalex.org/W4384159582","https://openalex.org/W4385187193","https://openalex.org/W4386121344","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4256358502","https://openalex.org/W2625655658","https://openalex.org/W2771047361","https://openalex.org/W4317178672"],"abstract_inverted_index":{"The":[0,28,54,163],"suggested":[1,29],"solution":[2],"in":[3,70,74,96],"this":[4],"work":[5],"makes":[6],"use":[7],"of":[8,13,19,65,88,99,123,143,160,185],"the":[9,17,20,34,39,43,63,80,85,97,100,107,112,121,134,152,182,186],"parallel":[10,195],"processing":[11],"capability":[12],"FPGA":[14,108,115],"to":[15,92,180,189],"enhance":[16],"efficiency":[18],"K-Nearest":[21],"Neighbor":[22],"(KNN)":[23],"algorithm":[24,103],"on":[25,90,136,154],"encrypted":[26,137],"data.":[27],"technique":[30],"was":[31,77,131],"assessed":[32],"utilizing":[33],"breast":[35],"cancer":[36],"datasets":[37],"and":[38,72,119,127,198],"findings":[40],"indicate":[41],"that":[42,79,133],"FPGA-based":[44],"acceleration":[45],"method":[46],"provides":[47],"significant":[48],"performance":[49],"improvements":[50],"over":[51,104],"software":[52],"implementation.":[53],"Cheon\u2013Kim\u2013Kim\u2013Song":[55],"(CKKS)":[56],"homomorphic":[57],"encryption":[58,196],"scheme":[59],"is":[60,147,159,171],"used":[61,111],"for":[62,167],"computation":[64,165],"ciphertext.":[66],"After":[67],"extensive":[68],"simulation":[69],"Python":[71],"implementation":[73],"FPGA,":[75],"it":[76],"found":[78],"proposed":[81],"architecture":[82],"brings":[83],"down":[84],"computational":[86,141,157],"time":[87,142,158,166,184],"KNN":[89,101,135,153,188],"ciphertext":[91],"a":[93,140],"realistic":[94],"value":[95],"order":[98],"classification":[102],"plaintext.":[105],"For":[106],"implementation,":[109],"we":[110,177],"Intel":[113],"Agilex7":[114],"(AGFB014R24B2E2V)":[116],"development":[117],"board":[118],"validated":[120],"speed":[122],"computation,":[124],"latency,":[125],"throughput,":[126],"logic":[128],"utilization.":[129],"It":[130],"observed":[132],"data":[138],"has":[139],"41.72":[144,172],"ms":[145,191],"which":[146],"80":[148],"times":[149],"slower":[150],"than":[151],"plaintext":[155],"whose":[156],"0.518":[161],"ms.":[162,173],"main":[164],"CKKS":[168],"FHE":[169],"schemes":[170],"With":[174],"our":[175],"architecture,":[176],"were":[178],"able":[179],"reduce":[181],"calculation":[183],"CKKS-based":[187],"0.85":[190],"by":[192],"using":[193],"32":[194],"hardware":[197],"reaching":[199],"300":[200],"MHz":[201],"speed.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-01-21T23:30:37.877113","created_date":"2025-10-10T00:00:00"}
