《SESSION 16 - From Processors to Circuits.pdf》由会员分享,可在线阅读,更多相关《SESSION 16 - From Processors to Circuits.pdf(313页珍藏版)》请在三个皮匠报告上搜索。
1、ISSCC 2024SESSION 16Security:From Processors to Circuits16.1:A 2.7-to-13.3J/boot/slot Flexible RNS-CKKS Processor in 28nm CMOS Technology for FHE-Based Privacy-Preserving Computing 2024 IEEE International Solid-State Circuits Conference1 of 45A 2.7-to-13.3J/boot/slot Flexible RNS-CKKS Processor in 2
2、8nm CMOS Technology for FHE-Based Privacy-Preserving Computing Hyunhoon Lee*,Hyeokjun Kwon*,and Youngjoo LeePohang University of Science and Technology,Korea16.1:A 2.7-to-13.3J/boot/slot Flexible RNS-CKKS Processor in 28nm CMOS Technology for FHE-Based Privacy-Preserving Computing 2024 IEEE Internat
3、ional Solid-State Circuits Conference2 of 45Outline Introduction RNS-CKKS FHE Scheme Proposed Processor Measurement Results Summary16.1:A 2.7-to-13.3J/boot/slot Flexible RNS-CKKS Processor in 28nm CMOS Technology for FHE-Based Privacy-Preserving Computing 2024 IEEE International Solid-State Circuits
4、 Conference3 of 45Evolutions of Cloud Computing Cloud computing services grow rapidly From 2024 to 2030,market increases$652B to$1668B*Server-scale AICloud serviceMarket size(USD)20242030500B1000B1500B*https:/ 2.7-to-13.3J/boot/slot Flexible RNS-CKKS Processor in 28nm CMOS Technology for FHE-Based P
5、rivacy-Preserving Computing 2024 IEEE International Solid-State Circuits Conference4 of 45Privacy Concerns in Cloud Computing The risk of sensitive data leakage existsSuch as health or financial dataClientsServerDataResultDataResultLeakage hazardAttacker!16.1:A 2.7-to-13.3J/boot/slot Flexible RNS-CK
6、KS Processor in 28nm CMOS Technology for FHE-Based Privacy-Preserving Computing 2024 IEEE International Solid-State Circuits Conference5 of 45Limitation of Traditional Encryption Schemes Traditional encryption schemes cannot process the dataClientsDataEncryptDataDecryptServerUnable to process dataAt