Dissertation Defense Schedule

Academic Excellence

Sharing original dissertation research is a principle to which the University of Delaware is deeply committed. It is the single most important assignment our graduate students undertake and upon completion is met with great pride.

We invite you to celebrate this milestone by attending their dissertation defense. Please review the upcoming dissertation defense schedule below and join us!

Dissertation Defense Form

Must be received two weeks prior to your defense.

Join Us

Celebrate your colleague’s academic success!

It's official

Download the official UD thesis/dissertation manual.

Dissertation Discourse

Need a creative jumpstart?

PROGRAM | Electrical & Computer Engineering

Efficient General-Purpose Computation with Fully Homomorphic Encryption

By: Charles Gouert Chair: Nektarios Tsoutsos

ABSTRACT

Fully homomorphic encryption (FHE) is a powerful type of cryptography that allows for meaningful computation directly on encrypted data. This unique property has important ramifications for secure outsourced computing and allows FHE to solve key confidentiality issues in a cloud computing context. However, the technology has seen little adoption outside of research circles due to its slow speeds relative to plaintext computation and complex, non-intuitive programming model. The novel methodologies encompassed in this dissertation overcome the shortcomings of FHE and pave the way for widespread adoption of the technology.

First, initial strides are presented that solve both key issues in FHE in the form of two end-to-end frameworks for general-purpose FHE computation leveraging the CGGI cryptosystem. Additionally, a standardized benchmark suite and universal compiler targeting state-of-the-art FHE libraries are introduced to allow users to rapidly compare different FHE implementations in order to find the best suited library and scheme for their applications.

Next, the HELM framework is presented, which utilizes two distinct oblivious lookup table mechanisms and a bridging technique to dynamically change the underlying plaintext space of FHE ciphertexts is proposed to achieve efficient general-purpose computation. HELM can consume off-the-shelf HDL designs to generate and execute FHE applications, achieving a speedup of 1-2 orders of magnitude relative to prior works.

Lastly, a hardware-accelerated, bespoke system for arbitrary encrypted computation called ArctyrEX is introduced that allows programmers to express their intents in a high-level language and seamlessly scales to multi-GPU architectures. ArctyrEX achieves speedups of over 40X relative to the current state-of-the-art for a variety of realistic workloads.

Back >

The Process

Step-by-Step

Visit our “Step-by-Step Graduation Guide” to take you through the graduation process.From formatting your Dissertation to Doctoral Hooding procedures.

Your First Step >

Dissertation Manual

Wondering how to set up the format for your paper. Refer to the “UD Thesis/Dissertation Manual” for formatting requirements and more.

Download Your Manual >

Defense Submission Form

This form must be completed two weeks in advance of a dissertation defense to meet the University of Delaware Graduate and Professional Education’s requirements.

Submission Form >