{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:Z73BFPAMADSAXZRBULAO2JXGUJ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"5c8e08165de876f8790371e8b182a6f8d568a488b3c7a195d45be7358afab025","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-13T00:36:03Z","title_canon_sha256":"a0ef9b58a4441a89242c0711faeb5bb95cfaba22dca1b59bece8f05fba483077"},"schema_version":"1.0","source":{"id":"2605.12841","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.12841","created_at":"2026-05-18T03:09:11Z"},{"alias_kind":"arxiv_version","alias_value":"2605.12841v1","created_at":"2026-05-18T03:09:11Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.12841","created_at":"2026-05-18T03:09:11Z"},{"alias_kind":"pith_short_12","alias_value":"Z73BFPAMADSA","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"Z73BFPAMADSAXZRB","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"Z73BFPAM","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:137c1bc640525ef958252f6d29bc6caf463eecc571f2b8d2dc458ff743a6ea68","target":"graph","created_at":"2026-05-18T03:09:11Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"Despite these limits, PIM can be a viable alternative to state-of-the-art CPU and GPU systems for HE when equipped with native modular multiplication and efficient inter-PIM data movement."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"The UPMEM PIM system and the chosen set of HE kernels are representative of future general-purpose PIM hardware and of the workloads that will actually be deployed in encrypted databases and machine learning."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"Characterization of HE kernels on commercial UPMEM PIM identifies modular multiplication and per-bank capacity as dominant bottlenecks and concludes PIM becomes competitive with CPU/GPU once those are addressed."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"Processing-in-memory systems become competitive with CPUs and GPUs for homomorphic encryption when equipped with native modular multiplication and efficient data movement."}],"snapshot_sha256":"cd7888b48580480da645058e207d6e1ab7b56f69cd2527f9efe12740263d6e44"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Homomorphic encryption (HE) enables computation over encrypted data, offering strong privacy guarantees for untrusted computing environments. Practical adoption remains limited by high computational complexity, large ciphertext sizes, and substantial data movement. Processor-centric architectures (CPUs, GPUs, ASICs) hit fundamental bottlenecks on HE workloads because ciphertexts are large, data locality is low, and primitives such as relinearization and bootstrapping repeatedly access large auxiliary metadata. Processing-In-Memory (PIM) is a promising mitigation by computing near or inside mem","authors_text":"Antonio J. Pe\\~na, Harshita Gupta, Jaewoo Park, Juan G\\'omez-Luna, Konstantinos Kanellopoulos, Mayank Kabra, Mohammad Sadrosadati, Nisa Bostanc{\\i}, Onur Mutlu, Phillip Widdowson, Priyam Mehta, Tathagata Barik","cross_cats":[],"headline":"Processing-in-memory systems become competitive with CPUs and GPUs for homomorphic encryption when equipped with native modular multiplication and efficient data movement.","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-13T00:36:03Z","title":"HE-PIM: Demystifying Homomorphic Operations on a Real-world Processing-in-Memory System"},"references":{"count":300,"internal_anchors":3,"resolved_work":300,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"On Data Banks and Privacy Homo- morphisms,","work_id":"bbab1b4b-d480-4a1e-b7f3-e75079ff9bee","year":1978},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":2,"title":"On Lattices, Learning with Errors, Random Linear Codes, and Cryptog- raphy,","work_id":"4a54d5f9-4a11-4309-bcd6-b453f8dbb97e","year":2009},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":3,"title":"On Ideal Lattices and Learning with Errors over Rings,","work_id":"30f1d085-68f9-49f5-b8dc-dfae34604bfa","year":2010},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":4,"title":"Fully Homomorphic Encryption Using Ideal Lattices,","work_id":"d2750166-cc27-40ba-9db8-177a8bbf7fc0","year":2009},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"A Fully Homomorphic Encryption Scheme,","work_id":"a9f7b003-5629-4d64-8158-32a0df372318","year":2009}],"snapshot_sha256":"1ad00087112cf2770bbb4ef0360ef10413e47be6df606922f2959f00c6d92706"},"source":{"id":"2605.12841","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-14T19:21:05.219355Z","id":"26529e01-6d52-4062-83fc-f913470aeff9","model_set":{"reader":"grok-4.3"},"one_line_summary":"Characterization of HE kernels on commercial UPMEM PIM identifies modular multiplication and per-bank capacity as dominant bottlenecks and concludes PIM becomes competitive with CPU/GPU once those are addressed.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"Processing-in-memory systems become competitive with CPUs and GPUs for homomorphic encryption when equipped with native modular multiplication and efficient data movement.","strongest_claim":"Despite these limits, PIM can be a viable alternative to state-of-the-art CPU and GPU systems for HE when equipped with native modular multiplication and efficient inter-PIM data movement.","weakest_assumption":"The UPMEM PIM system and the chosen set of HE kernels are representative of future general-purpose PIM hardware and of the workloads that will actually be deployed in encrypted databases and machine learning."}},"verdict_id":"26529e01-6d52-4062-83fc-f913470aeff9"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:fb3256153578099c491b16f3f3ccf326aa9bf732cb72f14a013c9ef8ddea1c77","target":"record","created_at":"2026-05-18T03:09:11Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"5c8e08165de876f8790371e8b182a6f8d568a488b3c7a195d45be7358afab025","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-13T00:36:03Z","title_canon_sha256":"a0ef9b58a4441a89242c0711faeb5bb95cfaba22dca1b59bece8f05fba483077"},"schema_version":"1.0","source":{"id":"2605.12841","kind":"arxiv","version":1}},"canonical_sha256":"cff612bc0c00e40be621a2c0ed26e6a2714213e8ba072f4e30b2f69d92a0bb4c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cff612bc0c00e40be621a2c0ed26e6a2714213e8ba072f4e30b2f69d92a0bb4c","first_computed_at":"2026-05-18T03:09:11.963154Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:09:11.963154Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"kFRSxsh59b9eYmhLOKYpB+5AqOwZi/+Ecg2ChtlqF7con0vkuZJViMvrbwnXSXbZkUhjJlXusGcj5qb87QtiBw==","signature_status":"signed_v1","signed_at":"2026-05-18T03:09:11.963921Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.12841","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:fb3256153578099c491b16f3f3ccf326aa9bf732cb72f14a013c9ef8ddea1c77","sha256:137c1bc640525ef958252f6d29bc6caf463eecc571f2b8d2dc458ff743a6ea68"],"state_sha256":"f3a5337caf2a3f90487838ba97f0981d44b4dbcaa27981714d67b3bec4069af4"}