{"id":"https://openalex.org/W4389844109","doi":"https://doi.org/10.1007/978-981-99-8721-4_12","title":"Simple Threshold (Fully Homomorphic) Encryption from\u00a0LWE with\u00a0Polynomial Modulus","display_name":"Simple Threshold (Fully Homomorphic) Encryption from\u00a0LWE with\u00a0Polynomial Modulus","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4389844109","doi":"https://doi.org/10.1007/978-981-99-8721-4_12"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-99-8721-4_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-99-8721-4_12","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-99-8721-4_12.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-981-99-8721-4_12.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017987811","display_name":"Katharina Boudgoust","orcid":"https://orcid.org/0000-0002-3971-9368"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Katharina Boudgoust","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-3971-9368","affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018185386","display_name":"Peter Sch\u00f6ll","orcid":"https://orcid.org/0000-0002-7937-8422"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Peter Scholl","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-7937-8422","affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017987811"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":17.1678,"has_fulltext":true,"cited_by_count":33,"citation_normalized_percentile":{"value":0.99435861,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"371","last_page":"404"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7443937063217163},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.6860262751579285},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6587029099464417},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6187973022460938},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6070978045463562},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5538536310195923},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.5452693700790405},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.48512396216392517},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.47972527146339417},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4721158742904663},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34149008989334106},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2776142954826355},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24417516589164734},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.23077160120010376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11540904641151428}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7443937063217163},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.6860262751579285},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6587029099464417},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6187973022460938},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6070978045463562},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5538536310195923},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.5452693700790405},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.48512396216392517},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.47972527146339417},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4721158742904663},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34149008989334106},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2776142954826355},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24417516589164734},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.23077160120010376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11540904641151428},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-981-99-8721-4_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-99-8721-4_12","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-99-8721-4_12.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-04535092v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04535092v1/document","pdf_url":"https://hal.science/hal-04535092/document","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2023, Guangzhou, China. pp.371-404, &#x27E8;10.1007/978-981-99-8721-4_12&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:pure.atira.dk:publications/32f67a23-a30f-43e3-a0ab-8772ea2e59e2","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/32f67a23-a30f-43e3-a0ab-8772ea2e59e2","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Boudgoust, K & Scholl, P 2023, Simple Threshold (Fully Homomorphic) Encryption from\u00a0LWE with\u00a0Polynomial Modulus. in J Guo & R Steinfeld (eds), Advances in Cryptology \u2013 ASIACRYPT 2023 : 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4\u20138, 2023, Proceedings, Part I. Springer, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14438, pp. 371-404, 29th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2023, Guangzhou, China, 04/12/2023. https://doi.org/10.1007/978-981-99-8721-4_12","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/978-981-99-8721-4_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-99-8721-4_12","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-99-8721-4_12.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309928","display_name":"Aarhus Universitet","ror":"https://ror.org/01aj84f44"},{"id":"https://openalex.org/F4320321446","display_name":"Aarhus Universitets Forskningsfond","ror":"https://ror.org/01aj84f44"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389844109.pdf","grobid_xml":"https://content.openalex.org/works/W4389844109.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W198033559","https://openalex.org/W1487126655","https://openalex.org/W1565128838","https://openalex.org/W1979985652","https://openalex.org/W1985439922","https://openalex.org/W2006464592","https://openalex.org/W2008470071","https://openalex.org/W2026653933","https://openalex.org/W2061949491","https://openalex.org/W2116881075","https://openalex.org/W2121640981","https://openalex.org/W2146813141","https://openalex.org/W2152926062","https://openalex.org/W2154034877","https://openalex.org/W2159486442","https://openalex.org/W2402219606","https://openalex.org/W2460759036","https://openalex.org/W2498753511","https://openalex.org/W2747375172","https://openalex.org/W2794501668","https://openalex.org/W2934305357","https://openalex.org/W2954188590","https://openalex.org/W2989630101","https://openalex.org/W3013760718","https://openalex.org/W3084192430","https://openalex.org/W3089736257","https://openalex.org/W3095103211","https://openalex.org/W3114221980","https://openalex.org/W3157988597","https://openalex.org/W3162638080","https://openalex.org/W3164095070","https://openalex.org/W4285287917","https://openalex.org/W4285301190","https://openalex.org/W4294699007","https://openalex.org/W4308641887","https://openalex.org/W4389844109"],"related_works":["https://openalex.org/W3029045823","https://openalex.org/W2400565204","https://openalex.org/W2885113919","https://openalex.org/W4394788392","https://openalex.org/W2398715209","https://openalex.org/W2949607150","https://openalex.org/W2248085730","https://openalex.org/W2951031027","https://openalex.org/W2989418564","https://openalex.org/W2232688100"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
