{"id":"https://openalex.org/W4295884893","doi":"https://doi.org/10.1093/comjnl/bxac126","title":"Threshold Homomorphic Encryption From Provably Secure NTRU","display_name":"Threshold Homomorphic Encryption From Provably Secure NTRU","publication_year":2022,"publication_date":"2022-09-11","ids":{"openalex":"https://openalex.org/W4295884893","doi":"https://doi.org/10.1093/comjnl/bxac126"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxac126","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac126","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061066944","display_name":"Kexin Xu","orcid":"https://orcid.org/0000-0001-7389-0874"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kexin Xu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences , Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering , CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering , CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045452387","display_name":"Benjamin Hong Meng Tan","orcid":"https://orcid.org/0000-0002-8629-9052"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Benjamin Hong Meng Tan","raw_affiliation_strings":["Institute for Infocomm Research , A*STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research , A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402272","display_name":"Liping Wang","orcid":"https://orcid.org/0000-0002-9282-2751"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li-Ping Wang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences , Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering , CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering , CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058648309","display_name":"Khin Mi Mi Aung","orcid":"https://orcid.org/0000-0002-5652-3455"},"institutions":[{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]},{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Khin Mi Mi Aung","raw_affiliation_strings":["Institute for Infocomm Research , A*STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research , A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090841998","display_name":"Huaxiong Wang","orcid":"https://orcid.org/0000-0002-7669-8922"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaxiong Wang","raw_affiliation_strings":["School of Physical and Mathematical Sciences, Nanyang Technological University , Singapore"],"affiliations":[{"raw_affiliation_string":"School of Physical and Mathematical Sciences, Nanyang Technological University , Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100402272"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.5305,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70934418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"66","issue":"12","first_page":"2861","last_page":"2873"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.9175316095352173},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.708339273929596},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6389901638031006},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6318836212158203},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.49148786067962646},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4656926393508911},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4398425221443176},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.4222480058670044},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3826045095920563},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3481164574623108},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.3408868610858917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3354222774505615}],"concepts":[{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.9175316095352173},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.708339273929596},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6389901638031006},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6318836212158203},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.49148786067962646},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4656926393508911},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4398425221443176},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.4222480058670044},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3826045095920563},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3481164574623108},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.3408868610858917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3354222774505615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxac126","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac126","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4000000059604645}],"awards":[{"id":"https://openalex.org/G5855183830","display_name":null,"funder_award_id":"MOE2019-T2-2-083","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"},{"id":"https://openalex.org/G6582546409","display_name":null,"funder_award_id":"61872355","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8136933029","display_name":null,"funder_award_id":"12026427","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320320751","display_name":"Ministry of Education - Singapore","ror":"https://ror.org/01kcva023"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W150223756","https://openalex.org/W1675339804","https://openalex.org/W2031533839","https://openalex.org/W2089477764","https://openalex.org/W2177209050","https://openalex.org/W2233194383","https://openalex.org/W2514005182","https://openalex.org/W2538296643","https://openalex.org/W2766141585","https://openalex.org/W2911298733","https://openalex.org/W2953290839","https://openalex.org/W2973081104","https://openalex.org/W2983918969","https://openalex.org/W2985527074","https://openalex.org/W3018554597","https://openalex.org/W3028867652","https://openalex.org/W3123137284","https://openalex.org/W3184856066","https://openalex.org/W3203604292","https://openalex.org/W3209598227","https://openalex.org/W4239237828","https://openalex.org/W6606067566","https://openalex.org/W6758078807","https://openalex.org/W6766978615","https://openalex.org/W6769537418","https://openalex.org/W6778434676","https://openalex.org/W6803167334"],"related_works":["https://openalex.org/W1936753088","https://openalex.org/W4387895128","https://openalex.org/W2950440893","https://openalex.org/W1571236230","https://openalex.org/W2083084382","https://openalex.org/W2768332800","https://openalex.org/W2765793266","https://openalex.org/W1557783852","https://openalex.org/W4280589839","https://openalex.org/W2153886246"],"abstract_inverted_index":{"Abstract":[0],"Homomorphic":[1,37,42],"Encryption":[2,38,43],"(HE)":[3],"supports":[4],"computation":[5,83],"on":[6,146],"encrypted":[7],"data":[8,34],"without":[9],"the":[10,82,92,128,137,140,147,165,184,192],"need":[11],"to":[12,19,81,90,111,127,169],"decrypt,":[13],"enabling":[14],"secure":[15],"outsourcing":[16],"of":[17,94,139,180,186],"computing":[18],"an":[20],"untrusted":[21],"cloud.":[22],"Motivated":[23],"by":[24,32],"application":[25],"scenarios":[26,84],"where":[27,164],"private":[28],"information":[29],"is":[30,125,167,191],"offered":[31],"different":[33],"owners,":[35],"Multi-Key":[36],"(MKHE)":[39],"and":[40,58,103,116,132,151],"Threshold":[41],"(ThHE)":[44],"were":[45],"proposed.":[46],"Unlike":[47],"MKHE,":[48],"ThHE":[49,77,195],"schemes":[50],"do":[51],"not":[52],"require":[53],"expensive":[54,101],"ciphertext":[55],"extension":[56],"procedures":[57],"are":[59],"therefore":[60],"as":[61,63],"efficient":[62],"their":[64],"underlying":[65],"single-key":[66],"HE":[67],"schemes.":[68],"In":[69,88],"this":[70],"work,":[71],"we":[72,155],"propose":[73],"a":[74,119,157,176],"novel":[75],"NTRU-type":[76,194],"scheme":[78,124],"which":[79],"caters":[80],"with":[85],"pre-defined":[86],"participants.":[87],"addition":[89],"inheriting":[91],"simplicity":[93],"NTRU":[95],"scheme,":[96],"our":[97,123,187,189],"construction":[98,190],"has":[99],"no":[100,105],"relinearization":[102],"correspondingly":[104],"costly":[106],"evaluation":[107],"keys.":[108],"Controlling":[109],"noise":[110,152],"make":[112],"it":[113],"increase":[114],"linearly":[115],"then":[117],"using":[118],"wide":[120],"key":[121],"distribution,":[122],"immune":[126],"subfield":[129],"lattice":[130],"attacks":[131],"its":[133],"security":[134],"follows":[135],"from":[136],"hardness":[138],"standard":[141],"R-LWE":[142],"problem.":[143],"Finally,":[144],"based":[145],"{0,1}-linear":[148],"secret":[149],"sharing":[150],"flooding":[153],"techniques,":[154],"design":[156],"single":[158],"round":[159],"distributed":[160],"threshold":[161],"decryption":[162,166],"protocol,":[163],"able":[168],"be":[170],"completed":[171],"even":[172],"when":[173],"only":[174],"given":[175],"subset":[177],"(say":[178],"$t$-out-of-$k$)":[179],"partial":[181],"decryptions.":[182],"To":[183],"best":[185],"knowledge,":[188],"first":[193],"scheme.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
