{"id":"https://openalex.org/W4414539039","doi":"https://doi.org/10.1109/icc52391.2025.11161224","title":"Achieving Efficient BGV Scheme with Semi-Honest TEE Assistance","display_name":"Achieving Efficient BGV Scheme with Semi-Honest TEE Assistance","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414539039","doi":"https://doi.org/10.1109/icc52391.2025.11161224"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11161224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087866704","display_name":"Hao Yuan","orcid":"https://orcid.org/0000-0002-9186-4546"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Yuan","raw_affiliation_strings":["Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071"],"affiliations":[{"raw_affiliation_string":"Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021292791","display_name":"Hui Zhu","orcid":"https://orcid.org/0000-0002-5853-633X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhu","raw_affiliation_strings":["Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071"],"affiliations":[{"raw_affiliation_string":"Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101864760","display_name":"Fengwei Wang","orcid":"https://orcid.org/0000-0002-6886-8258"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengwei Wang","raw_affiliation_strings":["Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071"],"affiliations":[{"raw_affiliation_string":"Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086477266","display_name":"Songnian Zhang","orcid":"https://orcid.org/0000-0002-0558-4485"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songnian Zhang","raw_affiliation_strings":["Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071"],"affiliations":[{"raw_affiliation_string":"Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036191126","display_name":"Wei Xu","orcid":"https://orcid.org/0000-0003-4873-6183"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Xu","raw_affiliation_strings":["Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071"],"affiliations":[{"raw_affiliation_string":"Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071"],"affiliations":[{"raw_affiliation_string":"Xidian University,State Key Laboratory of Integrated Services Networks,Xi&#x0027;an,China,710071","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5087866704"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25422649,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"410","last_page":"415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11873","display_name":"PAPR reduction in OFDM","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7049000263214111},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.588699996471405},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5216000080108643},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5166000127792358},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5151000022888184},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4731000065803528},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.42899999022483826},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.42419999837875366},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4059999883174896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7347000241279602},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7049000263214111},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.588699996471405},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5216000080108643},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5166000127792358},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5151000022888184},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4731000065803528},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.42899999022483826},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.42419999837875366},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4059999883174896},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.39809998869895935},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.37369999289512634},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.36959999799728394},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.3513000011444092},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3343999981880188},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3285999894142151},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.30059999227523804},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.2994000017642975},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.2964000105857849},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25699999928474426},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2538999915122986},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11161224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G166084592","display_name":null,"funder_award_id":"2023-JC-QN-0699","funder_id":"https://openalex.org/F4320336567","funder_display_name":"Natural Science Basic Research Program of Shaanxi Province"},{"id":"https://openalex.org/G2283571041","display_name":null,"funder_award_id":"2023-ZDLGY-35","funder_id":"https://openalex.org/F4320336035","funder_display_name":"Shanxi Provincial Key Research and Development Project"},{"id":"https://openalex.org/G3602844107","display_name":null,"funder_award_id":"U22B2030,62302360,62402362","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8567765438","display_name":null,"funder_award_id":"2022YFB4501500,2022YFB4501501","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320336035","display_name":"Shanxi Provincial Key Research and Development Project","ror":null},{"id":"https://openalex.org/F4320336567","display_name":"Natural Science Basic Research Program of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Fully":[0],"Homomorphic":[1],"Encryption":[2],"(FHE)":[3],"allows":[4],"computations":[5],"on":[6,38,48,101,108],"encrypted":[7],"data.":[8],"However,":[9],"FHE":[10,31],"faces":[11],"significant":[12],"performance":[13],"overhead":[14],"due":[15],"to":[16,92],"the":[17,49,52,57,90,96,102,128,138,148,151],"time-consuming":[18],"homomorphic":[19,116,163],"multiplications":[20],"and":[21,132,157,193],"bootstrapping":[22],"operations,":[23],"which":[24],"limits":[25],"its":[26],"practical":[27],"applications.":[28],"Meanwhile,":[29],"many":[30],"optimization":[32],"schemes":[33],"have":[34],"been":[35],"proposed":[36],"based":[37],"a":[39,62,67,113,122,141,171,175],"Trusted":[40],"Execution":[41],"Environment":[42],"(TEE),":[43],"but":[44],"they":[45],"heavily":[46],"rely":[47],"trustworthiness":[50],"of":[51,69,140,162],"TEE.":[53],"In":[54],"outsourcing":[55],"scenarios,":[56],"TEE":[58,86,91,97],"owner":[59,98],"might":[60,99],"be":[61,93],"third-party":[63],"service":[64],"provider,":[65],"posing":[66],"risk":[68],"data":[70,104],"leakage":[71],"for":[72,150],"users.":[73],"To":[74],"address":[75],"these":[76],"issues,":[77],"we":[78,111,169],"propose":[79],"an":[80,159],"efficient":[81],"BGV":[82,115],"scheme":[83,185],"with":[84],"semi-honest":[85,142],"assistance.":[87],"We":[88],"consider":[89],"honest-but-curious,":[94],"meaning":[95],"eavesdrop":[100],"user's":[103],"during":[105],"computation.":[106],"Based":[107],"this":[109],"assumption,":[110],"design":[112],"new":[114],"multiplication":[117,145,164],"protocol":[118,146],"that":[119,183],"operates":[120],"in":[121],"smaller":[123],"ciphertext":[124],"space":[125],"without":[126,166],"compromising":[127],"original":[129],"security":[130,172],"level":[131],"substantially":[133],"improves":[134],"computational":[135],"efficiency.":[136],"With":[137],"assistance":[139],"TEE,":[143],"our":[144,184],"eliminates":[147],"need":[149],"switch":[152],"key,":[153],"reducing":[154],"initialization":[155],"time":[156],"supporting":[158],"unlimited":[160],"number":[161],"operations":[165],"bootstrapping.":[167],"Furthermore,":[168],"provide":[170],"proof":[173],"using":[174],"simulationbased":[176],"real/ideal":[177],"world":[178],"model.":[179],"Extensive":[180],"experiments":[181],"show":[182],"outperforms":[186],"mainstream":[187],"libraries":[188],"such":[189],"as":[190],"SEAL,":[191],"OpenFHE,":[192],"Helib.":[194]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
