{"id":"https://openalex.org/W3211401014","doi":"https://doi.org/10.1109/tifs.2021.3127023","title":"Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE","display_name":"Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3211401014","doi":"https://doi.org/10.1109/tifs.2021.3127023","mag":"3211401014"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3127023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3127023","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Dynamic_multi-key_FHE_in_asymmetric_key_setting_from_LWE/16900243","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100722817","display_name":"Yuling Chen","orcid":"https://orcid.org/0000-0002-8674-8356"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuling Chen","raw_affiliation_strings":["State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China","State Key Laboratory of Public Big Data and College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data and College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063153598","display_name":"sen Dong","orcid":"https://orcid.org/0000-0003-2358-315X"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sen Dong","raw_affiliation_strings":["State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012896021","display_name":"Tao Li","orcid":"https://orcid.org/0000-0003-3353-4618"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China","State Key Laboratory of Public Big Data and College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data and College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037267035","display_name":"Yilei Wang","orcid":"https://orcid.org/0000-0003-1524-2064"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yilei Wang","raw_affiliation_strings":["College of Computer Science and Technology, Qufu Normal University, Qufu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qufu Normal University, Qufu, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066119228","display_name":"Huiyu Zhou","orcid":"https://orcid.org/0000-0003-1634-9840"},"institutions":[{"id":"https://openalex.org/I153648349","display_name":"University of Leicester","ror":"https://ror.org/04h699437","country_code":"GB","type":"education","lineage":["https://openalex.org/I153648349"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Huiyu Zhou","raw_affiliation_strings":["School of Informatics, University of Leicester, Leicester, U.K","School of Informatics, University of Leicester, Leicester LE1 7RH, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Leicester, Leicester, U.K","institution_ids":["https://openalex.org/I153648349"]},{"raw_affiliation_string":"School of Informatics, University of Leicester, Leicester LE1 7RH, United Kingdom","institution_ids":["https://openalex.org/I153648349"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100722817"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":null,"apc_paid":null,"fwci":7.1378,"has_fulltext":false,"cited_by_count":65,"citation_normalized_percentile":{"value":0.9754373,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"16","issue":null,"first_page":"5239","last_page":"5249"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9588000178337097,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7909112572669983},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.7356512546539307},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7235336303710938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7230461835861206},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6711851954460144},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5808090567588806},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5772517323493958},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5060476660728455},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4556238651275635},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4095514714717865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1693422794342041}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7909112572669983},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.7356512546539307},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7235336303710938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7230461835861206},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6711851954460144},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5808090567588806},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5772517323493958},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5060476660728455},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4556238651275635},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4095514714717865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1693422794342041}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2021.3127023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3127023","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/16900243","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Dynamic_multi-key_FHE_in_asymmetric_key_setting_from_LWE/16900243","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/16900243","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Dynamic_multi-key_FHE_in_asymmetric_key_setting_from_LWE/16900243","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1041604953","display_name":null,"funder_award_id":"61962009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6673157002","display_name":null,"funder_award_id":"[2020]2Y011","funder_id":"https://openalex.org/F4320336617","funder_display_name":"Science and Technology Program of Guizhou Province"},{"id":"https://openalex.org/G978106338","display_name":null,"funder_award_id":"20183001","funder_id":"https://openalex.org/F4320329858","funder_display_name":"Major Scientific and Technological Special Project of Guizhou Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329858","display_name":"Major Scientific and Technological Special Project of Guizhou Province","ror":null},{"id":"https://openalex.org/F4320336617","display_name":"Science and Technology Program of Guizhou Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W74973629","https://openalex.org/W150223756","https://openalex.org/W1494049356","https://openalex.org/W1497981337","https://openalex.org/W1509320652","https://openalex.org/W1575598731","https://openalex.org/W1675339804","https://openalex.org/W1992282993","https://openalex.org/W2031533839","https://openalex.org/W2048994663","https://openalex.org/W2058785578","https://openalex.org/W2061949491","https://openalex.org/W2089477764","https://openalex.org/W2110987245","https://openalex.org/W2296488250","https://openalex.org/W2499150512","https://openalex.org/W2499340481","https://openalex.org/W2538296643","https://openalex.org/W2767843857","https://openalex.org/W2979806863","https://openalex.org/W2991092021","https://openalex.org/W3111030918","https://openalex.org/W3133536052","https://openalex.org/W3206336892","https://openalex.org/W6603033481","https://openalex.org/W6606067566"],"related_works":["https://openalex.org/W2363701519","https://openalex.org/W2292786713","https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W2947510282","https://openalex.org/W1906282778","https://openalex.org/W1939781145","https://openalex.org/W1558439324","https://openalex.org/W2537419609"],"abstract_inverted_index":{"Multi-key":[0],"Fully":[1],"homomorphic":[2,67,157],"encryption":[3],"(MFHE)":[4],"schemes":[5,19],"allow":[6],"computation":[7,68,201],"on":[8,21,69,142],"the":[9,27,32,48,53,56,93,97,109,128,143,160,178,194,198,218],"encrypted":[10,74,162],"data":[11],"under":[12,75,163,212],"different":[13],"keys.":[14,165],"However,":[15],"traditional":[16],"multi-key":[17,44,87,120,138],"FHE":[18,45,88,121,139],"based":[20,141],"Learning":[22],"with":[23,159,167],"errors":[24],"(LWE)":[25],"have":[26],"undesirable":[28],"property":[29],"that":[30,197],"is":[31,47,58,123,183,202,207],"number":[33],"of":[34,113,180],"keys":[35],"has":[36],"to":[37,100,108,115,192,209],"be":[38,153,210],"fixed":[39],"in":[40,131,146],"advance.":[41],"A":[42],"dynamic":[43,86,119,137],"scheme":[46,122,140,206],"most":[49],"versatile":[50],"variant":[51],"which":[52,104],"information":[54],"about":[55],"participants":[57],"not":[59],"required":[60],"before":[61],"key":[62,148],"generation.":[63],"To":[64,126],"support":[65],"further":[66],"extended":[70,154],"ciphertexts":[71,73,161],"and":[72,79,155,177],"additional":[76,164],"keys,":[77],"Peikert":[78],"Shiehian":[80],"(TCC":[81],"\u201916)":[82],"proposed":[83,171,186],"a":[84,117,136,189],"leveled":[85],"scheme.":[89,110],"Nevertheless,":[90],"it":[91],"introduces":[92],"circular-security":[94,219],"assumption":[95,145],"for":[96],"LWE":[98,144,214],"parameters":[99],"ensure":[101],"its":[102],"security,":[103],"provides":[105,188],"weaker":[106],"security":[107],"The":[111,150],"problem":[112],"how":[114],"construct":[116],"LWE-based":[118],"still":[124],"open.":[125],"address":[127],"above":[129],"problem,":[130],"this":[132],"work,":[133],"we":[134],"present":[135],"public":[147],"setting.":[149],"ciphertext":[151,181,195,199],"can":[152],"performed":[156],"evaluation":[158],"Compared":[166],"current":[168],"constructions,":[169],"our":[170],"method":[172,187],"requires":[173],"fewer":[174],"\u201clocal\u201d":[175],"memory":[176],"process":[179],"extension":[182],"distributed.":[184],"Our":[185,205],"new":[190],"way":[191],"extend":[193],"such":[196],"homomorphism":[200],"more":[203],"efficient.":[204],"proven":[208],"secure":[211],"standard":[213],"assumptions":[215],"without":[216],"using":[217],"assumption.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":27},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
