{"id":"https://openalex.org/W2801864478","doi":"https://doi.org/10.1155/2018/5967635","title":"LWR-Based Fully Homomorphic Encryption, Revisited","display_name":"LWR-Based Fully Homomorphic Encryption, Revisited","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2801864478","doi":"https://doi.org/10.1155/2018/5967635","mag":"2801864478"},"language":"en","primary_location":{"id":"doi:10.1155/2018/5967635","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/5967635","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/5967635.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2018/5967635.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Fucai Luo","orcid":"https://orcid.org/0000-0002-3082-4495"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fucai Luo","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-3082-4495","affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053519178","display_name":"Fuqun Wang","orcid":"https://orcid.org/0000-0002-6178-3630"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fuqun Wang","raw_affiliation_strings":["College of Science, Hangzhou Normal University, Hangzhou, China","Westone Cryptologic Research Center, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Science, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100676186","display_name":"Kunpeng Wang","orcid":"https://orcid.org/0000-0002-9412-7867"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunpeng Wang","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100660543","display_name":"Jie Li","orcid":"https://orcid.org/0000-0002-7582-7630"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101672513","display_name":"Kefei Chen","orcid":"https://orcid.org/0000-0003-1961-5614"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kefei Chen","raw_affiliation_strings":["College of Science, Hangzhou Normal University, Hangzhou, China","Westone Cryptologic Research Center, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Science, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.1856,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.84103572,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8792601823806763},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7158169746398926},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.5933352708816528},{"id":"https://openalex.org/keywords/rounding","display_name":"Rounding","score":0.5720841288566589},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.43680480122566223},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.436197966337204},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3887222707271576},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3708922863006592},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.36641037464141846},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2982340455055237},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21129649877548218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09880813956260681}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8792601823806763},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7158169746398926},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.5933352708816528},{"id":"https://openalex.org/C136625980","wikidata":"https://www.wikidata.org/wiki/Q663208","display_name":"Rounding","level":2,"score":0.5720841288566589},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.43680480122566223},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.436197966337204},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3887222707271576},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3708922863006592},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.36641037464141846},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2982340455055237},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21129649877548218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09880813956260681},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/5967635","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/5967635","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/5967635.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:554037a976c340efb64e9b4755fa3a30","is_oa":false,"landing_page_url":"https://doaj.org/article/554037a976c340efb64e9b4755fa3a30","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/5967635","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/5967635","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/5967635.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G1048992944","display_name":null,"funder_award_id":"61272040","funder_id":"https://openalex.org/F4320324716","funder_display_name":"Hangzhou Normal University"},{"id":"https://openalex.org/G1167822862","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320325436","funder_display_name":"Department of Education of Zhejiang Province"},{"id":"https://openalex.org/G1566983096","display_name":null,"funder_award_id":"2014CB340603","funder_id":"https://openalex.org/F4320325436","funder_display_name":"Department of Education of Zhejiang Province"},{"id":"https://openalex.org/G1655223595","display_name":null,"funder_award_id":"61672030","funder_id":"https://openalex.org/F4320324716","funder_display_name":"Hangzhou Normal University"},{"id":"https://openalex.org/G1698086424","display_name":null,"funder_award_id":"2017QDL002","funder_id":"https://openalex.org/F4320324716","funder_display_name":"Hangzhou Normal University"},{"id":"https://openalex.org/G1909271194","display_name":null,"funder_award_id":"61272040","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G1952577535","display_name":null,"funder_award_id":"61272040","funder_id":"https://openalex.org/F4320325436","funder_display_name":"Department of Education of Zhejiang Province"},{"id":"https://openalex.org/G1967857365","display_name":null,"funder_award_id":"2017QDL002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2067983305","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2424198329","display_name":null,"funder_award_id":"Y201737292","funder_id":"https://openalex.org/F4320324716","funder_display_name":"Hangzhou Normal University"},{"id":"https://openalex.org/G2595876578","display_name":null,"funder_award_id":"U1705264","funder_id":"https://openalex.org/F4320324716","funder_display_name":"Hangzhou Normal University"},{"id":"https://openalex.org/G3891645111","display_name":null,"funder_award_id":"973 Project","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4170753313","display_name":null,"funder_award_id":"Y201737292","funder_id":"https://openalex.org/F4320325436","funder_display_name":"Department of Education of Zhejiang Province"},{"id":"https://openalex.org/G5045679700","display_name":null,"funder_award_id":"2014CB340603","funder_id":"https://openalex.org/F4320324716","funder_display_name":"Hangzhou Normal University"},{"id":"https://openalex.org/G5122028773","display_name":null,"funder_award_id":"2017QDL002","funder_id":"https://openalex.org/F4320325436","funder_display_name":"Department of Education of Zhejiang Province"},{"id":"https://openalex.org/G5173248679","display_name":null,"funder_award_id":"2017QDL002","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5750564477","display_name":null,"funder_award_id":"U1705264","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6131562762","display_name":null,"funder_award_id":"61672030","funder_id":"https://openalex.org/F4320325436","funder_display_name":"Department of Education of Zhejiang Province"},{"id":"https://openalex.org/G6557370637","display_name":null,"funder_award_id":"Y201737292","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6580741241","display_name":null,"funder_award_id":"2014CB340603","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6688039785","display_name":null,"funder_award_id":"61272040","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7190440713","display_name":null,"funder_award_id":"U1705264","funder_id":"https://openalex.org/F4320325436","funder_display_name":"Department of Education of Zhejiang Province"},{"id":"https://openalex.org/G7315056798","display_name":null,"funder_award_id":"Y201737292","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7882990009","display_name":null,"funder_award_id":"U1705264","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8170696387","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8261061201","display_name":null,"funder_award_id":"61672030","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8548018476","display_name":null,"funder_award_id":"61672030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8935174052","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320324716","funder_display_name":"Hangzhou Normal University"},{"id":"https://openalex.org/G8990348288","display_name":null,"funder_award_id":"2014CB340603","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324716","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15"},{"id":"https://openalex.org/F4320325436","display_name":"Department of Education of Zhejiang Province","ror":"https://ror.org/05gj07w56"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2801864478.pdf","grobid_xml":"https://content.openalex.org/works/W2801864478.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W38127577","https://openalex.org/W56544557","https://openalex.org/W74973629","https://openalex.org/W913176383","https://openalex.org/W1494049356","https://openalex.org/W1575598731","https://openalex.org/W2007466965","https://openalex.org/W2015880590","https://openalex.org/W2156030242","https://openalex.org/W2226167778","https://openalex.org/W2499340481","https://openalex.org/W2538296643"],"related_works":["https://openalex.org/W2963103512","https://openalex.org/W3029045823","https://openalex.org/W2400565204","https://openalex.org/W2885113919","https://openalex.org/W3003331030","https://openalex.org/W3174551526","https://openalex.org/W4205350912","https://openalex.org/W4394788392","https://openalex.org/W4391555859","https://openalex.org/W4407958987"],"abstract_inverted_index":{"Very":[0],"recently,":[1],"Costache":[2],"and":[3,50,68,77,104,193,212],"Smart":[4],"proposed":[5,142],"a":[6,65,74,90,154],"fully":[7],"homomorphic":[8,46,85,161],"encryption":[9],"(FHE)":[10],"scheme":[11,38,128,176],"based":[12],"on":[13],"the":[14,24,32,43,69,80,101,106,113,122,130,137,160,172,178,182,208],"Learning":[15],"with":[16,220],"Rounding":[17],"(":[18],"LWR":[19,62,102,125,173,199],")":[20],"problem,":[21],"which":[22,52,87],"removes":[23],"noise":[25,44],"(typically,":[26],"Gaussian":[27],"noise)":[28],"sampling":[29],"needed":[30],"in":[31,89,100],"previous":[33],"lattices-based":[34],"FHEs.":[35],"But":[36],"their":[37,118],"did":[39],"not":[40],"work,":[41,119],"since":[42],"of":[45,56],"multiplication":[47,157],"is":[48],"complicated":[49],"large,":[51],"leads":[53],"to":[54,83,112,158,177,185,207,217],"failure":[55],"decryption.":[57],"More":[58],"specifically,":[59],"they":[60],"chose":[61],"instances":[63],"as":[64,73],"public":[66],"key":[67,71,76],"private":[70],"therein":[72],"secret":[75],"then":[78,105],"used":[79,184],"tensor":[81,114],"product":[82],"implement":[84],"multiplication,":[86,162],"resulted":[88],"tangly":[91,131,165],"modulus":[92,132,166],"problem.":[93,167],"Recall":[94],"that":[95],"there":[96],"are":[97],"two":[98],"moduli":[99,107],"instances,":[103],"will":[108],"tangle":[109],"together":[110],"due":[111],"product.":[115],"Inspired":[116],"by":[117,134,143,191],"we":[120,152,169],"built":[121],"first":[123],"workable":[124],"-based":[126,174,188,200],"FHE":[127,175,190,202],"eliminating":[129],"problem":[133],"cleverly":[135],"adopting":[136],"celebrated":[138],"approximate":[139],"eigenvector":[140],"method":[141],"Gentry":[144],"et":[145],"al.":[146],"at":[147,195],"Crypto":[148],"2013.":[149],"Roughly":[150],"speaking,":[151],"use":[153],"specific":[155],"matrix":[156],"perform":[159],"hence":[163],"no":[164],"Furthermore,":[168],"also":[170,214],"extend":[171],"multikey":[179,189,201,210],"setting":[180],"using":[181],"tricks":[183],"construct":[186],"LWE":[187],"Mukherjee":[192],"Wichs":[194],"Eurocrypt":[196],"2016.":[197],"Our":[198],"construction":[203],"provides":[204],"an":[205],"alternative":[206],"existing":[209],"FHEs":[211],"can":[213],"be":[215],"applied":[216],"multiparty":[218],"computation":[219],"higher":[221],"efficiency.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
