{"id":"https://openalex.org/W4412580553","doi":"https://doi.org/10.1186/s42400-024-00303-y","title":"MAT-FHE: arbitrary dimension matrix multiplication scheme for floating point over fully homomorphic encryption","display_name":"MAT-FHE: arbitrary dimension matrix multiplication scheme for floating point over fully homomorphic encryption","publication_year":2025,"publication_date":"2025-07-23","ids":{"openalex":"https://openalex.org/W4412580553","doi":"https://doi.org/10.1186/s42400-024-00303-y"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00303-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00303-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00303-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00303-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039029709","display_name":"Yatao Yang","orcid":"https://orcid.org/0000-0002-0174-0997"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yatao Yang","raw_affiliation_strings":["Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China","School of Telecommunication Engineering, Xidian University, Xi\u2019an, 710071, China","School of Telecommunication Engineering, Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]},{"raw_affiliation_string":"School of Telecommunication Engineering, Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Telecommunication Engineering, Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112989553","display_name":"Zhaofu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaofu Li","raw_affiliation_strings":["Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111676674","display_name":"Yucheng Ding","orcid":"https://orcid.org/0000-0003-1379-8376"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yucheng Ding","raw_affiliation_strings":["Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034999898","display_name":"Michael Z. Hu","orcid":"https://orcid.org/0000-0001-8461-9684"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Man Hu","raw_affiliation_strings":["Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039029709"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I202334528"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08662229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.784004271030426},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.5848379135131836},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5402718186378479},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.5315653681755066},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.511403501033783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49282124638557434},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.4841516613960266},{"id":"https://openalex.org/keywords/floating-point","display_name":"Floating point","score":0.4644681513309479},{"id":"https://openalex.org/keywords/matrix-multiplication","display_name":"Matrix multiplication","score":0.4587003290653229},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4350982904434204},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4330449104309082},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.371260404586792},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.279592365026474},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.18114659190177917},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.14007562398910522},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.12667211890220642},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1227535605430603},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.10233879089355469},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.07795828580856323},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.05435428023338318}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.784004271030426},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.5848379135131836},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5402718186378479},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.5315653681755066},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.511403501033783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49282124638557434},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.4841516613960266},{"id":"https://openalex.org/C84211073","wikidata":"https://www.wikidata.org/wiki/Q117879","display_name":"Floating point","level":2,"score":0.4644681513309479},{"id":"https://openalex.org/C17349429","wikidata":"https://www.wikidata.org/wiki/Q1049914","display_name":"Matrix multiplication","level":3,"score":0.4587003290653229},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4350982904434204},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4330449104309082},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.371260404586792},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.279592365026474},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.18114659190177917},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.14007562398910522},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.12667211890220642},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1227535605430603},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.10233879089355469},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.07795828580856323},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.05435428023338318},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00303-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00303-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00303-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d6cdc264ea2b4d02ab48e1fc754c69b2","is_oa":true,"landing_page_url":"https://doaj.org/article/d6cdc264ea2b4d02ab48e1fc754c69b2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-14 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00303-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00303-y","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00303-y","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3001288036","display_name":null,"funder_award_id":"3282024052","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7914479115","display_name":null,"funder_award_id":"3282024058","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8473856790","display_name":null,"funder_award_id":"328202225","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8951484681","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412580553.pdf","grobid_xml":"https://content.openalex.org/works/W4412580553.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1494049356","https://openalex.org/W1966731635","https://openalex.org/W1979120705","https://openalex.org/W2071825329","https://openalex.org/W2170444562","https://openalex.org/W2606882085","https://openalex.org/W2768174108","https://openalex.org/W2794974431","https://openalex.org/W2889746123","https://openalex.org/W2892648258","https://openalex.org/W2991364442","https://openalex.org/W3021037411","https://openalex.org/W3081714700","https://openalex.org/W3095317724","https://openalex.org/W3114221980","https://openalex.org/W3149631780","https://openalex.org/W3213258637","https://openalex.org/W4302010773","https://openalex.org/W4303986861","https://openalex.org/W4308219658","https://openalex.org/W4312331389","https://openalex.org/W4320008809"],"related_works":["https://openalex.org/W3099313426","https://openalex.org/W4287593139","https://openalex.org/W752783541","https://openalex.org/W1506547947","https://openalex.org/W2995605830","https://openalex.org/W4206811032","https://openalex.org/W4390748799","https://openalex.org/W2086123442","https://openalex.org/W2596457687","https://openalex.org/W3212757063"],"abstract_inverted_index":{"Abstract":[0],"Matrix":[1],"operation":[2,21,210],"is":[3,77,115,137,159,180,216,219,239],"one":[4],"of":[5,30,53,129,152,175,187,212],"the":[6,28,133,162,176,184,195,203,209,225,242],"most":[7],"basic":[8],"and":[9,15,121,146,150,154,166,201,248,257],"practical":[10],"operations":[11,140],"in":[12,191],"statistical":[13],"analysis":[14],"machine":[16,45,258],"learning.":[17],"The":[18,113,127,172,232],"secure":[19,63,160,244,254],"matrix":[20,55,64,71,82,114,169,185,214,229,245],"over":[22,72],"homomorphic":[23,74],"encryption":[24,75],"technology":[25,76,200],"can":[26,249],"protect":[27],"confidentiality":[29],"input":[31],"data.":[32],"However,":[33],"it":[34,158],"has":[35],"not":[36],"come":[37],"up":[38],"with":[39,132,198],"an":[40],"optimal":[41],"solution":[42],"for":[43,68],"modern":[44],"learning":[46,259],"frameworks,":[47],"partially":[48],"due":[49],"to":[50,79,182,241,252],"a":[51,61,118,124],"lack":[52],"efficient":[54],"computation":[56],"mechanisms.":[57],"In":[58,206],"this":[59,207,237],"paper,":[60,208],"universal":[62],"multiplication":[65,151,186,215,230,246],"scheme":[66,247],"MAT-FHE":[67],"any":[69,192],"dimension":[70],"fully":[73],"designed":[78],"realize":[80],"non-square":[81],"multiplication,":[83],"such":[84,141],"as":[85,142],"$$A_{m\\times":[86],"l}\\times":[87],"B_{l\\times":[88],"n}$$":[89],"<mml:math":[90],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[91],"<mml:mrow>":[92,95,104],"<mml:msub>":[93,102],"<mml:mi>A</mml:mi>":[94],"<mml:mi>m</mml:mi>":[96],"<mml:mo>\u00d7</mml:mo>":[97,101,106],"<mml:mi>l</mml:mi>":[98,105],"</mml:mrow>":[99,108,110],"</mml:msub>":[100,109],"<mml:mi>B</mml:mi>":[103],"<mml:mi>n</mml:mi>":[107],"</mml:math>":[111],".":[112],"filled":[116],"into":[117,123],"hypercube":[119],"structure":[120],"encrypted":[122],"single":[125],"ciphertext.":[126],"number":[128],"ciphertext":[130,148,153],"multiplications":[131],"highest":[134],"computational":[135],"overhead":[136,197],"reduced":[138],"through":[139],"rotating":[143],"by":[144],"rows":[145],"columns,":[147],"addition,":[149],"plaintext.":[155],"After":[156],"analysis,":[157],"under":[161],"CPA":[163],"model,":[164],"composable,":[165],"supports":[167],"floating":[168,188],"continuous":[170],"multiplication.":[171],"CKKS":[173],"algorithm":[174],"Microsoft":[177],"SEAL":[178],"library":[179],"used":[181],"implement":[183],"point":[189],"numbers":[190],"dimension.":[193],"Shared":[194],"computing":[196,255],"SIMD":[199],"improved":[202],"implementation":[204],"speed.":[205],"time":[211],"16-dimensional":[213],"4.2253s,":[217],"which":[218],"about":[220],"1.5":[221],"times":[222],"faster":[223],"than":[224],"existing":[226,243],"best":[227],"square":[228],"scheme.":[231],"experimental":[233],"results":[234],"show":[235],"that":[236],"method":[238],"superior":[240],"be":[250],"applied":[251],"various":[253],"outsourcing":[256],"scenarios.":[260]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
