{"id":"https://openalex.org/W7135236836","doi":"https://doi.org/10.1186/s42400-026-00563-w","title":"Accelerating MKFHE bootstrapping via parallel-friendly NTRU-based blind rotation","display_name":"Accelerating MKFHE bootstrapping via parallel-friendly NTRU-based blind rotation","publication_year":2026,"publication_date":"2026-03-13","ids":{"openalex":"https://openalex.org/W7135236836","doi":"https://doi.org/10.1186/s42400-026-00563-w"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-026-00563-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00563-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00563-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00563-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101853970","display_name":"Yiran Dai","orcid":"https://orcid.org/0009-0002-2600-7043"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiran Dai","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008727912","display_name":"B. B. Xiang","orcid":"https://orcid.org/0009-0002-8163-3987"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binwu Xiang","raw_affiliation_strings":["East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129078634","display_name":"Yi Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Deng","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128932047","display_name":"Jiang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiang Zhang","raw_affiliation_strings":["State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5129078634"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.57876621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0024999999441206455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7415000200271606},{"id":"https://openalex.org/keywords/bootstrapping","display_name":"Bootstrapping (finance)","score":0.6341999769210815},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5778999924659729},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5472000241279602},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5370000004768372},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.48350000381469727},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.4814000129699707},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4666000008583069}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7415000200271606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7390999794006348},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.6341999769210815},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5778999924659729},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5472000241279602},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5370000004768372},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.48350000381469727},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.4814000129699707},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4781999886035919},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4666000008583069},{"id":"https://openalex.org/C74050887","wikidata":"https://www.wikidata.org/wiki/Q848368","display_name":"Rotation (mathematics)","level":2,"score":0.4325000047683716},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41519999504089355},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.39579999446868896},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.39399999380111694},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.36070001125335693},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.3422999978065491},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.3237999975681305},{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.2831999957561493},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2662000060081482}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-026-00563-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00563-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00563-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8091e723661741dabe500bff7151671e","is_oa":true,"landing_page_url":"https://doaj.org/article/8091e723661741dabe500bff7151671e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-026-00563-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00563-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00563-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2310968879","display_name":null,"funder_award_id":"62372447","funder_id":"https://openalex.org/F4320310121","funder_display_name":"Natural Science Foundation of Jilin Province"},{"id":"https://openalex.org/G2489800280","display_name":null,"funder_award_id":"2023YFB4503203","funder_id":"https://openalex.org/F4320336740","funder_display_name":"Chongqing Municipality Key Research and Development Program of China"},{"id":"https://openalex.org/G2675430053","display_name":null,"funder_award_id":"62372447","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4039563609","display_name":null,"funder_award_id":"XDB06","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6258415954","display_name":null,"funder_award_id":"Chinese","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320310121","display_name":"Natural Science Foundation of Jilin Province","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320336740","display_name":"Chongqing Municipality Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7135236836.pdf","grobid_xml":"https://content.openalex.org/works/W7135236836.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W74973629","https://openalex.org/W1675339804","https://openalex.org/W2007466965","https://openalex.org/W2031533839","https://openalex.org/W2048994663","https://openalex.org/W2135124252","https://openalex.org/W2152926062","https://openalex.org/W2226167778","https://openalex.org/W2296488250","https://openalex.org/W2400700555","https://openalex.org/W2477092523","https://openalex.org/W2499340481","https://openalex.org/W2514005182","https://openalex.org/W2554750353","https://openalex.org/W2585373573","https://openalex.org/W2603065436","https://openalex.org/W2768174108","https://openalex.org/W2793691261","https://openalex.org/W2991092021","https://openalex.org/W3081517513","https://openalex.org/W3176410512","https://openalex.org/W4205873558","https://openalex.org/W4307823778","https://openalex.org/W4308642416","https://openalex.org/W4320154905","https://openalex.org/W4365806969","https://openalex.org/W4372358101","https://openalex.org/W4380319812","https://openalex.org/W4385654031","https://openalex.org/W4390741759","https://openalex.org/W4394788404","https://openalex.org/W4403175155","https://openalex.org/W4405200475"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Fully":[1],"Homomorphic":[2],"Encryption":[3],"(FHE)":[4],"enables":[5],"arbitrary":[6],"computations":[7],"on":[8,25,68],"encrypted":[9,27],"data,":[10],"a":[11,40,60,81,153,171,179],"paradigm":[12],"that":[13],"Multi-Key":[14],"FHE":[15],"(MKFHE)":[16],"extends":[17,97],"to":[18,101,122,191,238],"the":[19,33,45,52,69,98,114],"decentralized":[20],"setting":[21],"by":[22],"supporting":[23],"operations":[24],"ciphertexts":[26],"under":[28],"multiple,":[29],"distinct":[30],"keys.":[31],"However,":[32],"high":[34],"computational":[35,147],"cost":[36],"of":[37,175],"bootstrapping":[38,173],"remains":[39],"major":[41],"bottleneck,":[42],"especially":[43],"in":[44,145],"multi-key":[46],"scenario":[47],"where":[48],"blind":[49,64,89],"rotation":[50,65],"is":[51,80],"dominant":[53],"overhead.":[54],"To":[55],"address":[56],"this,":[57],"we":[58],"propose":[59],"novel":[61],"and":[62,96,107,149,221],"parallel-friendly":[63],"scheme":[66,137,169,199],"based":[67],"NTRU":[70,106],"assumption":[71],"for":[72,87,207,223],"efficient":[73],"MKFHE":[74,143],"bootstrapping.":[75],"Our":[76,110,136],"core":[77],"technical":[78],"contribution":[79],"grouped":[82],"inner":[83],"product":[84,94,100],"algorithm":[85,112],"optimized":[86],"automorphism-based":[88],"rotation,":[90],"which":[91],"reorganizes":[92],"hybrid":[93],"storage":[95,150,202],"external":[99],"be":[102],"compatible":[103],"with":[104,157],"both":[105,146],"MK-RLWE":[108],"ciphertexts.":[109],"parallelized":[111],"reduces":[113,201],"time":[115,174],"complexity":[116],"from":[117],"O":[118],"(":[119,210,226],"n":[120],")":[121],"$$O(\\sqrt{n})$$":[123],"<mml:math":[124,159,182,213,229],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[125,160,183,214,230],"<mml:mrow>":[126,161,184,215,231],"<mml:mi>O</mml:mi>":[127],"<mml:mo>(</mml:mo>":[128],"<mml:msqrt>":[129],"<mml:mi>n</mml:mi>":[130],"</mml:msqrt>":[131],"<mml:mo>)</mml:mo>":[132],"</mml:mrow>":[133,165,187,218,234],"</mml:math>":[134,166,188,219,235],".":[135],"demonstrates":[138],"significant":[139],"improvements":[140],"over":[141],"prior":[142],"works":[144],"efficiency":[148],"requirements.":[151],"At":[152],"100-bit":[154],"security":[155],"level":[156],"$$k=8$$":[158],"<mml:mi>k</mml:mi>":[162],"<mml:mo>=</mml:mo>":[163],"<mml:mn>8</mml:mn>":[164],"participants,":[167],"our":[168,198],"achieves":[170],"ciphertext":[172],"0.048":[176],"seconds,":[177],"representing":[178],"$$6.8":[180],"\\times$$":[181,212,228],"<mml:mn>6.8</mml:mn>":[185],"<mml:mo>\u00d7</mml:mo>":[186,217,233],"speedup":[189],"compared":[190],"Kwak":[192,239],"et":[193,240],"al.\u2019s":[194,241],"state-of-the-art":[195],"work.":[196],"Furthermore,":[197],"substantially":[200],"overhead,":[203],"requiring":[204],"only":[205],"81.5MB":[206],"evaluation":[208],"keys":[209,225],"$$1.7":[211],"<mml:mn>1.7</mml:mn>":[216],"smaller)":[220,236],"64KB":[222],"re-linearization":[224],"$$6.0":[227],"<mml:mn>6.0</mml:mn>":[232],"relative":[237],"implementation.":[242]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2026-03-14T00:00:00"}
