{"id":"https://openalex.org/W4415369683","doi":"https://doi.org/10.3390/cryptography9040066","title":"On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection","display_name":"On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4415369683","doi":"https://doi.org/10.3390/cryptography9040066"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9040066","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040066","pdf_url":"https://www.mdpi.com/2410-387X/9/4/66/pdf?version=1760966589","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/4/66/pdf?version=1760966589","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003590145","display_name":"Anas A. Abudaqa","orcid":"https://orcid.org/0000-0001-9425-3671"},"institutions":[{"id":"https://openalex.org/I156216236","display_name":"Qassim University","ror":"https://ror.org/01wsfe280","country_code":"SA","type":"education","lineage":["https://openalex.org/I156216236"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Anas A. Abudaqa","raw_affiliation_strings":["Department of Computer Science, College of Engineering and Information Technology, Onaizah Colleges (OC), Qassim 56447, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering and Information Technology, Onaizah Colleges (OC), Qassim 56447, Saudi Arabia","institution_ids":["https://openalex.org/I156216236"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058062026","display_name":"Khaled Alshehri","orcid":"https://orcid.org/0000-0001-9761-0830"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khaled Alshehri","raw_affiliation_strings":["Mathematics & Statistics Department, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Mathematics & Statistics Department, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037740657","display_name":"Muhamad Felemban","orcid":"https://orcid.org/0000-0001-6414-3391"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhamad Felemban","raw_affiliation_strings":["Computer Engineering Department, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia","Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia","Interdisciplinary Research Center of Intelligent Secure Systems, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Interdisciplinary Research Center of Intelligent Secure Systems, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003590145"],"corresponding_institution_ids":["https://openalex.org/I156216236"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.6124,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9225839,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"9","issue":"4","first_page":"66","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9154999852180481,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9506999850273132},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6189000010490417},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5480999946594238},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5023999810218811},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.4778999984264374},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4603999853134155},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.40149998664855957},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.39329999685287476}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9506999850273132},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6189000010490417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5891000032424927},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5683000087738037},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5480999946594238},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5023999810218811},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.4778999984264374},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4603999853134155},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.40149998664855957},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.39329999685287476},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.38499999046325684},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.3727000057697296},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3531000018119812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34049999713897705},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.31049999594688416},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.3021000027656555},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3009999990463257},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2867000102996826},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.27570000290870667},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25099998712539673}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9040066","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040066","pdf_url":"https://www.mdpi.com/2410-387X/9/4/66/pdf?version=1760966589","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b972017eca0b4b809d9416f3fd3d0b30","is_oa":true,"landing_page_url":"https://doaj.org/article/b972017eca0b4b809d9416f3fd3d0b30","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 4, p 66 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9040066","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040066","pdf_url":"https://www.mdpi.com/2410-387X/9/4/66/pdf?version=1760966589","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322323","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415369683.pdf","grobid_xml":"https://content.openalex.org/works/W4415369683.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1798609567","https://openalex.org/W1985439922","https://openalex.org/W2007466965","https://openalex.org/W2066395169","https://openalex.org/W2084462505","https://openalex.org/W2098290658","https://openalex.org/W2099250555","https://openalex.org/W2102870593","https://openalex.org/W2108834246","https://openalex.org/W2123845384","https://openalex.org/W2133270269","https://openalex.org/W2137147061","https://openalex.org/W2137648527","https://openalex.org/W2143087446","https://openalex.org/W2164409696","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2554750353","https://openalex.org/W2617299507","https://openalex.org/W2740546450","https://openalex.org/W2866028610","https://openalex.org/W3035128690","https://openalex.org/W3107025626","https://openalex.org/W3141585064","https://openalex.org/W3202322174","https://openalex.org/W3205525295","https://openalex.org/W4210300416","https://openalex.org/W4226011816","https://openalex.org/W4232836212","https://openalex.org/W4233479061","https://openalex.org/W4378710505","https://openalex.org/W4389575903"],"related_works":[],"abstract_inverted_index":{"Crystals-Kyber":[0],"and":[1,36,47,110,122,142,155,168],"Classic-McEliece":[2],"are":[3],"two":[4,71,130],"prominent":[5],"post-quantum":[6,58,117],"key":[7,119,162],"encapsulation":[8],"mechanisms":[9],"(KEMs)":[10],"designed":[11],"to":[12,20,77,93],"address":[13],"the":[14,25,31,39,51,54,79,137,174,180,191],"challenges":[15],"posed":[16],"by":[17,30],"quantum":[18],"computing":[19],"classical":[21],"cryptographic":[22],"schemes.":[23],"While":[24],"former":[26],"has":[27],"been":[28],"standardized":[29],"National":[32],"Institute":[33],"of":[34,50,53,57,81,140],"Standards":[35],"Technology":[37],"(NIST),":[38],"latter":[40],"is":[41,65,157,184],"well-known":[42],"for":[43],"its":[44,202],"exceptional":[45],"robustness":[46],"as":[48,116,204],"one":[49],"finalists":[52],"fourth":[55],"round":[56],"cryptography":[59],"standardization.":[60],"Private":[61],"set":[62],"intersection":[63,80],"(PSI)":[64],"a":[66,75,145,205],"privacy-preserving":[67],"technique":[68],"that":[69,135,173],"enables":[70],"parties,":[72],"each":[73],"possessing":[74],"dataset,":[76],"compute":[78],"their":[82,124],"sets":[83],"without":[84],"revealing":[85],"anything":[86],"else.":[87],"This":[88],"can":[89],"be":[90],"achieved":[91],"thanks":[92],"homomorphic":[94,125,138,182,206],"encryption":[95,120,207],"(HE),":[96],"which":[97,178],"allows":[98],"computations":[99],"on":[100,160],"encrypted":[101],"data.":[102],"In":[103,189],"this":[104],"paper,":[105],"firstly,":[106],"we":[107,128],"study":[108],"Kyber":[109,141],"McEliece,":[111],"apart":[112],"from":[113],"being":[114],"KEMs,":[115],"public":[118],"(PKE),":[121],"examine":[123],"properties.":[126],"Secondly,":[127],"design":[129],"different":[131],"two-party":[132],"PSI":[133,176,193],"protocols":[134],"utilize":[136],"capabilities":[139],"McEliece.":[143],"Thirdly,":[144],"practical":[146],"performance":[147],"evaluation":[148],"under":[149],"NIST\u2019s":[150],"security":[151,203],"levels":[152],"1,":[153],"3,":[154],"5":[156],"conducted,":[158],"focusing":[159],"three":[161],"metrics:":[163],"storage":[164],"overhead,":[165,167],"communication":[166],"computation":[169],"cost.":[170],"Insights":[171],"indicate":[172],"Kyber-based":[175],"Protocol,":[177],"utilizes":[179],"multiplicative":[181],"property,":[183],"secure":[185],"but":[186],"less":[187],"efficient.":[188],"contrast,":[190],"McEliece-based":[192],"protocol,":[194],"while":[195],"efficient":[196],"in":[197],"practice,":[198],"raises":[199],"concerns":[200],"regarding":[201],"scheme.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-21T00:00:00"}
