{"id":"https://openalex.org/W4414865898","doi":"https://doi.org/10.3390/sym17101666","title":"Homomorphic Cryptographic Scheme Based on Nilpotent Lie Algebras for Post-Quantum Security","display_name":"Homomorphic Cryptographic Scheme Based on Nilpotent Lie Algebras for Post-Quantum Security","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414865898","doi":"https://doi.org/10.3390/sym17101666"},"language":"en","primary_location":{"id":"doi:10.3390/sym17101666","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17101666","pdf_url":null,"source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/sym17101666","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018615563","display_name":"Aybeyan Selimi","orcid":"https://orcid.org/0000-0001-8285-2175"},"institutions":[{"id":"https://openalex.org/I4210132068","display_name":"Vision International University","ror":"https://ror.org/032bzhf86","country_code":"US","type":"education","lineage":["https://openalex.org/I4210132068"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aybeyan Selim","raw_affiliation_strings":["Faculty of Engineering and Architecture, International Vision University, Major Cede Filipovski, 1230 Gostivar, North Macedonia"],"raw_orcid":"https://orcid.org/0000-0001-8285-2175","affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Architecture, International Vision University, Major Cede Filipovski, 1230 Gostivar, North Macedonia","institution_ids":["https://openalex.org/I4210132068"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064747890","display_name":"Muzafer Sara\u010devi\u0107","orcid":"https://orcid.org/0000-0003-2577-7927"},"institutions":[{"id":"https://openalex.org/I110774718","display_name":"Univerzitet u Novom Pazaru","ror":"https://ror.org/01dv2a529","country_code":"RS","type":"education","lineage":["https://openalex.org/I110774718"]}],"countries":["RS"],"is_corresponding":false,"raw_author_name":"Muzafer Sara\u010devi\u0107","raw_affiliation_strings":["Department of Economics and Computer Sciences, University of Novi Pazar, Dimitrija Tucovi\u0107a 65, 36300 Novi Pazar, Serbia"],"raw_orcid":"https://orcid.org/0000-0003-2577-7927","affiliations":[{"raw_affiliation_string":"Department of Economics and Computer Sciences, University of Novi Pazar, Dimitrija Tucovi\u0107a 65, 36300 Novi Pazar, Serbia","institution_ids":["https://openalex.org/I110774718"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057512989","display_name":"Azra \u0106atovi\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I110774718","display_name":"Univerzitet u Novom Pazaru","ror":"https://ror.org/01dv2a529","country_code":"RS","type":"education","lineage":["https://openalex.org/I110774718"]}],"countries":["RS"],"is_corresponding":false,"raw_author_name":"Azra \u0106atovi\u0107","raw_affiliation_strings":["Department of Economics and Computer Sciences, University of Novi Pazar, Dimitrija Tucovi\u0107a 65, 36300 Novi Pazar, Serbia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Economics and Computer Sciences, University of Novi Pazar, Dimitrija Tucovi\u0107a 65, 36300 Novi Pazar, Serbia","institution_ids":["https://openalex.org/I110774718"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018615563"],"corresponding_institution_ids":["https://openalex.org/I4210132068"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13855945,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"10","first_page":"1666","last_page":"1666"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7534000277519226},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.6319000124931335},{"id":"https://openalex.org/keywords/homomorphism","display_name":"Homomorphism","score":0.5532000064849854},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.49470001459121704},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.4749000072479248},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4683000147342682},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45570001006126404},{"id":"https://openalex.org/keywords/nilpotent","display_name":"Nilpotent","score":0.39879998564720154},{"id":"https://openalex.org/keywords/chinese-remainder-theorem","display_name":"Chinese remainder theorem","score":0.39430001378059387},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.3783999979496002}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7534000277519226},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.6319000124931335},{"id":"https://openalex.org/C4042151","wikidata":"https://www.wikidata.org/wiki/Q215111","display_name":"Homomorphism","level":2,"score":0.5532000064849854},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5202000141143799},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.49470001459121704},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.4749000072479248},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4683000147342682},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45570001006126404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44179999828338623},{"id":"https://openalex.org/C50555996","wikidata":"https://www.wikidata.org/wiki/Q840023","display_name":"Nilpotent","level":2,"score":0.39879998564720154},{"id":"https://openalex.org/C151635116","wikidata":"https://www.wikidata.org/wiki/Q193878","display_name":"Chinese remainder theorem","level":2,"score":0.39430001378059387},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3905999958515167},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.3783999979496002},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.375},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3668000102043152},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.34540000557899475},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.34139999747276306},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.33970001339912415},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.32170000672340393},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.31150001287460327},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.3098999857902527},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.30640000104904175},{"id":"https://openalex.org/C518143113","wikidata":"https://www.wikidata.org/wiki/Q4391941","display_name":"Non-associative algebra","level":4,"score":0.30399999022483826},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.2678999900817871},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C51568863","wikidata":"https://www.wikidata.org/wiki/Q664495","display_name":"Lie algebra","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.26420000195503235},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C159423971","wikidata":"https://www.wikidata.org/wiki/Q177251","display_name":"Associative property","level":2,"score":0.2578999996185303}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3390/sym17101666","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17101666","pdf_url":null,"source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3390/sym17101666","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym17101666","pdf_url":null,"source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1976904648","https://openalex.org/W2007466965","https://openalex.org/W2017573367","https://openalex.org/W2086042811","https://openalex.org/W2132172731","https://openalex.org/W2167595647","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2484860292","https://openalex.org/W2768174108","https://openalex.org/W2808288168","https://openalex.org/W2963162271","https://openalex.org/W2988963440","https://openalex.org/W3028867652","https://openalex.org/W3106179070","https://openalex.org/W3135682424","https://openalex.org/W3176192959","https://openalex.org/W4212805042","https://openalex.org/W4232851628","https://openalex.org/W4248613038","https://openalex.org/W4297991408","https://openalex.org/W4298289021","https://openalex.org/W4323308830","https://openalex.org/W4387805051","https://openalex.org/W4391094316","https://openalex.org/W4406935936","https://openalex.org/W4406936022","https://openalex.org/W4408669954","https://openalex.org/W4409061643","https://openalex.org/W4409431494","https://openalex.org/W4409585885","https://openalex.org/W4410006316","https://openalex.org/W4410360446","https://openalex.org/W4410518505","https://openalex.org/W4410520542","https://openalex.org/W4410901635"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"the":[3,10,29,37,83,87,107,137,144,154,164,171,177,201,226,233],"use":[4],"of":[5,136],"nilpotent":[6],"Lie":[7],"algebras":[8],"as":[9,240],"basis":[11],"for":[12,123],"homomorphic":[13,108],"encryption":[14],"based":[15],"on":[16],"additive":[17,53,79,113,205],"operations":[18],"is":[19,23,34,57,78,91,121],"explored.":[20],"The":[21,76,110,150,189],"g-setting":[22],"set":[24],"up":[25],"over":[26,140],"gln(Zq))":[27],"and":[28,32,39,64,72,103,130,146,163,185,196,215],"group":[30],"G=exp(g),":[31],"it":[33,120],"noted":[35],"that":[36,153],"exponential":[38],"logarithm":[40],"series":[41,138],"are":[42,191],"truncated":[43,117],"by":[44],"nilpotency":[45],"in":[46,80,86,199,223],"a":[47,60,65,116,128,241],"natural":[48],"way.":[49],"From":[50],"this,":[51],"an":[52,94],"symmetric":[54],"conjugation":[55],"scheme":[56,77,111],"constructed:":[58],"given":[59],"message":[61],"element":[62],"M":[63],"central":[66],"randomizer":[67],"U\u2208zg,":[68],"we":[69,174],"encrypt":[70],"=KexpM+UK\u22121":[71],"decrypt":[73],"to":[74,225],"M=log(K\u22121CK)\u2212U.":[75],"nature,":[81],"with":[82,170,245],"security":[84,243],"defined":[85],"IND-CPA":[88,211],"model.":[89],"Integrity":[90],"ensured":[92],"using":[93],"encrypt-then-MAC":[95],"construction.":[96],"These":[97],"properties":[98],"together":[99],"provide":[100],"both":[101],"confidentiality":[102],"robustness":[104],"while":[105],"preserving":[106],"functionality.":[109],"realizes":[112],"homomorphism":[114],"through":[115],"BCH-sum,":[118],"so":[119],"suitable":[122],"ciphertext":[124],"summations.":[125],"We":[126,219],"implemented":[127],"prototype":[129],"took":[131],"reproducible":[132],"measurements":[133],"(Python":[134],"3.11/NumPy)":[135],"{10,102,103,104,105}":[139],"10":[141],"iterations,":[142],"reporting":[143],"medians":[145],"95%":[147],"confidence":[148],"intervals.":[149],"graphs":[151],"exhibit":[152],"latency":[155],"per":[156],"operation":[157],"remains":[158],"constant":[159],"at":[160],"fixed":[161],"values,":[162],"total":[165],"time":[166],"scales":[167],"approximately":[168],"linearly":[169],"batch":[172],"size;":[173],"also":[175],"report":[176],"throughput,":[178],"peak":[179],"memory":[180],"usage,":[181],"\u2223C\u2223/\u2223M\u2223":[182],"expansion":[183],"rate,":[184],"achievable":[186],"aggregation":[187],"depth.":[188],"applications":[190],"federated":[192],"reporting,":[193],"IoT":[194],"telemetry,":[195],"privacy-preserving":[197],"aggregations":[198],"DBMS;":[200],"limitations":[202],"include":[203],"its":[204],"nature":[206],"(lacking":[207],"general":[208],"multiplicative":[209],"homomorphism),":[210],"(but":[212],"not":[213],"CCA),":[214],"side-channel":[216],"resistance":[217],"requirements.":[218],"place":[220],"our":[221],"approach":[222],"contrast":[224],"standard":[227],"FHE":[228],"building":[229],"blocks":[230],"BFV/BGV/CKKS":[231],"nd":[232],"emerging":[234],"NIST":[235],"PQC":[236],"standards":[237],"(FIPS":[238],"203/204/205),":[239],"well-established":[242],"model":[244],"future":[246],"engineering":[247],"optimizations.":[248]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
