Leveled Homomorphic Encryption Based on NTRU Without Re-Linearization
Xiaokang Dai,
Haoyong Wang,
Wenyuan Wu and
Yong Feng
Additional contact information
Xiaokang Dai: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China
Haoyong Wang: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China
Wenyuan Wu: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China
Yong Feng: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China
International Journal of Information Security and Privacy (IJISP), 2025, vol. 19, issue 1, 1-20
Abstract:
The hardness of the NTRU problem has not been well understood until 2021, when Pellet-Mary and Stehlé (2021) gave a reduction from the Gap-SVP problem on the ideal lattice to the NTRU-Search problem. Assuming the equivalence of the NTRU-Decision and the NTRU-Search problem, with this reduction together, we construct a leveled homomorphic encryption scheme. Compared to homomorphic schemes based on RLWE such as CKKS and BGV, the ciphertext of our scheme is a single polynomial. As a result, ciphertext multiplication involves only one multiplication of two polynomials, rather than the tensor multiplication of polynomial vectors as in BGV, CKKS schemes. In particular, by introducing a label, the ciphertext of our scheme does not need to be linearized after multiplication. This significantly accelerates the speed of homomorphic evaluation by reducing the number of polynomial multiplications from 6 to 1. Complexity analysis and experimental results indicate that the ciphertext multiplication in our scheme is approximately 4~5 times faster than CKKS and BFV schemes
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.386964 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:19:y:2025:i:1:p:1-20
Access Statistics for this article
International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh
More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global Scientific Publishing
Bibliographic data for series maintained by Journal Editor ().