EconPapers    
Economics at your fingertips  
 

Leveled Homomorphic Encryption Based on NTRU Without Re-Linearization

Xiaokang Dai, Haoyong Wang, Wenyuan Wu and Yong Feng
Additional contact information
Xiaokang Dai: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China
Haoyong Wang: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China
Wenyuan Wu: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China
Yong Feng: Chongqing Institute of Green and Intelligent Technology, Chinese Academy Sciences, Chongqing, China & Chongqing School, University of Chinese Academy of Sciences, Chongqing, China

International Journal of Information Security and Privacy (IJISP), 2025, vol. 19, issue 1, 1-20

Abstract: The hardness of the NTRU problem has not been well understood until 2021, when Pellet-Mary and Stehlé (2021) gave a reduction from the Gap-SVP problem on the ideal lattice to the NTRU-Search problem. Assuming the equivalence of the NTRU-Decision and the NTRU-Search problem, with this reduction together, we construct a leveled homomorphic encryption scheme. Compared to homomorphic schemes based on RLWE such as CKKS and BGV, the ciphertext of our scheme is a single polynomial. As a result, ciphertext multiplication involves only one multiplication of two polynomials, rather than the tensor multiplication of polynomial vectors as in BGV, CKKS schemes. In particular, by introducing a label, the ciphertext of our scheme does not need to be linearized after multiplication. This significantly accelerates the speed of homomorphic evaluation by reducing the number of polynomial multiplications from 6 to 1. Complexity analysis and experimental results indicate that the ciphertext multiplication in our scheme is approximately 4~5 times faster than CKKS and BFV schemes

Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.386964 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:19:y:2025:i:1:p:1-20

Access Statistics for this article

International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh

More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global Scientific Publishing
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-08-07
Handle: RePEc:igg:jisp00:v:19:y:2025:i:1:p:1-20