{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:04:12Z","timestamp":1771473852346,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031683817","type":"print"},{"value":"9783031683824","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68382-4_1","type":"book-chapter","created":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T09:02:41Z","timestamp":1723712561000},"page":"3-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["On the\u00a0Practical $$\\text {CPA}^{D}$$ Security of\u00a0\u201cexact\u201d and\u00a0Threshold FHE Schemes and\u00a0Libraries"],"prefix":"10.1007","author":[{"given":"Marina","family":"Checri","sequence":"first","affiliation":[]},{"given":"Renaud","family":"Sirdey","sequence":"additional","affiliation":[]},{"given":"Aymen","family":"Boudguiga","sequence":"additional","affiliation":[]},{"given":"Jean-Paul","family":"Bultel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,16]]},"reference":[{"key":"1_CR1","unstructured":"Lattigo v5. https:\/\/github.com\/tuneinsight\/lattigo (2023)"},{"key":"1_CR2","unstructured":"Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL (2023)"},{"key":"1_CR3","unstructured":"TFHE-rs v0.4. https:\/\/docs.zama.ai\/tfhe-rs (2023)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Al\u00a0Badawi, A., et al.: OpenFHE: open-source fully homomorphic encryption library. In: WAHC, pp. 53\u201363 (2022)","DOI":"10.1145\/3560827.3563379"},{"key":"1_CR5","unstructured":"Al\u00a0Badawi, A., Polyakov, Y.: Demystifying bootstrapping in fully homomorphic encryption. Tech. Rep. 2023\/149, IACR ePrint (2023)"},{"key":"1_CR6","unstructured":"Alexandru, A., Badawi, A.A., Micciancio, D., Polyakov, Y.: Application-aware approximate homomorphic encryption: configuring FHE for practical use. Tech. Rep. 2024\/203, IACR ePrint (2024)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Aloufi, A., Hu, P., Song, Y., Lauter, K.: Computing blindfolded on data homomorphically encrypted under multiple keys: a survey. ACM Comput, Surv. (2021)","DOI":"10.1145\/3477139"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Asharov, G., Jain, A., L\u00f3pez-Alt, A., Tromer, E., Vaikuntanathan, V., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. In: EUROCRYPT, pp. 483\u2013501 (2012)","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: CRYPTO, pp. 868\u2013886 (2012)","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: TOCT, pp. 1\u201336 (2014)","DOI":"10.1145\/2633600"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Canetti, R., Fischlin, M.: Universally composable commitments. In: CRYPTO, pp. 19\u201340 (2001)","DOI":"10.1007\/3-540-44647-8_2"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Checri, M., Sirdey, R., Boudguiga, A., Bultel, J.P.: On the practical $$\\text{CPA}^D$$ security of \u201cexact\u201d and threshold FHE schemes and libraries. Tech. Rep. 2024\/116, IACR ePrint (2024)","DOI":"10.1007\/978-3-031-68382-4_1"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Choe, H., Passel\u00e8gue, A., Stehl\u00e9, D., Suvanto, E.: Attacks against the INDCPA-D security of exact FHE schemes. Tech. Rep. 2024\/127, IACR ePrint (2024)","DOI":"10.46586\/tches.v2024.i3.25-75"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: ASIACRYPT, pp. 409\u2013437 (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: ASIACRYPT (2016)","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"1_CR16","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption library. https:\/\/tfhe.github.io\/tfhe\/ (2016)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. (2019)","DOI":"10.1007\/s00145-019-09319-x"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Clet, P.E., Boudguiga, A., Sirdey, R., Zuber, M.: ComBo: a novel functional bootstrapping method for efficient evaluation of nonlinear functions in the encrypted domain. In: AFRICACRYPT, pp. 317\u2013343 (2023)","DOI":"10.1007\/978-3-031-37679-5_14"},{"key":"1_CR19","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Tech. Rep. 2012\/144, IACR ePrint (2012)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Grivet\u00a0S\u00e9bert, A., Checri, M., Stan, O., Sirdey, R., Gouy-Pailler, C.: Combining homomorphic encryption and differential privacy in federated learning. In: IEEE PST, pp.\u00a01\u20137 (2023)","DOI":"10.1109\/PST58708.2023.10320195"},{"key":"1_CR21","unstructured":"Guo, Q., Nabokov, D., Suvanto, E., Johansson, T.: Key recovery attacks on approximate homomorphic encryption with nonworst-case noise flooding countermeasures. In: Usenix Security (2024)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Kim, A., Polyakov, Y., Zucca, V.: Revisiting homomorphic encryption schemes for finite fields. In: ASIACRYPT, pp. 608\u2013639 (2021)","DOI":"10.1007\/978-3-030-92078-4_21"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Li, B., Miccianccio, D.: On the security of homomorphic encryption on approximate numbers. In: EUROCRYPT, pp. 648\u2013677 (2021)","DOI":"10.1007\/978-3-030-77870-5_23"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Loftus, J., May, A., Smart, N.P., Vercauteren, F.: On CCA-secure somewhat homomorphic encryption. In: SAC, pp. 55\u201372 (2011)","DOI":"10.1007\/978-3-642-28496-0_4"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: EUROCRYPT, pp. 1\u201323 (2010)","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Manulis, M., Nguyen, J.: Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability. In: EUROCRYPT (2024)","DOI":"10.1007\/978-3-031-58723-8_3"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Mouchet, C., Troncoso-Pastoriza, J., Bossuat, J.P., Hubaux, J.P.: Multiparty homomorphic encryption from ring-learning-with-errors. In: PoPETS, pp. 291\u2013311 (2021)","DOI":"10.2478\/popets-2021-0071"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC, pp. 84\u201393 (2005)","DOI":"10.1145\/1060590.1060603"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68382-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T19:04:02Z","timestamp":1732647842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68382-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031683817","9783031683824"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68382-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}