{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:40:23Z","timestamp":1767321623335,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562053","type":"print"},{"value":"9789819562060","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6206-0_3","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:38:14Z","timestamp":1767321494000},"page":"43-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Accelerating NTRU-Based Bootstrapping with\u00a0Block Key Distributions"],"prefix":"10.1007","author":[{"given":"Jingwei","family":"Feng","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Binwu","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"issue":"3","key":"3_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of Learning with Errors. J. Math. Cryptol. 9(3), 169\u2013203 (2015). https:\/\/doi.org\/10.1515\/jmc-2015-0016","journal-title":"J. Math. Cryptol."},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Alperin-Sheriff, J., Peikert, C.: Faster Bootstrapping with Polynomial Error. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology \u2013 CRYPTO 2014, pp. 297\u2013314. Springer Berlin Heidelberg, Berlin, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_17","DOI":"10.1007\/978-3-662-44371-2_17"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Bon, N., Pointcheval, D., Rivain, M.: Optimized homomorphic evaluation of boolean functions. IACR Trans. Cryptograph. Hardw. Embedd. Syst. 2024(3), 302\u2013341 (Jul 2024). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/11680","DOI":"10.46586\/tches.v2024.i3.302-341"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Bonte, C., Iliashenko, I., Park, J., Pereira, H.V.L., Smart, N.P.: FINAL: Faster FHE Instantiated with NTRU and LWE. In: Agrawal, S., Lin, D. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2022, pp. 188\u2013215. Springer Nature Switzerland, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22966-4_7","DOI":"10.1007\/978-3-031-22966-4_7"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural networks. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2018, pp. 483\u2013512. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_17","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology \u2013 CRYPTO 2012, pp. 868\u2013886. Springer Berlin Heidelberg, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 309\u2013325. ITCS \u201912, Association for Computing Machinery, New York, NY, USA (2012). https:\/\/doi.org\/10.1145\/2090236.2090262","DOI":"10.1145\/2090236.2090262"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Chen, B., Zhao, N.: Fully homomorphic encryption application in cloud computing. In: 2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP), pp. 471\u2013474 (2014). https:\/\/doi.org\/10.1109\/ICCWAMTIP.2014.7073452","DOI":"10.1109\/ICCWAMTIP.2014.7073452"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Cheon, J.H., Han, K., Kim, A., Kim, M., Song, Y.: Bootstrapping for approximate homomorphic encryption. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2018, pp. 360\u2013384. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_14","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2017,p. 409\u2013437. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: Cheon, J.H., Takagi, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2016. pp. 3\u201333. Springer Berlin Heidelberg, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_1","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2017, pp. 377\u2013408. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_14","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Corrigan-Gibbs, H., Henzinger, A., Tauman\u00a0Kalai, Y., Vaikuntanathan, V.: Somewhat homomorphic encryption from linear homomorphism and sparse LPN. In: Fehr, S., Fouque, P.A. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2025, pp. 3\u201333. Springer Nature Switzerland, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-91124-8_1","DOI":"10.1007\/978-3-031-91124-8_1"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Ducas, L., Micciancio, D.: FHEW: bootstrapping homomorphic encryption in less than a second. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2015, pp. 617\u2013640. Springer Berlin Heidelberg, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_24","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Ducas, L., van Woerden, W.: NTRU fatigue: how stretched is overstretched? In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2021, pp. 3\u201332. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92068-5_1","DOI":"10.1007\/978-3-030-92068-5_1"},{"key":"3_CR16","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive, Paper 2012\/144 (2012). https:\/\/eprint.iacr.org\/2012\/144"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Gama, N., Izabach\u00e8ne, M., Nguyen, P.Q., Xie, X.: Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems. In: Fischlin, M., Coron, J.S. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2016, pp. 528\u2013558. Springer Berlin Heidelberg, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_19","DOI":"10.1007\/978-3-662-49896-5_19"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169\u2013178. STOC \u201909, Association for Computing Machinery, New York, NY, USA (2009). https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"3_CR19","doi-asserted-by":"publisher","unstructured":"Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) Advances in Cryptology \u2013 CRYPTO 2013, pp. 75\u201392. Springer Berlin Heidelberg, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_5","DOI":"10.1007\/978-3-642-40041-4_5"},{"issue":"1","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-020-09368-7","volume":"34","author":"S Halevi","year":"2021","unstructured":"Halevi, S., Shoup, V.: Bootstrapping for HElib. J. Cryptol. 34(1), 1\u201344 (2021). https:\/\/doi.org\/10.1007\/s00145-020-09368-7","journal-title":"J. Cryptol."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"He, H., Wang, Z., Jain, H., Jiang, C., Yang, S.: A privacy-preserving decentralized credit scoring method based on multi-party information. Decision Supp. Syst. 166, 113910 (2023). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167923622001816","DOI":"10.1016\/j.dss.2022.113910"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267\u2013288. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054868"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Jadoul, R., Mertens, A., Park, J., Pereira, H.V.L.: NTRU-Based FHE for larger key and message space. In: Zhu, T., Li, Y. (eds.) Information Security and Privacy, pp. 141\u2013160. Springer Nature Singapore, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-97-5025-2_8","DOI":"10.1007\/978-981-97-5025-2_8"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Joye, M., Paillier, P.: Blind rotation in fully homomorphic encryption with extended keys. In: Dolev, S., Katz, J., Meisels, A. (eds.) Cyber Security, Cryptology, and Machine Learning. pp. 1\u201318. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07689-3_1","DOI":"10.1007\/978-3-031-07689-3_1"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Lee, C., Min, S., Seo, J., Song, Y.: Faster TFHE bootstrapping with block binary keys. In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, pp. 2\u201313. ASIA CCS \u201923, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3579856.3595804","DOI":"10.1145\/3579856.3595804"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Lee, Y., et al.: Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023, pp. 227\u2013256. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30620-4_8","DOI":"10.1007\/978-3-031-30620-4_8"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Faster NTRU-based Bootstrapping in less than 4 ms. IACR Trans. Cryptograph. Hardw. Embedd. Syst. 2024(3), 418\u2013451 (Jul 2024). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/11683","DOI":"10.46586\/tches.v2024.i3.418-451"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2010, pp. 1\u201323. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_1","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"May, A.: How to Meet Ternary LWE Keys. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology \u2013 CRYPTO 2021, pp. 701\u2013731. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84245-1_24","DOI":"10.1007\/978-3-030-84245-1_24"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6) (Sep 2009). https:\/\/doi.org\/10.1145\/1568318.1568324","DOI":"10.1145\/1568318.1568324"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Wang, R., Wen, Y., Li, Z., Lu, X., Wei, B., Liu, K., Wang, K.: Circuit bootstrapping: faster and smaller. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024, pp. 342\u2013372. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58723-8_12","DOI":"10.1007\/978-3-031-58723-8_12"},{"key":"3_CR32","unstructured":"Xiang, B.: CHIFHE (2023). https:\/\/github.com\/SKLC-FHE\/CHIFHE. Accessed May 17 2025"},{"key":"3_CR33","doi-asserted-by":"publisher","unstructured":"Xiang, B., Zhang, J., Deng, Y., Dai, Y., Feng, D.: Fast blind rotation for bootstrapping FHEs. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2023, pp. 3\u201336. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38551-3_1","DOI":"10.1007\/978-3-031-38551-3_1"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6206-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:38:15Z","timestamp":1767321495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6206-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562053","9789819562060"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6206-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}