{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:36Z","timestamp":1767339816666,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670376","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2547-2561","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["New Secret Keys for Enhanced Performance in (T)FHE"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6281-7191","authenticated-orcid":false,"given":"Loris","family":"Bergerat","sequence":"first","affiliation":[{"name":"Zama &amp; Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0319-4707","authenticated-orcid":false,"given":"Ilaria","family":"Chillotti","sequence":"additional","affiliation":[{"name":"Researcher, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1759-4834","authenticated-orcid":false,"given":"Damien","family":"Ligier","sequence":"additional","affiliation":[{"name":"Researcher, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4526-0434","authenticated-orcid":false,"given":"Jean-Baptiste","family":"Orfila","sequence":"additional","affiliation":[{"name":"Zama, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0617-9606","authenticated-orcid":false,"given":"Adeline","family":"Roux-Langlois","sequence":"additional","affiliation":[{"name":"Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC, Caen, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1778-5297","authenticated-orcid":false,"given":"Samuel","family":"Tap","sequence":"additional","affiliation":[{"name":"Zama, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"volume-title":"USENIX security symposium","author":"Alkim Erdem","key":"e_1_3_2_1_4_1","unstructured":"Erdem Alkim, L\u00e9o Ducas, Thomas P\u00f6ppelmann, and Peter Schwabe. 2016. Postquantum key exchange-A New Hope.. In USENIX security symposium, Vol. 2016."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_35"},{"key":"e_1_3_2_1_6_1","volume-title":"Paper 2022\/704.","author":"Bergerat Loris","year":"2022","unstructured":"Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, and Samuel Tap. 2022. Parameter Optimization & Larger Precision for (T)FHE. Cryptology ePrint Archive, Paper 2022\/704. (2022). https: \/\/eprint.iacr.org\/2022\/704 https:\/\/eprint.iacr.org\/2022\/704."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22969-5_23"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_12"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/792538.792543"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-022-09441-3"},{"key":"e_1_3_2_1_12_1","volume-title":"Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. IACR Cryptology ePrint Archive","author":"Brakerski Zvika","year":"2012","unstructured":"Zvika Brakerski. 2012. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. IACR Cryptology ePrint Archive (2012). http:\/\/eprint.iacr.org\/2012\/078"},{"volume-title":"ITCS","author":"Brakerski Zvika","key":"e_1_3_2_1_13_1","unstructured":"Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) fully homomorphic encryption without bootstrapping. In ITCS. http:\/\/doi.acm.org\/10. 1145\/2090236.2090262"},{"key":"e_1_3_2_1_14_1","unstructured":"Hao Chen Wei Dai Miran Kim and Yongsoo Song. 2020. Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. IACR Cryptol. ePrint Arch. (2020). https:\/\/eprint.iacr.org\/2020\/015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--70694--8_15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_2_1_17_1","volume-title":"WAHC","author":"Chillotti Ilaria","year":"2020","unstructured":"Ilaria Chillotti, Marc Joye, Damien Ligier, Jean-Baptiste Orfila, and Samuel Tap. 2020. CONCRETE: Concrete operates on ciphertexts rapidly by extending TfhE. In WAHC 2020."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_12"},{"key":"e_1_3_2_1_21_1","volume-title":"CRYPTO 2020, Santa Barbara, CA, USA, August 17--21, 2020, Proceedings, Part II. Springer, 329--358","author":"Dachman-Soled Dana","year":"2020","unstructured":"Dana Dachman-Soled, L\u00e9o Ducas, Huijing Gong, and M\u00e9lissa Rossi. 2020. LWE with side information: attacks and concrete security estimation. In Advances in Cryptology--CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17--21, 2020, Proceedings, Part II. Springer, 329--358."},{"key":"e_1_3_2_1_22_1","unstructured":"Dana Dachman-Soled Huijing Gong Mukul Kulkarni and Aria Shahverdi. 2018. Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience. Cryptology ePrint Archive Paper 2018\/1068. https:\/\/eprint.iacr.org\/2018\/1068 https:\/\/eprint.iacr.org\/2018\/1068."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"e_1_3_2_1_24_1","volume-title":"Somewhat Practical Fully Homomorphic Encryption. IACR Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. IACR Cryptology ePrint Archive (2012). http:\/\/eprint.iacr. org\/2012\/144"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642-"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings, Part I. Springer, 23--42","author":"Guo Qian","year":"2015","unstructured":"Qian Guo, Thomas Johansson, and Paul Stankovski. 2015. Coded-BKW: Solving LWE using lattice codes. In Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2015, Proceedings, Part I. Springer, 23--42."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"e_1_3_2_1_29_1","unstructured":"Taechan Kim Hyesun Kwak Dongwon Lee Jinyeong Seo and Yongsoo Song. 2022. Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. IACR Cryptol. ePrint Arch. (2022) 347. https:\/\/eprint.iacr.org\/2022\/347"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings, Part I 35","author":"Kirchner Paul","year":"2015","unstructured":"Paul Kirchner and Pierre-Alain Fouque. 2015. An improved BKW algorithm for LWE with applications to cryptography and lattices. In Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2015, Proceedings, Part I 35. Springer, 43--62."},{"key":"e_1_3_2_1_31_1","volume-title":"Key-Compatible, Quasi-linear Complexity. IACR Cryptol. ePrint Arch.","author":"Kwak Hyesun","year":"2022","unstructured":"Hyesun Kwak, Seonhong Min, and Yongsoo Song. 2022. Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity. IACR Cryptol. ePrint Arch. (2022), 1460. https:\/\/eprint.iacr.org\/2022\/1460"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9938-4"},{"key":"e_1_3_2_1_33_1","volume-title":"Faster TFHE Bootstrapping with Block Binary Keys. In ACM ASIACCS","author":"Lee Changmin","year":"2023","unstructured":"Changmin Lee, Seonhong Min, Jinyeong Seo, and Yongsoo Song. 2023. Faster TFHE Bootstrapping with Block Binary Keys. In ACM ASIACCS 2023."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31371-4_2"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92068-5_8"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_37_1","volume-title":"Lattice-based cryptography. Postquantum cryptography","author":"Micciancio Daniele","year":"2009","unstructured":"Daniele Micciancio and Oded Regev. 2009. Lattice-based cryptography. Postquantum cryptography (2009), 147--191."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_24"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75245-3_4"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_41_1","volume-title":"Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Mathematical programming 66","author":"Schnorr Claus-Peter","year":"1994","unstructured":"Claus-Peter Schnorr and Martin Euchner. 1994. Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Mathematical programming 66 (1994), 181--199."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--10366--7_36"},{"key":"e_1_3_2_1_43_1","unstructured":"Zama. 2022. TFHE-rs: A Pure Rust Implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data. https:\/\/github.com\/zamaai\/tfhe-rs."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:11:08Z","timestamp":1755843068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":43,"alternative-id":["10.1145\/3658644.3670376","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670376","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}