{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:39:30Z","timestamp":1747190370675,"version":"3.40.5"},"reference-count":31,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2020,10,13]]},"abstract":"<jats:p>The rapid development of the Internet of Things has made the issue of privacy protection even more concerning. Privacy protection has affected the large-scale application of the Internet of Things. Fully Homomorphic Encryption (FHE) is a newly emerging public key encryption scheme, which can be used to prevent information leakage. It allows performing arbitrary algebraic operations on data which are encrypted, such that the operation performed on the ciphertext is directly transformed into the corresponding plaintext. Recently, overwhelming majority of FHE schemes are confined to single-bit encryption, whereas how to achieve a multibit FHE scheme is still an open problem. This problem is partially (rather than fully) solved by Hiromasa-Abe-Okamoto (PKC\u203215), who proposed a packed message FHE scheme which only supports decryption in a bit-by-bit manner. Followed by that, Li-Ma-Morais-Du (Inscrypt\u203216) proposed a multibit FHE scheme which can decrypt the ciphertext at one time, but their scheme is based on dual LWE assumption. Armed with the abovementioned two schemes, in this paper, we propose an efficient packed message FHE that supports the decryption in two ways: single-bit decryption and one-time decryption.<\/jats:p>","DOI":"10.1155\/2020\/8862920","type":"journal-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T00:35:20Z","timestamp":1602722120000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7468-6701","authenticated-orcid":true,"given":"Weiping","family":"Ouyang","sequence":"first","affiliation":[{"name":"Harbin Engineering University, Harbin, China"}]},{"given":"Chunguang","family":"Ma","sequence":"additional","affiliation":[{"name":"Harbin Engineering University, Harbin, China"},{"name":"Shandong University of Science and Technology, Qingdao, China"}]},{"given":"Guoyin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Harbin Engineering University, Harbin, China"}]},{"given":"Keming","family":"Diao","sequence":"additional","affiliation":[{"name":"Harbin Engineering University, Harbin, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1n"},{"first-page":"699","article-title":"Packing messages and optimizing bootstrapping in GSW-FHE","author":"R. Hiromasa","key":"2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"first-page":"75","article-title":"Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based","author":"C. Gentry","key":"4"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54705-3_14"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"7","first-page":"1146","article-title":"Preventing adaptive key recovery attacks on the gentry-sahai-waters leveled homomorphic encryption scheme","author":"Z. Li","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_8"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2726554"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2740720"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2017.2764082"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9206-y"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5973285"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_21"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_31"},{"first-page":"12","article-title":"Pseudo-random generation from one-way functions (extended abstracts)","author":"J. Hastad","key":"16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536461"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374406"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_26"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_43"},{"first-page":"14","article-title":"Feasibility and infeasibility of adaptively secure fully homomorphic encryption","author":"J. Katz","key":"21"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J. Katz","year":"2014","edition":"Second"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"first-page":"630","article-title":"Multi-identity and multi-key leveled FHE from learning with errors","author":"M. Clear","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554799"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_17"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2856-8"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.06565"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.008"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/8862920.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/8862920.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/8862920.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T00:35:22Z","timestamp":1602722122000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2020\/8862920\/"}},"subtitle":[],"editor":[{"given":"Kathiravan","family":"Srinivasan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":31,"alternative-id":["8862920","8862920"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8862920","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"type":"electronic","value":"1875-905X"},{"type":"print","value":"1574-017X"}],"subject":[],"published":{"date-parts":[[2020,10,13]]}}}