{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:24:02Z","timestamp":1760955842423,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T00:00:00Z","timestamp":1537833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472414"],"award-info":[{"award-number":["61472414"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772514"],"award-info":[{"award-number":["61772514"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602061"],"award-info":[{"award-number":["61602061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecur"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s42400-018-0013-8","type":"journal-article","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T13:16:51Z","timestamp":1537881411000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["CCA1 secure FHE from PIO, revisited"],"prefix":"10.1186","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9840-7970","authenticated-orcid":false,"given":"Biao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xueqing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,25]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/978-3-642-13190-5_28","volume-title":"Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera","author":"S Agrawal","year":"2010","unstructured":"Agrawal, S, Boneh D, Boyen X (2010) Efficient lattice (H)IBE in the standard model In: Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, 553\u2013572.. Springer, Berlin, Heidelberg. May 30 - June 3, 2010. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-13190-5_28 ."},{"issue":"5","key":"13_CR2","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1137\/S009753970544713X","volume":"36","author":"D Boneh","year":"2007","unstructured":"Boneh, D, Canetti R, Halevi S, Katz J (2007) Chosen-ciphertext security from identity-based encryption. SIAM J Comput 36(5):1301\u20131328. https:\/\/doi.org\/10.1137\/S009753970544713X .","journal-title":"SIAM J Comput"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/FOCS.2011.12","volume-title":"IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011.","author":"Z Brakerski","year":"2011","unstructured":"Brakerski, Z, Vaikuntanathan V (2011a) Efficient fully homomorphic encryption from (standard) LWE In: IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011., 97\u2013106.. IEEE Computer Society, Washington. October 22-25, 2011. https:\/\/doi.org\/10.1109\/FOCS.2011.12 ."},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-22792-9_29","volume-title":"Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference,","author":"Z Brakerski","year":"2011","unstructured":"Brakerski, Z, Vaikuntanathan V (2011b) Fully homomorphic encryption from ring-lwe and security for key dependent messages In: Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference,505\u2013524.. Springer, Heidelberg. August 14-18, 2011. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-22792-9_29 ."},{"key":"13_CR5","first-page":"309","volume-title":"Innovations in Theoretical Computer Science - ITCS 2012","author":"Z Brakerski","year":"2012","unstructured":"Brakerski, Z, Gentry C, Vaikuntanathan V (2012) (leveled) fully homomorphic encryption without bootstrapping In: Innovations in Theoretical Computer Science - ITCS 2012, 309\u2013325.. ACM, New York. January 8-10, 2012. http:\/\/doi.acm.org\/10.1145\/2090236.2090262 ."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","volume-title":"Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference","author":"Z Brakerski","year":"2012","unstructured":"Brakerski, Z (2012) Fully homomorphic encryption without modulus switching from classical gapsvp In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, 868\u2013886.. Springer, Heidelberg. August 19-23, 2012. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50 ."},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-662-53644-5_13","volume-title":"Theory of Cryptography - 14th International Conference, TCC 2016-B","author":"Z Brakerski","year":"2016","unstructured":"Brakerski, Z, Cash D, Tsabary R, Wee H (2016) Targeted homomorphic attribute-based encryption In: Theory of Cryptography - 14th International Conference, TCC 2016-B, 330\u2013360.. Springer, Berlin, Heidelberg, Beijing. October 31 - November 3, 2016, Proceedings, Part II. https:\/\/doi.org\/10.1007\/978-3-662-53644-5_13 ."},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-24676-3_13","volume-title":"Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques","author":"R Canetti","year":"2004","unstructured":"Canetti, R, Halevi S, Katz J (2004) Chosen-ciphertext security from identity-based encryption In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, 207\u2013222.. Springer, Berlin, Heidelberg. May 2-6, 2004, Proceedings. https:\/\/doi.org\/10.1007\/978-3-540-24676-3_13 ."},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998, 18th Annual International Cryptology Conference","author":"R Cramer","year":"1998","unstructured":"Cramer, R, Shoup V (1998) A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack In: Advances in Cryptology - CRYPTO \u201998, 18th Annual International Cryptology Conference, 13\u201325.. Springer, Berlin, Heidelberg. August 23-27, 1998, Proceedings. https:\/\/doi.org\/10.1007\/BFb0055717 ."},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-12280-9_1","volume-title":"Cryptology and Network Security - 13th International Conference, CANS 2014","author":"M Clear","year":"2014","unstructured":"Clear, M, McGoldrick C (2014) Bootstrappable identity-based fully homomorphic encryption In: Cryptology and Network Security - 13th International Conference, CANS 2014, 1\u201319.. Springer, Cham. October 22-24, 2014. Proceedings. https:\/\/doi.org\/10.1007\/978-3-319-12280-9_1 ."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-662-46497-7_19","volume-title":"Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015","author":"R Canetti","year":"2015","unstructured":"Canetti, R, Lin H, Tessaro S, Vaikuntanathan V (2015) Obfuscation of probabilistic circuits and applications In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, 468\u2013497.. Springer, Berlin, Heidelberg, Warsaw. March 23-25, 2015, Proceedings, Part II. https:\/\/doi.org\/10.1007\/978-3-662-46497-7_19 ."},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-662-54388-7_8","volume-title":"Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography","author":"R Canetti","year":"2017","unstructured":"Canetti, R, Raghuraman S, Richelson S, Vaikuntanathan V (2017) Chosen-ciphertext secure fully homomorphic encryption In: Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, 213\u2013240.. Springer, Berlin, Heidelberg. March 28-31, 2017, Proceedings, Part II. https:\/\/doi.org\/10.1007\/978-3-662-54388-7_8 ."},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-17470-9_17","volume-title":"Information Theoretic Security - 8th International Conference, ICITS 2015","author":"R Dahab","year":"2015","unstructured":"Dahab, R, Galbraith SD, Morais E (2015) Adaptive key recovery attacks on ntru-based somewhat homomorphic encryption schemes In: Information Theoretic Security - 8th International Conference, ICITS 2015, 283\u2013296.. Springer, Cham. May 2-5, 2015. Proceedings. https:\/\/doi.org\/10.1007\/978-3-319-17470-9_17 ."},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-53015-3_4","volume-title":"Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference","author":"Y Dodis","year":"2016","unstructured":"Dodis, Y, Halevi S, Rothblum RD, Wichs D (2016) Spooky encryption and its applications In: Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, 93\u2013122.. Springer, Berlin, Heidelberg. August 14-18, 2016, Proceedings, Part III. https:\/\/doi.org\/10.1007\/978-3-662-53015-3_4 ."},{"key":"13_CR15","unstructured":"Gentry, C (2009a) A fully homomorphic encryption scheme. PhD thesis, Stanford, CA, USA. http:\/\/crypto.stanford.edu\/craig ."},{"key":"13_CR16","first-page":"169","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing","author":"C Gentry","year":"2009","unstructured":"Gentry, C (2009b) Fully homomorphic encryption using ideal lattices In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 169\u2013178.. ACM, New York. May 31 - June 2 2009. https:\/\/doi.acm.org\/10.1145\/1536414.1536440 ."},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-30057-8_1","volume-title":"Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography Darmstadt","author":"C Gentry","year":"2012","unstructured":"Gentry, C, Halevi S, Smart NP (2012a) Better bootstrapping in fully homomorphic encryption In: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography Darmstadt, 1\u201316.. Springer, Berlin, Heidelberg. May 21-23, 2012. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-30057-8_1 ."},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-29011-4_28","volume-title":"Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"C Gentry","year":"2012","unstructured":"Gentry, C, Halevi S, Smart NP (2012b) Fully homomorphic encryption with polylog overhead In: Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 465\u2013482.. Springer, Berlin, Heidelberg. April 15-19, 2012. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-29011-4_28 ."},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-40041-4_5","volume-title":"Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference","author":"C Gentry","year":"2013","unstructured":"Gentry, C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based In: Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, 75\u201392.. Springer, Berlin, Heidelberg. August 18-22, 2013. Proceedings, Part I. https:\/\/doi.org\/10.1007\/978-3-642-40041-4_5 ."},{"key":"13_CR20","first-page":"560","volume":"2010","author":"J Loftus","year":"2010","unstructured":"Loftus, J, May A, Smart NP, Vercauteren F (2010) On cca-secure fully homomorphic encryption. IACR Cryptol ePrint Arch 2010:560.","journal-title":"IACR Cryptol ePrint Arch"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-662-49384-7_4","volume-title":"Public-Key Cryptography - PKC 2016 - 19th, IACR International Conference on Practice and Theory in Public-Key Cryptography","author":"J Lai","year":"2016","unstructured":"Lai, J, Deng RH, Ma C, Sakurai K, Weng J (2016) CCA-secure keyed-fully homomorphic encryption In: Public-Key Cryptography - PKC 2016 - 19th, IACR International Conference on Practice and Theory in Public-Key Cryptography, 70\u201398.. Springer, Berlin, Heidelberg. March 6-9, 2016, Proceedings, Part I. https:\/\/doi.org\/10.1007\/978-3-662-49384-7_4 ."},{"key":"13_CR22","first-page":"427","volume-title":"Symposium on Theory of Computing, STOC 1990","author":"M Naor","year":"1990","unstructured":"Naor, M, Yung M (1990) Public-key cryptosystems provably secure against chosen ciphertext attacks In: Symposium on Theory of Computing, STOC 1990, 427\u2013437.. ACM, New York. May 13-17, 1990. http:\/\/doi.acm.org\/10.1145\/100216.100273 ."},{"key":"13_CR23","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, RL, Adleman L, Dertouzos ML (1978) On data banks and privacy homomorphisms. Found Secure Comput 4:169\u2013179.","journal-title":"Found Secure Comput"},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-13013-7_25","volume-title":"Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography","author":"NP Smart","year":"2010","unstructured":"Smart, NP, Vercauteren F (2010) Fully homomorphic encryption with relatively small key and ciphertext sizes In: Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, 420\u2013443.. Springer, Berlin,Heidelberg. May 26-28, 2010. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-13013-7_25 ."},{"issue":"1","key":"13_CR25","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10623-012-9720-4","volume":"71","author":"NP Smart","year":"2014","unstructured":"Smart, NP, Vercauteren F (2014) Fully homomorphic SIMD operations. Des. Codes Crypt 71(1):57\u201381. https:\/\/doi.org\/10.1007\/s10623-012-9720-4 . Springer US.","journal-title":"Des. Codes Crypt"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Sahai, A, Waters B (2014) How to use indistinguishability obfuscation: deniable encryption, and more In: Symposium on Theory of Computing, STOC 2014, 475\u2013484, New York. May 31 - June 03, 2014. http:\/\/doi.acm.org\/10.1145\/2591796.2591825 . ACM, New York.","DOI":"10.1145\/2591796.2591825"},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"M van Dijk","year":"2010","unstructured":"van Dijk, M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers In: Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 24\u201343.. Springer, Berlin, Heidelberg. May 30 - June 3, 2010. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-13190-5_2 ."},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-29101-2_24","volume-title":"Information Security Practice and Experience - 8th International Conference, ISPEC 2012","author":"Z Zhang","year":"2012","unstructured":"Zhang, Z, Plantard T, Susilo W (2012) On the CCA-1 security of somewhat homomorphic encryption over the integers In: Information Security Practice and Experience - 8th International Conference, ISPEC 2012, 353\u2013368.. Springer, Berlin, Heidelberg. April 9-12, 2012. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-29101-2_24 ."}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-018-0013-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42400-018-0013-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-018-0013-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T17:52:38Z","timestamp":1662141158000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-018-0013-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,25]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["13"],"URL":"https:\/\/doi.org\/10.1186\/s42400-018-0013-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2018,9,25]]},"assertion":[{"value":"20 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"11"}}