{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:06:37Z","timestamp":1764115597893,"version":"3.46.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Academicians in Chongqing lead the scientific and technological innovation guidance project","award":["2022YSZX-JCX0011CSTB,CSTB2023YSZX-JCX0008"],"award-info":[{"award-number":["2022YSZX-JCX0011CSTB,CSTB2023YSZX-JCX0008"]}]},{"name":"National Key Research and Development Project","award":["2020YFA0712300"],"award-info":[{"award-number":["2020YFA0712300"]}]},{"name":"Chongqing Talents Plan Youth Top-Notch Project","award":["2021000263"],"award-info":[{"award-number":["2021000263"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    In the case of standard LWE samples\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$({\\textbf {A}},{\\textbf {b = sA + e}})$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mi>A<\/mml:mi>\n                            <mml:mo>,<\/mml:mo>\n                            <mml:mrow>\n                              <mml:mi>b<\/mml:mi>\n                              <mml:mo>=<\/mml:mo>\n                              <mml:mi>sA<\/mml:mi>\n                              <mml:mo>+<\/mml:mo>\n                              <mml:mi>e<\/mml:mi>\n                            <\/mml:mrow>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    ,\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {A}}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>A<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    is typically uniformly over\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\mathbb {Z}_q^{n \\times m}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:msubsup>\n                            <mml:mi>Z<\/mml:mi>\n                            <mml:mi>q<\/mml:mi>\n                            <mml:mrow>\n                              <mml:mi>n<\/mml:mi>\n                              <mml:mo>\u00d7<\/mml:mo>\n                              <mml:mi>m<\/mml:mi>\n                            <\/mml:mrow>\n                          <\/mml:msubsup>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    . Under the\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\textsf {DLWE}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>DLWE<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    assumption, the conditional distribution of\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {s}}|({\\textbf {A}}, {\\textbf {b}})$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>s<\/mml:mi>\n                            <mml:mo>|<\/mml:mo>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mi>A<\/mml:mi>\n                            <mml:mo>,<\/mml:mo>\n                            <mml:mi>b<\/mml:mi>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    and\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {s}}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>s<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    is expected to be consistent. However, in the case where an adversary chooses\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {A}}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>A<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    adaptively, the disparity between the two entities may be larger. In this work, our primary focus is on the quantification of the Average Conditional Min-Entropy\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\tilde{H}_\\infty ({\\textbf {s}}|{\\textbf {sA + e}})$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:msub>\n                              <mml:mover>\n                                <mml:mi>H<\/mml:mi>\n                                <mml:mo>~<\/mml:mo>\n                              <\/mml:mover>\n                              <mml:mi>\u221e<\/mml:mi>\n                            <\/mml:msub>\n                            <mml:mrow>\n                              <mml:mo>(<\/mml:mo>\n                              <mml:mi>s<\/mml:mi>\n                              <mml:mo>|<\/mml:mo>\n                              <mml:mrow>\n                                <mml:mi>sA<\/mml:mi>\n                                <mml:mo>+<\/mml:mo>\n                                <mml:mi>e<\/mml:mi>\n                              <\/mml:mrow>\n                              <mml:mo>)<\/mml:mo>\n                            <\/mml:mrow>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    of\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {s}}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>s<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , where\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {A}}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>A<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    is chosen by the adversary. Brakerski and D\u00f6ttling answered the question in one case: they proved that when\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {s}}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>s<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    is uniformly chosen from\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\mathbb {Z}_q^n$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:msubsup>\n                            <mml:mi>Z<\/mml:mi>\n                            <mml:mi>q<\/mml:mi>\n                            <mml:mi>n<\/mml:mi>\n                          <\/mml:msubsup>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , it holds that\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\tilde{H}_\\infty ({\\textbf {s}}|{\\textbf {sA + e}}) \\varpropto \\rho _\\sigma (\\varLambda _q({\\textbf {A}}))$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:msub>\n                              <mml:mover>\n                                <mml:mi>H<\/mml:mi>\n                                <mml:mo>~<\/mml:mo>\n                              <\/mml:mover>\n                              <mml:mi>\u221e<\/mml:mi>\n                            <\/mml:msub>\n                            <mml:mrow>\n                              <mml:mo>(<\/mml:mo>\n                              <mml:mi>s<\/mml:mi>\n                              <mml:mo>|<\/mml:mo>\n                              <mml:mrow>\n                                <mml:mi>sA<\/mml:mi>\n                                <mml:mo>+<\/mml:mo>\n                                <mml:mi>e<\/mml:mi>\n                              <\/mml:mrow>\n                              <mml:mo>)<\/mml:mo>\n                            <\/mml:mrow>\n                            <mml:mo>\u221d<\/mml:mo>\n                            <mml:msub>\n                              <mml:mi>\u03c1<\/mml:mi>\n                              <mml:mi>\u03c3<\/mml:mi>\n                            <\/mml:msub>\n                            <mml:mrow>\n                              <mml:mo>(<\/mml:mo>\n                              <mml:msub>\n                                <mml:mi>\u039b<\/mml:mi>\n                                <mml:mi>q<\/mml:mi>\n                              <\/mml:msub>\n                              <mml:mrow>\n                                <mml:mo>(<\/mml:mo>\n                                <mml:mi>A<\/mml:mi>\n                                <mml:mo>)<\/mml:mo>\n                              <\/mml:mrow>\n                              <mml:mo>)<\/mml:mo>\n                            <\/mml:mrow>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    . We prove that for any\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$d \\le q$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>d<\/mml:mi>\n                            <mml:mo>\u2264<\/mml:mo>\n                            <mml:mi>q<\/mml:mi>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , when\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$${\\textbf {s}}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>s<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    is uniformly chosen from\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\mathbb {Z}_d^n$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:msubsup>\n                            <mml:mi>Z<\/mml:mi>\n                            <mml:mi>d<\/mml:mi>\n                            <mml:mi>n<\/mml:mi>\n                          <\/mml:msubsup>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    or is sampled from a discrete Gaussian distribution, there are also similar results. As an application of the above results, we improved the multi-key fully homomorphic encryption and answered the question raised at the end of their work positively: we have GSW-type ciphertext rather than Dual-GSW, and the improved scheme has shorter keys and ciphertexts.\n                  <\/jats:p>","DOI":"10.1186\/s42400-025-00439-5","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:02:31Z","timestamp":1764115351000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lattice-based, LWE-leakage model for Gaussian and uniform secret and its application in decentralization"],"prefix":"10.1186","volume":"8","author":[{"given":"Xiaokang","family":"Dai","sequence":"first","affiliation":[]},{"given":"Jingwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenyuan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,26]]},"reference":[{"key":"439_CR1","doi-asserted-by":"crossref","unstructured":"Alperin-Sheriff J, Peikert C (2014) Faster bootstrapping with polynomial error. In: Garay JA, Gennaro R (eds) Advances in cryptology\u2014CRYPTO 2014. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 297\u2013314","DOI":"10.1007\/978-3-662-44371-2_17"},{"key":"439_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-030-64375-1_2","volume-title":"Theory of cryptography","author":"P Ananth","year":"2020","unstructured":"Ananth P, Jain A, Jin Z, Malavolta G (2020) Multi-key fully-homomorphic encryption in the plain model. In: Pass R, Pietrzak K (eds) Theory of cryptography. Springer International Publishing, Cham, pp 28\u201357"},{"key":"439_CR3","doi-asserted-by":"crossref","unstructured":"Ananth P, Jain A, Jin Z, Malavolta G (2021) Unbounded multi-party computation from learning with errors. In: Canteaut A, Standaert FX (eds) Advances in cryptology\u2014EUROCRYPT 2021. Springer International Publishing, Cham, pp 754\u2013781","DOI":"10.1007\/978-3-030-77886-6_26"},{"key":"#cr-split#-439_CR4.1","doi-asserted-by":"crossref","unstructured":"Applebaum B, Cash D, Peikert C, Sahai A (2009) Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi S","DOI":"10.1007\/978-3-642-03356-8_35"},{"key":"#cr-split#-439_CR4.2","unstructured":"(ed) Advances in cryptology-CRYPTO 2009. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 595-618"},{"key":"439_CR5","doi-asserted-by":"crossref","unstructured":"Asharov G, Jain A, L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V, Wichs D (2012) Multiparty computation with low communication, computation and interaction via threshold FHE. In: Pointcheval D, Johansson T (eds) Advances in cryptology\u2014EUROCRYPT 2012. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 483\u2013501","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"439_CR6","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/BF01445125","volume":"296","author":"W Banaszczyk","year":"1993","unstructured":"Banaszczyk W (1993) New bounds in some transference theorems in the geometry of numbers. Math Ann 296:625\u2013635","journal-title":"Math Ann"},{"key":"439_CR7","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-030-03810-6_14","volume-title":"Theory of cryptography","author":"Z Brakerski","year":"2018","unstructured":"Brakerski Z, D\u00f6ttling N (2018) Two-message statistically sender-private OT from LWE. In: Beimel A, Dziembowski S (eds) Theory of cryptography. Springer, Cham, pp 370\u2013390"},{"key":"439_CR8","doi-asserted-by":"crossref","unstructured":"Brakerski Z, D\u00f6ttling N (2020) Hardness of LWE on general entropic distributions. In: Canteaut A, Ishai Y (eds) Advances in cryptology\u2014EUROCRYPT 2020. Springer, Cham, pp 551\u2013575","DOI":"10.1007\/978-3-030-45724-2_19"},{"key":"439_CR9","first-page":"1","volume-title":"Theory of cryptography","author":"Z Brakerski","year":"2020","unstructured":"Brakerski Z, D\u00f6ttling N (2020) Lossiness and entropic hardness for ring-LWE. In: Pass R, Pietrzak K (eds) Theory of cryptography. Springer, Cham, pp 1\u201327"},{"key":"439_CR10","doi-asserted-by":"publisher","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2012) (leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd innovations in theoretical computer science conference. ITCS \u201912, Association for Computing Machinery, New York, NY, USA, pp. 309\u2013325. https:\/\/doi.org\/10.1145\/2090236.2090262","DOI":"10.1145\/2090236.2090262"},{"key":"439_CR11","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-319-70500-2_22","volume-title":"Theory of cryptography","author":"Z Brakerski","year":"2017","unstructured":"Brakerski Z, Halevi S, Polychroniadou A (2017) Four round secure computation without setup. In: Kalai Y, Reyzin L (eds) Theory of cryptography. Springer, Cham, pp 645\u2013677"},{"key":"439_CR12","doi-asserted-by":"publisher","unstructured":"Brakerski Z, Vaikuntanathan V (2011) Efficient fully homomorphic encryption from (standard) lwe. In: Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science. FOCS \u201911, IEEE Computer Society, USA, pp 97\u2013106. https:\/\/doi.org\/10.1109\/FOCS.2011.12","DOI":"10.1109\/FOCS.2011.12"},{"key":"439_CR13","doi-asserted-by":"publisher","unstructured":"Chen H, Dai W, Kim M, Song Y (2019) Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security. CCS \u201919, Association for Computing Machinery, New York, NY, USA, pp 395\u2013412. https:\/\/doi.org\/10.1145\/3319535.3363207","DOI":"10.1145\/3319535.3363207"},{"key":"439_CR14","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/978-3-319-70503-3_20","volume-title":"Theory of cryptography","author":"L Chen","year":"2017","unstructured":"Chen L, Zhang Z, Wang X (2017) Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension. In: Kalai Y, Reyzin L (eds) Theory of cryptography. Springer, Cham, pp 597\u2013627"},{"key":"439_CR15","doi-asserted-by":"crossref","unstructured":"Chillotti I, Gama N, Georgieva M, Izabach\u00e8ne M (2016) Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In: Cheon JH, Takagi T (eds) Advances in cryptology\u2013ASIACRYPT 2016. Springer Berlin Heidelberg, Berlin, Heidelberg. pp. 3\u201333","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"439_CR16","doi-asserted-by":"crossref","unstructured":"Clear M, McGoldrick C (2015) Multi-identity and multi-key leveled FHE from learning with errors. In: Gennaro R, Robshaw M (eds) Advances in cryptology\u2014CRYPTO 2015. Springer, Berlin, pp 630\u2013656","DOI":"10.1007\/978-3-662-48000-7_31"},{"key":"439_CR17","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-981-97-5028-3_3","volume-title":"Information security and privacy","author":"X Dai","year":"2024","unstructured":"Dai X, Chen J, Wu W, Feng Y (2024) Lattice-based, more general anti-leakage model and its application in decentralization. In: Zhu T, Li Y (eds) Information security and privacy. Springer, Singapore, pp 44\u201363"},{"key":"439_CR18","unstructured":"Dai X, Wu W, Feng Y (2022) Key lifting : Multi-key fully homomorphic encryption in plain model without noise flooding. Cryptology ePrint Archive, Paper 2022\/055 , https:\/\/eprint.iacr.org\/2022\/055"},{"key":"439_CR19","doi-asserted-by":"crossref","unstructured":"Ducas L, Micciancio D (2015) Fhew: bootstrapping homomorphic encryption in less than a second. In: Oswald E, Fischlin M (eds) Advances in cryptology\u2014EUROCRYPT 2015. Springer, Berlin, pp 617\u2013640","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"439_CR20","doi-asserted-by":"publisher","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing. STOC \u201909, Association for Computing Machinery, New York, NY, USA, pp 169\u2013178. https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"439_CR21","doi-asserted-by":"crossref","unstructured":"Gentry C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti R, Garay JA (eds) Advances in cryptology\u2014CRYPTO 2013. Springer, Berlin, pp 75\u201392","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"439_CR22","unstructured":"Jin H, Liu FH, Wang Z, Gu D (2024) Discrete gaussians modulo sub-lattices: New leftover hash lemmas for discrete gaussians. Cryptology ePrint Archive, Paper 2024\/1695, https:\/\/eprint.iacr.org\/2024\/1695"},{"key":"439_CR23","doi-asserted-by":"publisher","unstructured":"L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the forty-fourth annual ACM symposium on theory of computing. STOC \u201912, Association for Computing Machinery, New York, NY, USA, pp. 1219\u20131234. https:\/\/doi.org\/10.1145\/2213977.2214086","DOI":"10.1145\/2213977.2214086"},{"key":"439_CR24","doi-asserted-by":"crossref","unstructured":"Micciancio D, Peikert C (2012) Trapdoors for lattices: simpler, tighter, faster, smaller. In: Pointcheval D, Johansson T (eds) Advances in cryptology\u2014EUROCRYPT 2012. Springer, Berlin, pp 700\u2013718","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"439_CR25","doi-asserted-by":"crossref","unstructured":"Mukherjee P, Wichs D (2016) Two round multiparty computation via multi-key FHE. In: Fischlin M, Coron JS (eds) Advances in cryptology\u2014EUROCRYPT 2016. Springer, Berlin, pp 735\u2013763","DOI":"10.1007\/978-3-662-49896-5_26"},{"key":"439_CR26","doi-asserted-by":"crossref","unstructured":"Peikert C, Shiehian S (2016) Multi-key FHE from LWE, revisited. In: Theory of cryptography conference. Springer. pp. 217\u2013238","DOI":"10.1007\/978-3-662-53644-5_9"},{"key":"439_CR27","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324","author":"O Regev","year":"2009","unstructured":"Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM. https:\/\/doi.org\/10.1145\/1568318.1568324","journal-title":"J ACM"},{"key":"439_CR28","unstructured":"Shafi G, Yael K, Chris P, Vinod V (2010) Robustness of the learning with errors assumption. In: Gennaro R, Robshaw M (eds) Innovations in Computer Science. pp. 230\u2013240"},{"key":"439_CR29","unstructured":"Xagawa K (2010) Cryptography with lattices. Ph.D. thesis, Department of Mathematical and Computing Sciences Tokyo Institute of Technology. Available at http:\/\/xagawa.net\/pdf\/2010Thesis.pdf"},{"key":"439_CR31","unstructured":"Xu J, Wu W, Feng Y, Dong R (2025) Monotonic optimization with application to the selection of parameters for LWE-based encryption schemes. J Syst Sci Complex"},{"key":"439_CR30","doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Protocols for secure computations. In: 23rd Annual symposium on foundations of computer science (sfcs 1982). pp. 160\u2013164","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00439-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00439-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00439-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:02:34Z","timestamp":1764115354000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00439-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,26]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["439"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00439-5","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,26]]},"assertion":[{"value":"3 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"105"}}