Research Article

Privacy Protection of IoT Based on Fully Homomorphic Encryption

Algorithm 1

“Bootstrapping” algorithm.
Input:, ,,
Output:
tep 1. where is the -bit of
tep 2.