Wireless Communications and Mobile Computing / 2018 / Article / Alg 3

Research Article

Privacy Protection of IoT Based on Fully Homomorphic Encryption

Algorithm 3

Batched bootstrapping implementation of our scheme.
tep 1. The user first post-processes the -secret-key by encrypting as a -ciphertext
with respect to the -secret-key , namely the user has
where
with small coefficients.
tep 2. The server computes homomorphically. Specifically, the server compute the mod-
inner product homomorphically by setting
tep 3. Apply a homomorphic inverse-DFT transformation to convert to CRT-based “packed”
ciphertexts that hold the coefficients of in their plaintext slots.
tep 4. Apply the bit extraction procedure to all these slots in parallel. The result is encryption of
polynomials that have the coefficients of in their plaintext slots.
tep 5. Apply a homomorphic DFT transformation to get back a ciphertext that encrypts the
polynomial itself.