1. Introduction
FHE is an encryption scheme that evaluates encrypted data without decrypting it, and the decrypted results are the same as the outputs of the corresponding operations on the plaintext. Fully homomorphic encryption can achieve ciphertext protection of the whole life cycle of data. It has a wide range of application requirements in artificial intelligence, privacy computing, cloud computing, blockchain security, anonymous authentication and other fields.
In 2009, Gentry presented the first feasible homomorphic encryption scheme, and also presented a theoretical framework for constructing homomorphic encryption schemes. The theoretical framework constructs a somewhat homomorphic encryption scheme, and then implements fully homomorphic encryption through bootstrapping. Considering the security of the scheme, some homomorphic encryption schemes need to introduce noise. The noise reduces the security of the encryption scheme to computationally hard mathematical problems (e.g., LWE), thereby preventing the secret key from being easily compromised. The noise grows slightly during homomorphic addition, and explosively during homomorphic multiplication, and once the noise exceeds a certain threshold, a decryption error will occur. Therefore, we must carry out noise reduction operations to ensure proper decryption. Bootstrapping is the most effective operation to reduce ciphertext noise. In his groundbreaking work, Gentry established the following fundamental theorem: If a scheme can homomorphically evaluate its own decryption circuit (i.e., supports bootstrapping), then it can be transformed into a fully homomorphic encryption (FHE) scheme. This theorem demonstrates that bootstrapping serves as a sufficient condition for achieving FHE. Critically, no known techniques—such as modulus-switching or key-switching—can fully eliminate noise accumulation without relying on bootstrapping. However, bootstrapping computation is expensive and becomes the bottleneck of computation performance of all homomorphic encryption algorithms.
At present, bootstrapping is the only way to achieve homomorphic encryption, and it is also the main reason for the low efficiency of homomorphic encryption. Therefore, bootstrapping is the core and key of the whole homomorphic encryption scheme.
Notably, schemes such as TFHE and FHEW present stronger optimization incentives compared to BGV-type frameworks. This is primarily due to their inherently frequent bootstrapping requirements in practical applications (e.g., deep circuit evaluations), where even marginal reductions in the per-bootstrap overhead yield significant cumulative gains. Furthermore, TFHE’s and FHEW’s noise growth profiles are more sensitive to parameter adjustments, amplifying the impact of noise optimizations on overall feasibility and performance. In contrast, BGV’s leveled architecture inherently limits bootstrapping frequency, diminishing the relative urgency of optimizing its bootstrap mechanics. Critically, the FINAL bootstrapping scheme—specifically designed as an optimized variant of TFHE’s bootstrapping—demonstrates even greater potential for refinement.
In this work, our contributions are as follows.
(1) We adopt the ellipsoidal Gaussian sampling method to select keys f and g for the NGS basic encryption scheme. In the original FINAL scheme, the standard deviations of keys f and g are the same, while the bootstrapping noise is more dependent on the standard deviation of key g. The larger the standard deviation of g, the larger the bootstrapping noise. Hence, in the optimization scheme, the bootstrapping optimization technique based on the ellipsoidal Gaussian is used to make the standard deviation of key f and g samples expand and shrink by the same multiple, respectively, and as the standard deviation of g becomes smaller, the bootstrapping noise becomes smaller. Therefore, we can better adjust the parameters of the FINAL scheme within a certain noise bound.
(2) We adjust the parameters of the FINAL scheme to analyze the influence of different decomposition bases and their weights on the bootstrapping noise and efficiency, and propose an optimization scheme based on the FINAL scheme. The optimization scheme was 33.3% faster than the original FINAL scheme.
2. Related Work
In recent years, research on lattice-based fully homomorphic encryption (FHE) schemes has flourished and numerous schemes have been proposed, and there have been improvements and innovations based on them.
3. Preliminaries
3.1. Symbols and Parameters
3.2. Gaussian Distribution and Sub-Gaussian Distribution
where is the standard deviation, and c is the mean. Therefore, . The probability of is given by , and if , then the distribution is represented by .
where . From the definition, it can be seen that .
3.3. Digital Decomposition
3.4. NTRU Problems
The computational problem aims to recover f and g under a given .
The decision problem aims to distinguish between distribution and uniform random distribution on .
3.5. LWE Problems
The computational problem aims to solve the secret vector given .
The decision problem aims to distinguish between LWE distribution and uniform distribution on .
More detailed descriptions are as follows.
Error Distribution (): Typically a discrete Gaussian distribution centered at 0 with standard deviation . The error magnitude is bounded to ensure decryptability in encryption schemes.
Parameters and Hardness: Dimension (n): Higher n increases security but reduces efficiency. Modulus (q): A prime or power-of-two, balancing noise growth and security. Hardness Reduction: LWE is as hard as solving worst-case lattice problems (e.g., GapSVP, SIVP).
3.6. LWE-Based Encryption Scheme
: randomly and uniformly select the vector , and output key .
: , randomly and uniformly select the vector , select the error vector , calculate , and output , i.e., (. Among them, .
: input , and output .
Here, represents the rounding symbol.
3.7. FHE
The essence of fully homomorphic encryption is homomorphic evaluation, i.e., the results of plaintext calculations are equivalent to the results of ciphertext calculations after decryption. A homomorphic encryption scheme consists of four algorithms: a key generation algorithm, an encryption algorithm, a decryption algorithm and an evaluation algorithm.
: Input security parameter , and output public key pk, evaluation key evk for ciphertext calculation, and private key sk.
: Given , use the public key to encrypt message m and output ciphertext c.
: Use private key sk to decrypt ciphertext c and recover message m.
: Use the evaluation key evk, and input and to evaluation algorithm Eval, where , and output ciphertext c.
3.8. Bootstrapping
All common FHE schemes are based on noise encryption (noise guarantees the security of the fresh encryption), where the evaluation of homomorphic operations increases the noise magnitude and reduces the quality, i.e., calculates the budget. The primary use of bootstrapping is to convert exhausted ciphertexts into “equivalent” refreshed ciphertexts. Exhausted ciphertexts contain high noise and cannot be operated on further, whereas refreshed ciphertexts can support further homomorphic operations.
3.9. Key Circular and Key Circular Security
Encrypt key to generate a bootstrapping key, and if the key is still secure after being encrypted by the corresponding public key, then the encryption scheme can achieve circular security. The circular secure encryption scheme can resist related-key attacks. Given the security parameter , let be the key space and be the function from to . A homomorphic encryption scheme about f satisfies circular security if for all polynomial-time adversaries , the probability of adversary winning the following game is negligible:
(1) The challenger computes and randomly chooses a bit .
This paper assumes that the improvement scheme based on FINAL is key circular security.
3.10. NGS: NTRU-Based GSW-like Scheme
3.10.1. Algorithm Description
: Input security parameter , and output (), where B is the decomposition base of the decomposed ciphertext, .
: Input (), and output , where , and ;
: Input (), and output , where m is the plaintext of the ternary polynomial to be encrypted, , , and c denotes a scalar encryption of m.: Input (), and output , where is a monomial, defined as , (), and is a vector encryption of m.
3.10.2. External Product
i.e., .
3.10.3. Noise Analysis
Assuming that for all , is sub-Gaussian, where .
Then, according to Lemma 1, we have .
3.10.4. Modulus-Switching
3.10.5. Key-Switching from the NGS to the Base Scheme
After modulus-switching, the generated NTRU ciphertext needs to conduct key-switching in order to obtain the ciphertext in LWE form. Key-switching is divided into a key generation algorithm and a key-switching algorithm.
where , , , .
Key-switching algorithm: During key-switching from NTRU to LWE, i.e., given the NTRU ciphertext , the ciphertext is converted into LWE ciphertext through key-switching—
.
output
where , is the constant term of m.
3.11. Ellipsoidal Discrete Gaussian Sampling
For the NTRU encryption scheme, ellipsoidal Gaussian sampling is compared to spherical sampling by changing the original standard deviation of the key sample to , where , and . This makes the effect on security after ellipsoidal Gaussian sampling 4 or 5 contrasts lower than that of spherical Gaussian sampling, which is negligible, and the second component of key is shortened to the original . Where is the distortion factor and twisted paradigm for ellipsoidal Gaussian sampling.
4. Bootstrapping Optimization of FINAL Scheme
Therefore, this paper focuses on a fully homomorphic encryption scheme based on the LWE basic encryption scheme and denoted by the FINAL scheme.
The LWE key is binary. During the bootstrapping, by using a binary CMux encryption gate, at the end of the main loop of the refresh procedure, we obtain NTRU ciphertexts in the form of . Then, the NTRU ciphertexts are converted into LWE ciphertexts through modulus-switching and key-switching. Below is the definition of the binary CMux gate ( is the rounding error after modulus-switching).
Then, our CMux gate is defined as
4.1. Bootstrapping
Algorithm 1 Bootstrapping Key Generation |
Input: Secret key of LWE basic encryption scheme Output: Bootstrapping key
|
Algorithm 2 Bootstrapping Algorithm |
Input: LWE ciphertext encrypting , bootstrapping keys and key-switching key . Output: LWE ciphertext encrypting the same m.
|
4.2. Bootstrapping Noise Analysis
The noise generated by bootstrapping affects the correctness of decryption. When the noise exceeds this noise bound (≥), the scheme cannot decrypt properly. The analysis of the noise generated by bootstrapping is as follows.
where . Therefore,
The second step of bootstrapping is to assign values to the test vector, , without involving error analysis.
where represents the noise in the CMux gate and err(bsk) represents the noise in the NGS vector ciphertext. Regarding , from Lemma 5 and Equation (20), the noise introduced by this sequence of external products can be obtained as follows:
where is the standard deviation of f.
The fourth step of bootstrapping involved performing polynomial addition without involving the generation of noise.
where , and are the standard deviations of f, g and e sampling, respectively, and . Due to the use of two decomposition bases in the bootstrapping procedure, the noise becomes
where and , .
4.3. Bootstrapping Optimization Technique Based on Ellipsoidal Gaussian
The distortion factor is introduced during bootstrapping; it only reduces the size of the bootstrapping noise, and does not affect the noise bound, i.e., the optimization scheme can be decrypted normally as long as the bootstrapping noise is within the noise bound.
5. Parameter Optimization of FINAL Scheme
5.1. Computation Overhead
In the FINAL scheme, formula is used to compute in the bootstrapping algorithm (Algorithm 2). Assuming that the bootstrapping keys are fast Fourier transformed in advance, the external product requires FFTs and Hadamard vector products, where is the length of .
Let ; then, we require ring multiplications and FFTs per bootstrapping, where the ring is a polynomial ring.
From the relationship between the total number of ring multiplications and the total number of FFTs, it is clear that the total number of FFTs is always more than the total number of ring multiplications (therefore, in this paper, we only consider the total number of ring multiplications).
5.2. Memory Overhead
In terms of the memory overhead, the bootstrapping key consists of blind rotation keys (n NGS vector ciphertexts) and a key-switching key. The optimized scheme modifies only the dimensions of the blind rotation keys, which can be represented by the number of ring polynomials ()—specifically quantified as . Since this dimension aligns with the number of ring polynomial multiplications required for computation, the memory overhead of blind rotation keys can equivalently be characterized by the count of such ring polynomial multiplications.
5.3. Optimization of Parameters
The smaller are, the smaller the total number of ring multiplications for fixed . And , so when and are fixed, the larger the decomposition bases are, the smaller the total number of ring multiplications.
Similarly, when the decomposition bases are fixed, i.e., are fixed, the smaller are, the smaller the total number of ring multiplications, and the more efficiently the scheme runs (where is the number of NGS ciphertexts corresponding to the decomposition bases , respectively). Therefore, we need to choose and values that make the total number of polynomial products as small as possible.
In summary, in order to improve the efficiency of bootstrapping, we choose the the largest decomposition bases and as possible within the noise bound (where ).
The decomposition basis of the blind rotation key in this article is chosen as a power of 2. The core motivation for this choice lies in the synergy between hardware-friendly design and simplification in number theory. By reducing the complexity of modular arithmetic, optimizing storage architecture and leveraging inherent binary properties, they significantly enhance the practical efficiency of integer factorization algorithms.
5.4. Result
When , i.e., under the original FINAL scheme, we run 1000 tests, and the scheme runs normally when the noise generated by bootstrapping is <. And when the noise exceeds this noise bound (≥), the scheme cannot decrypt properly.
In summary, we can see that changing the value of only affects the noise introduced by bootstrapping, and the larger , the smaller the bootstrapping noise. The optimization scheme reduces the bootstrapping noise by increasing , and then selects a larger decomposition base and its corresponding to reduce the total number of ring multiplications and improve the bootstrapping efficiency of the scheme.
6. Security Analysis
6.1. Key-Recovery Attacks
The most efficient attacks come from lattice reduction, aiming at finding a relatively short vector in the spanned lattice. Lattice reduction consists of constructing the algebraic lattice over R spanned by the vectors and . After using lattice reduction on this basis, we enumerate all lattice points in a ball of radius , centered on the origin. With significant probability, we are therefore able to find .
Classically, sieving on this projected lattice will recover all vectors of a norm smaller than , where is the norm of the th Gram–Schmidt vector of the reduced basis, where b represents the BKZ blocksize.
we can recover the secret key vector with high probability.
and
It is then easy to deduce the BKZ blocksize b and, therefore, to derive the security level.
If such a guess of positions, say, , appears to be correct, we can intersect the NTRU lattice with , where refers to the complement of the set in the overset . The dimension of the lattice changes from to . As such, this final lattice reduction part is now easier and thus faster.
The volume in the twisted norm : the volume is scaled by the determinant of the intersected Gram matrix , which is exactly (where , and ).
All in all, the (normalized) volume of the intersected lattice for the twisted norm is .
6.2. Dense, High-Rank Sublattice and Subfield Lattice Attacks
6.3. Algebraic Attacks
The bootstrapping schemes are defined over algebraic lattices, which have a rich structure that could, in principle, lead to improved attacks. However, there is no known way to improve attack algorithms for their general lattice equivalent by more than polynomial factors in an asymptotic sense, and they do not affect our concrete security levels.
6.4. The Choice of Polynomial Rings
In this paper, we choose rings of the form , with N being a power of 2, and do not choose prime cyclotomic rings of the form , with n being a prime. This is because compared with prime cyclotomic rings, although rings are very scarce, there are limitations on the selection of rings, but the operations of the rings are simpler and more efficient, so we choose rings of the form .
6.5. Security Comparisons with TFHE Bootstrapping
The optimized FINAL scheme integrates NTRU (approximate GCD problem over polynomial rings) and LWE (learning with errors), with security relying on the NTRU assumption of the computational hardness of decomposing short vectors in polynomial lattices, and the LWE/RLWE assumption of Indistinguishability between noisy linear equations and random ones. The advantage is that NTRU’s compact key properties may help reduce the risks of key exposure.
TFHE hinges on RLWE (Ring-LWE) and RGSW (ring-based Gentry–Sahai–Waters encryption), with security derived from RLWE hardness and the resilience of blind rotation against cryptanalysis. Its advantage is that it has been extensively studied with no critical vulnerabilities reported.
The optimized FINAL bootstrapping and TFHE bootstrapping each have their own pros and cons in terms of security. FINAL’s dual assumptions (NTRU + LWE) theoretically enhance security by requiring adversaries to compromise both. TFHE’s reliance on a single RLWE assumption ensures clearer security bounds but lacks NTRU’s key compactness benefits.
7. Conclusions
In this paper, we analyzed the FINAL scheme and optimized it accordingly.
Secondly, we performed the adaptive adjustment technique on the decomposition bases. Since the efficiency of the fully homomorphic encryption scheme is mainly limited by ring multiplication and FFTs, the FINAL scheme changes the number of ring multiplications and FFTs by changing the decomposition bases of NGS and their corresponding values of , thus affecting the efficiency of the bootstrapping. Meanwhile, the decomposition bases of the FINAL scheme are limited by the bootstrapping noise. Therefore, we combine the bootstrapping optimization technique based on the ellipsoidal Gaussian to reduce the bootstrapping noise and expand the selection range of decomposition bases by selecting an appropriate value. Finally, based on , we adaptively adjust the decomposition bases and , so that they are as large as possible within the noise bound. This method reduces the total number of ring multiplications and FFTs. This greatly improves the efficiency of the bootstrapping, with 33.3% faster bootstrapping than the original FINAL scheme.
Source link
Meng Wu www.mdpi.com