
2. Let’s compute C
firstLoop
. It consists of two-
bit decompositions and a loop from 0 to
2log(Q) – this time, we need all the rows.
C
firstLoop
= O(C
BitDecomp
+log(Q) ·C
secondLoop
) =
O(log(Q)
2
· n + log(Q) · C
secondLoop
)
3. Determining the complexity of the second loop.
Let us enumerate all the operations in this loop:
• 4 multiplications of DCRTPoly;
• 4 additions of DCRTPoly.
Consequently, C
secondLoop
= O(4(C
multDCRTPoly
+
C
addDCRTPoly
)) = O (n · d · log(q)
2
)
Global complexity: C
RGSWmult
= O(log(Q)
2
· n · d ·
log(q)
2
).
5 RESULTS AND CONCLUSION
For these results, the computer used has an Intel Core
processor i7-12800H, 14 cores (6 performance-cores
– max turbo frequency cores 4.80 GHz and 8 efficient-
cores – max turbo frequency cores 3.70 GHz) for a
total of 20 threads. The library is OpenFHE version
1.1.1 (1.0.3 was used for comparison). We used a
plaintext modulus of 65537, and the multiplicative
depth was 3. The other parameters were OpenFHE
default ones.
Table 1: Addition.
parties 2 3 4 5 8 10
time (ms) 98 157 219 279 460 579
Table 2: Multiplication.
parties 2 3 4 5 8 10
time (ms) 115 252 397 550 1136 1642
We did the two operations (addition and multipli-
cation) for 2, 3, 4, 5, 8 and 10 parties. The corre-
sponding results can be found in the tables 1 and 2.
Multiplication time is to be understood without relin-
earisation: we just decrypted the ciphertext to verify
the correctness of the algorithm.
The last step was to create the relinearisation key.
The time result (described in 3 and 4)is only for one
element of the evaluation key and does not include
the pre-calculation time (which must be done inde-
pendently by every party because it is the secret key’s
encryption).
As shown by these last results, the implementation
of the library is crucial to evaluation key’s calculation
time. Refinement of core functions can very likely
lead to substantial improvements in calculation time
Table 3: RGSW multiplication v1.1.1, One row.
threads 1 2 4 8 16 20
time (min) 3:38 3:43 3:25 3:38 3:40 3:23
Table 4: RGSW multiplication v1.0.3, One row.
threads 1 2 4 8 16 20
time (min) 6:23 5:51 5:40 5:25 4:53 6:13
6
, and it will hopefully be enhanced in future versions
of OpenFHE.
REFERENCES
Aloufi, A. and Hu, P. (2019). Collaborative Homomorphic
Computation on Data Encrypted under Multiple Keys.
IWPE’19.
Asharov, G., Jain, A., L
´
opez-Alt, A., Tromer, E., Vaikun-
tanathan, V., and Wichs, D. (2012). Multiparty Com-
putation with Low Communication, Computation and
Interaction via Threshold FHE. In EUROCRYPT
2012, volume 7237, pages 483–501. Springer.
Boneh, D., Gennaro, R., Goldfeder, S., Jain, A., Kim, S.,
Rasmussen, P. M. R., and Sahai, A. (2018). Threshold
Cryptosystems from Threshold Fully Homomorphic
Encryption. In CRYPTO 2018, volume 10991, pages
565–596. Springer.
Brakerski, Z., Gentry, C., and Vaikuntanathan, V. (2014).
(leveled) fully homomorphic encryption without boot-
strapping. ACM Transactions on Computation Theory
(TOCT), 6(3):1–36.
Chen, H., Chillotti, I., and Song, Y. (2019). Multi-key ho-
momorphic encryption from TFHE. In ASIACRYPT
2019, volume 11922, pages 446–472. Springer.
Chen, L., Zhang, Z., and Wang, X. (2017). Batched Multi-
hop Multi-key FHE from ring-LWE with Compact Ci-
phertext Extension. TCC 2017, 10678:17.
Chowdhury, S., Sinha, S., Singh, A., Mishra, S., Chaudhary,
C., Patranabis, S., Mukherjee, P., Chatterjee, A., and
Mukhopadhyay, D. (2022). Efficient threshold FHE
with application to real-time systems. IACR Cryptol.
ePrint Arch., page 1625.
Dor
¨
oz, Y., Hu, Y., and Sunar, B. (2016). Homomorphic
AES evaluation using the modified LTV scheme. De-
signs, Codes and Cryptography, 80(2):333–358.
Gentry, C., Sahai, A., and Waters, B. (2013). Homomorphic
encryption from learning with errors: Conceptually-
simpler, asymptotically-faster, attribute-based.
L
´
opez-Alt, A., Tromer, E., and Vaikuntanathan, V. (2013).
On-the-fly multiparty computation on the cloud via
multikey fully homomorphic encryption. IACR Cryp-
tol. ePrint Arch., page 94.
Lyubashevsky, V., Peikert, C., and Regev, O. (2010). On
ideal lattices and learning with errors over rings. In
EUROCRYPT 2010, pages 1–23.
6
For instance, the bit decomposition could still be sig-
nificantly optimized.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
814