Algorithm 5: The General Unbounded FHE Scheme

Secret Key: One randomly selects m pairwise relatively prime principal ideal lattices I 1 , I 2 , , I m in n as the decryption key according to Algorithm 3.

Public Key: Let t i = t ( I i ) be the one dimensional modulus of I i ( 1 i m ) . The plaintexts space is the direct sum of ring P = i = 1 m t i , the addition and multiplication in P are given by

( a 1 , a 2 , , a m ) + ( b 1 , b 2 , , b m ) = ( a 1 + b 1 , a 2 + b 2 , , a m + b m ) ,

( a 1 , a 2 , , a m ) ( b 1 , b 2 , , b m ) = ( a 1 b 1 , a 2 b 2 , , a m b m ) .

Let χ = ( χ 1 , χ 2 , , χ m ) be a probabilistic distribution over t 1 × t 2 × × t m . The public key for encryption is A χ = { A 1 , A 2 , , A m } n , and each A i = A i E i , where A i given by Algorithm 4 and E i given by (3.4).

Encryption: For any plaintext u = ( u 1 , u 2 , , u m ) P = i = 1 m t i , the encryption function f χ is given by

c = f χ ( u ) = u 1 ¯ A 1 + u 2 ¯ A 2 + + u m ¯ A m , (3.5)

where u i ¯ is the embedding of u i .

Decryption: For any ciphertext c n , we use the secret key I 1 , I 2 , , I m to decrypt c. Since for every i, 1 i m , we have c u i ¯ ( mod I i ) , and c mod I i is a unique vector in the orthogonal parallelepiped F ( I i ) of I i , thus one has c mod I i = u i ¯ , and by Lemma 3.1 and (2.3), we have

f χ 1 ( c ) = f 1 ( c ) = ( u 1 , u 2 , , u m ) = u .