- Reference: TFHE Deep Dive - Part II - Encodings and linear leveled operationsΒ [8]
Suppose we have a GLWE ciphertext ct:
and a new plaintext polynomial as follows:
Letβs define the following ciphertext-to-plaintext multiplication operation:
We assume that we always do polynomial-to-polynomial multiplications efficiently in by using the NTT technique (Β§A-16). Then, the following is true:
SummaryΒ C-3 GLWE Ciphertext-to-Plaintext Multiplication
This means that multiplying a plaintext polynomial by a GLWE ciphertext that encrypts and decrypting it yields .
Proof.
form the ciphertext .
If we decrypt by using , then we get the plaintext . Meanwhile, get eliminated by rounding during decryption, regardless of whatever their values were randomly sampled during encryption.
The noise is a bigger problem now, because after decryption, the original ciphertext ctβs noise has increased from to . This means that if we continue multiplication computations without decrypting the ciphertext to eliminate the noise , it will continue growing more and eventually the noise in the lower bit area in will overflow to the scaled plaintext bit area. If this happens, the noise wonβt be eliminated during decryption, ending up corrupting the plaintext . Therefore, if the constant is big, it is recommended to use gadget decomposition (Β§A-6.4), which we will explain in the next subsection.