- Reference: TFHE Deep Dive - Part II - Encodings and linear leveled operationsΒ [8]
Suppose we have a GLWE ciphertext :
and a new plaintext polynomial as follows:
Letβs define the following ciphertext-to-plaintext multiplication operation:
We assume that we always do polynomial-to-polynomial multiplications efficiently in by using the NTT technique (Β§A-16). Then, the following is true:
SummaryΒ C-3 GLWE Ciphertext-to-Plaintext Multiplication
This means that multiplying a plaintext (polynomial) by a ciphertext (polynomial) and decrypting it gives the same result as multiplying the two original plaintext polynomials.
Proof.
form the ciphertext .
If we decrypt by using , then we get the plaintext . Meanwhile, get eliminated by rounding during decryption, regardless of whatever their values were randomly sampled during encryption.
The noise is a bigger problem now, because after decryption, the original ciphertext βs noise has increased from to . This means that if we continue multiplication computations without decrypting the ciphertext to blow away the noise , it will continue growing more and eventually the noise in the lower bit area in will overflow to the scaled plaintext bit area. If this happens, the noise wonβt be blown away during decryption, ending up corrupting the plaintext . Therefore, if the constant is big, it is recommended to use gadget decomposition (Β§A-6.4), which we will explain in the next subsection.