This chapter explains the generic techniques of homomorphic computation adopted by various FHE schemes such as TFHE, CKKS, BGV, and BFV,
As we learned from Β§B-4, , where , and is computed as . Each is an -degree polynomial as a public key, whose each coefficient is uniformly randomly sampled from . is an -degree polynomial as a noise, whose each coefficient is sampled from based on the Gaussian distribution . is a list of -degree polynomials as a secret key, such that , and each polynomial βs each coefficient is a randomly sampled binary number in (i.e., ).
Based on this GLWE setup, this section will explain the following 5 homomorphic operations: ciphertext-to-ciphertext addition, ciphertext-to-plaintext addition, ciphertext-to-plaintext multiplication, ciphertext-to-ciphertext multiplication, and key switching.