Research Article
An Effective NTRU-Based Fully Homomorphic Encryption Scheme
Table 2
Comparison of computational complexity.
| Scheme | Ciphertext | Communication volume (pieces) | Computational volume for addition operations | Computational volume for multiplication operations |
| F-NTRU | | | | | Scheme in this paper | | 2 | | |
|
|