Research Article

An Effective NTRU-Based Fully Homomorphic Encryption Scheme

Table 2

Comparison of computational complexity.

SchemeCiphertextCommunication volume (pieces)Computational volume for addition operationsComputational volume for multiplication operations

F-NTRU
Scheme in this paper2