Difference between revisions of "FhePlayground"
(Created page with "This page paragraph should appear in the preview popup, alongside the picture that that it contains. My guess is that the preview of a page contains the first paragraph and th...") |
|||
Line 6: | Line 6: | ||
== Paragraph == | == Paragraph == | ||
This new paragraph should not appear in the page preview popup | This new paragraph should not appear in the page preview popup | ||
+ | <ref name="Perry">A playground</ref> | ||
+ | <ref name="Perry"/> | ||
== Math formulas == | == Math formulas == | ||
Line 58: | Line 60: | ||
where <math>\oplus</math> denotes addition modulo 2, (i.e. [[Exclusive disjunction|exclusive-or]]). | where <math>\oplus</math> denotes addition modulo 2, (i.e. [[Exclusive disjunction|exclusive-or]]). | ||
+ | |||
+ | == References == | ||
+ | <references> | ||
+ | * A playground | ||
+ | </references> |
Latest revision as of 08:02, 27 February 2020
This page paragraph should appear in the preview popup, alongside the picture that that it contains. My guess is that the preview of a page contains the first paragraph and the media in that page, up to the first paragraph marked between double '=' equal sign
A fully homomorphic encryption (FHE) scheme is an encryption scheme which supports computation on encrypted data: given a ciphertext that encrypts some data μ, one can compute a ciphertext that encrypts f(μ) for any efficiently computable function f, without ever needing to decrypt the data or know the decryption key. FHE has numerous theoretical and practical applications, the canonical one being to the problem of outsourcing computation to a remote server without compromising one’s privacy. In 2009, Gentry put forth the first candidate construction of FHE based on ideal lattices [Gen09]. Since then, substantial progress has been made [vDGHV10, SS10, SV10, BV11a, BV11b, BGV12, GHS12, GSW13, BV14, AP14], offering various improvements in conceptual and technical simplicity, efficiency, security guarantees, assumptions, etc; in particular, Gentry, Sahai and Waters presented a very simple FHE (hereafter called the GSW cryptosystem) based on the standard learning with errors (LWE) assumption.
Paragraph
This new paragraph should not appear in the page preview popup [1]
Math formulas
Math formulas2
Given a plaintext vector and a scaling factor , the plaintext vector is encoded as a polynomial by computing where denotes the coefficient-wise rounding function.
ElGamal
In the ElGamal cryptosystem, in a cyclic group of order with generator , if the public key is , where , and is the secret key, then the encryption of a message is , for some random . The homomorphic property is then
Goldwasser–Micali
In the Goldwasser–Micali cryptosystem, if the public key is the modulus and quadratic non-residue , then the encryption of a bit is , for some random . The homomorphic property is then
where denotes addition modulo 2, (i.e. exclusive-or).