Inferring Bivariate Polynomials for Homomorphic Encryption Application

نویسندگان

چکیده

Inspired by the advancements in (fully) homomorphic encryption recent decades and its practical applications, we conducted a preliminary study on underlying mathematical structure of corresponding schemes. Hence, this paper focuses investigating challenge deducing bivariate polynomials constructed using operations, namely repetitive additions multiplications. To begin with, introduce an approach for solving previously mentioned problem Lagrange interpolation evaluation univariate polynomials. This method is well-established determining that satisfy specific set points. Moreover, propose second based modular knapsack resolution algorithms. These algorithms are designed to address optimization problems which objects with weights values involved. Finally, provide recommendations how run our order obtain better results terms precision.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Homomorphic Encryption — Theory and Application

The demand for privacy of digital data and of algorithms for handling more complex structures have increased exponentially over the last decade. This goes in parallel with the growth in communication networks and their devices and their increasing capabilities. At the same time, these devices and networks are subject to a great variety of attacks involving manipulation and destruction of data a...

متن کامل

Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption

This work addresses the characterization of homomorphic encryption schemes both in terms of security and design. In particular, we are interested in currently existing fully homomorphic encryption (FHE) schemes and their common structures and security. Our main contributions can be summarized as follows: – We define a certain type of homomorphic encryption that we call shift-type and identify i...

متن کامل

Homomorphic Encryption

Fully homomorphic encryption (FHE) has been called the “Swiss Army knife of cryptography”, since it provides a single tool that can be uniformly applied to many cryptographic applications. In this tutorial we study FHE and describe its different properties, relations with other concepts in cryptography, and constructions. We briefly discuss the three generations of FHE constructions since Gentr...

متن کامل

Homomorphic Encryption 4 : Construction of fully homomorphic encryption .

Assumption We’ll make the following “learning divisor with noise” assumption: LDN Assumption: let P a random n bit prime, R a random n4 bit prime, and let N = PR. A distinguisher that is given N and X1, . . . , Xpoly(n) cannot distinguish between case (I) Xi’s are chosen independently at random from [N ], and (II) Xi = PQi + 2Ei (mod N) where Qi is chosen independently at random from [R] and Ei...

متن کامل

Fully Homomorphic Encryption for Mathematicians

We give an introduction to Fully Homomorphic Encryption for mathematicians. Fully Homomorphic Encryption allows untrusted parties to take encrypted data Enc(m1), . . . ,Enc(mt) and any efficiently computable function f , and compute an encryption of f(m1, . . . ,mt), without knowing or learning the decryption key or the raw data m1, . . . ,mt. The problem of how to do this was recently solved b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2023

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography7020031