Write, autoreview, editor, reviewer
3,129
edits
m (→Assumptions) |
m (→Properties) |
||
Line 42: | Line 42: | ||
*''Circuit Privacy'' This protocol is not circuit private as both Client and Server know the quantum circuit used for performing the computation. | *''Circuit Privacy'' This protocol is not circuit private as both Client and Server know the quantum circuit used for performing the computation. | ||
*''Full Homomorphism'' This protocol is fully homomorphic i.e. Server can operate any quantum circuit using this protocol. | *''Full Homomorphism'' This protocol is fully homomorphic i.e. Server can operate any quantum circuit using this protocol. | ||
*''Circular Security'' This | *''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server. | ||
== Pseudo-Code== | == Pseudo-Code== |