Classical Fully Homomorphic Encryption for Quantum Circuits: Difference between revisions

Line 30: Line 30:
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.
== Notation ==
== Notation ==
*<math>\lambda</math>: security parameter
* <math>k</math>: security parameter
* <math>k</math>: security parameter
* <math>\tilde{x}</math>: encrypted pad key
* <math>\tilde{x}</math>: encrypted pad key
Write, autoreview, editor, reviewer
3,129

edits