Classical Fully Homomorphic Encryption for Quantum Circuits: Difference between revisions

Line 30: Line 30:
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.
== Notation ==
== Notation ==
*<math>m</math>: Message
*<math>\lambda</math>: security parameter
*<math>\lambda</math>: security parameter
* <math>k</math>: security parameter
* <math>k</math>: security parameter
Write, autoreview, editor, reviewer
3,129

edits