Classical Fully Homomorphic Encryption for Quantum Circuits: Difference between revisions

Line 45: Line 45:
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server.


== Pseudo-Code==  
== Pseudocode==  
*Boxed texts are not part of the code but contain proofs used in various steps, illustrated for a better understanding of the protocol.
*Boxed texts are not part of the code but contain proofs used in various steps, illustrated for a better understanding of the protocol.
==='''Stage 1''' Client’s Preparation===
==='''Stage 1''' Client’s Preparation===
Write
262

edits