Prepare-and-Send Quantum Fully Homomorphic Encryption: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
Line 29: Line 29:
  '''Decryption'''  
  '''Decryption'''  
The Client uses skL, which was not used to create any gadget (Gadgets used 0-(L-1) secret keys only) and decrypts sent encryptions to obtain the pad key. The pad key thus obtained determines the Pauli operations on the sent quantum state to obtain the final and correct outcome of the computation. The client performs the required operations on individual qubits of the quantum state and gets the output of his computation.
The Client uses skL, which was not used to create any gadget (Gadgets used 0-(L-1) secret keys only) and decrypts sent encryptions to obtain the pad key. The pad key thus obtained determines the Pauli operations on the sent quantum state to obtain the final and correct outcome of the computation. The client performs the required operations on individual qubits of the quantum state and gets the output of his computation.
== Figure==
   
   
== Notation ==
== Notation ==
Line 47: Line 45:
* x˜[i], resulting ciphertext one gets for an input ith element of array x or ith bit of key x after the Encrypting it with ith of public key string, pk.
* x˜[i], resulting ciphertext one gets for an input ith element of array x or ith bit of key x after the Encrypting it with ith of public key string, pk.


== Properties ==
==Requirements==
 
[[File:Prepare-and-Send Quantum Fully Homomorphic Encryption.png|center|Prepare-and-Send Quantum Fully Homomorphic Encryption]]
 
==Properties ==


===Security Claim/ Theorems===
===Security Claim/ Theorems===
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu