Write, autoreview, editor, reviewer
3,129
edits
Line 66: | Line 66: | ||
* <math>\tilde{x}^{[i]}</math>, resulting ciphertext one gets for an input <math>i^{th}</math> element of array x or <math>i^{th}</math> bit of key x after the Encrypting it with <math>i^{th}</math> of public key string, pk. | * <math>\tilde{x}^{[i]}</math>, resulting ciphertext one gets for an input <math>i^{th}</math> element of array x or <math>i^{th}</math> bit of key x after the Encrypting it with <math>i^{th}</math> of public key string, pk. | ||
== | ==Protocol Description== | ||
===Stage 1 Client’s Preparation=== | ===Stage 1 Client’s Preparation=== | ||