当前位置:网站首页>Relinearization in homomorphic encryption (ckks)
Relinearization in homomorphic encryption (ckks)
2022-06-25 22:39:00 【Salted fish Feifei】
Homomorphic encryption scheme based on ring , such as BGV,BFV perhaps CKKS, After multiplicative homomorphism , It often leads to the increase of the dimension of the ciphertext . For example, by plaintext
Encrypted ciphertext
, Plaintext
The encrypted ciphertext is
, be
, The dimension becomes 3. In order to calculate homomorphic multiplication efficiently , Suppress ciphertext growth , We need to re linearize .
We use CKKS For example
Suppose there is a ciphertext
And the ciphertext after a multiplication
, Private key
, For
, Decrypted as
, about
, Decrypted as
.( Operations are modular p operation ,p Module of plaintext space ,e To generate noise )
In order to realize the re linearization of ciphertext , We also need a secondary key
, among
.
On the other hand
Reduplicalized ciphertext
.
Prove the following :



because e It's noise , be relative to p It's very small , therefore
In case of effective decryption, it is 0. so , The new ciphertext is
One of the 2 Uyghur ciphertext .
边栏推荐
- 圖解棧幀運行過程
- Lecture 14 of the Blue Bridge Cup -- number theory [exercises]
- Introduction to HLS content diversion and insert advertising specification
- How to guarantee idempotency of message queue
- What are the debugging methods for nodejs
- Online crudhasone Association query reports an error unabletouseinternalvariable:list
- MySQL modifies multiple tables and adds multiple fields through SQL
- Research on depth image compression in YUV420 color space
- Practice of product library platform nexus of Devops
- Hard liver! Super detailed basic introduction to Matplotlib!!!
猜你喜欢

Practice of product library platform nexus of Devops

2022-2028 global vacuum jacket system industry survey and trend analysis report

Nacos source code analysis 01 code structure

Conglin environmental protection IPO meeting: annual profit of more than 200million to raise 2.03 billion

Understand which C standards are there & understand the C compilation pipeline
Youku IPv6 evolution and Practice Guide

Créer le premier site Web avec idea

数据治理,说起来容易,做起来难

2022-2028 global TFT touch screen industry research and trend analysis report

剖析虚幻渲染体系(16)- 图形驱动的秘密
随机推荐
用idea建立第一個網站
Openwrt (VIII) application layer development
Lecture 14 of the Blue Bridge Cup -- number theory [example]
How does idea package its own projects into jar packages
Pycharm 2022.1 EAP 2 release
What is the difficulty of the form tool that costs billions of dollars? Exclusive interview with si no
Tiger DAO VC产品正式上线,Seektiger生态的有力补充
[WPF] XAML code skills that can be directly used for converting CAD engineering drawings to WPF
Research Report on China's new energy technology and equipment market competition analysis and marketing strategy suggestions 2022-2028
NARI radar's IPO meeting: it plans to raise nearly 1billion yuan. Bao Xiaojun and his wife are Canadians
在线CRUDhasone关联查询报错Unabletouseinternalvariable:List
【WPF】CAD工程图纸转WPF可直接使用的xaml代码技巧
Application runtime layotto enters CNCF cloud native panorama
Zero Trust: break the passive development mode of "attack and defense" and build a "moat" for enterprise safety
Is it safe to open an account with Caicai securities?
Privatization lightweight continuous integration deployment scheme -- 03 deployment of Web services (Part 2)
3.4 cloning and host time synchronization of VMware virtual machine
2022-2028 global horizontal reciprocating compressor industry research and trend analysis report
Illustration de l'exécution du cadre de pile
Youku IPv6 evolution and Practice Guide