当前位置:网站首页>Three properties that a good homomorphic encryption should satisfy
Three properties that a good homomorphic encryption should satisfy
2022-07-05 01:47:00 【Salted fish Feifei】
A homomorphic encryption refers to the encryption of plaintext , It can be calculated according to ciphertext , then , The result of decryption is consistent with that of plaintext operation . In addition to the basic homomorphism requirements , A good homomorphic encryption scheme should satisfy the following three properties : Semantic security 、 Compact and efficient decryption .
Semantic security or IND-CPA Security
Given two plaintext
and
, The corresponding homomorphic encrypted ciphertexts are
and
. Suppose the enemy only knows one of the ciphertexts c, The best he can do is
The probability of judging c yes
still
, among
Is a positive infinitesimal . in other words , The enemy cannot use any effective algorithm to judge c yes
still
, The best way is to guess randomly . It means , Ciphertext will not disclose any information of plaintext . Generally speaking , This is achieved by adding random factors in the encryption process .
compact
A homomorphic scheme is compact , It means that the size of the ciphertext will not increase with homomorphic calculation . in other words , The ciphertext obtained by homomorphic calculation should be as large as that obtained by directly encrypting the result . This ensures that multiple homomorphic calculations can be performed , It will not cause the expansion of ciphertext size . meanwhile , It also makes the ciphertext obtained by homomorphic calculation indistinguishable from the ciphertext directly encrypted , Better security .
Efficient decryption
Efficient decryption means , Decryption of a homomorphic scheme , The complexity of decryption will not be increased because the ciphertext is homomorphically calculated many times . in other words , Decryption does not depend on whether the ciphertext is homomorphically computed . This makes decryption independent of homomorphic computation .
边栏推荐
- 增量备份 ?db full
- What sparks can applet container technology collide with IOT
- Practice of tdengine in TCL air conditioning energy management platform
- How to safely eat apples on the edge of a cliff? Deepmind & openai gives the answer of 3D security reinforcement learning
- Restful fast request 2022.2.1 release, support curl import
- Five ways to query MySQL field comments!
- I use these six code comparison tools
- 微信小程序:微群人脉微信小程序源码下载全新社群系统优化版支持代理会员系统功能超高收益
- phpstrom设置函数注释说明
- Mysql database | build master-slave instances of mysql-8.0 or above based on docker
猜你喜欢
![Yyds dry goods inventory [Gan Di's one week summary: the most complete and detailed in the whole network]; detailed explanation of MySQL index data structure and index optimization; remember collectio](/img/e8/de158982788fc5bc42f842b07ff9a8.jpg)
Yyds dry goods inventory [Gan Di's one week summary: the most complete and detailed in the whole network]; detailed explanation of MySQL index data structure and index optimization; remember collectio

Restful fast request 2022.2.1 release, support curl import

【LeetCode】88. Merge two ordered arrays

如何做一个炫酷的墨水屏电子钟?

如何搭建一支搞垮公司的技术团队?

Delaying wages to force people to leave, and the layoffs of small Internet companies are a little too much!

One plus six brushes into Kali nethunter

Interesting practice of robot programming 16 synchronous positioning and map building (SLAM)

How to build a technical team that will bring down the company?

The steering wheel can be turned for one and a half turns. Is there any difference between it and two turns
随机推荐
Hedhat firewall
Database postragesq BSD authentication
Armv8-a programming guide MMU (3)
[swagger]-swagger learning
PowerShell: use PowerShell behind the proxy server
172. Zero after factorial
Yyds dry inventory swagger positioning problem ⽅ formula
Mysql database | build master-slave instances of mysql-8.0 or above based on docker
142. Circular linked list II
Jcenter () cannot find Alibaba cloud proxy address
What is the length of SHA512 hash string- What is the length of a hashed string with SHA512?
The perfect car for successful people: BMW X7! Superior performance, excellent comfort and safety
[OpenGL learning notes 8] texture
Logstash、Fluentd、Fluent Bit、Vector? How to choose the appropriate open source log collector
Flutter 2.10 update details
Exploration and Practice of Stream Batch Integration in JD
220213c language learning diary
One plus six brushes into Kali nethunter
Express routing, express middleware, using express write interface
Tucson will lose more than $400million in the next year