当前位置:网站首页>Three properties that a good homomorphic encryption should satisfy
Three properties that a good homomorphic encryption should satisfy
2022-07-05 01:47:00 【Salted fish Feifei】
A homomorphic encryption refers to the encryption of plaintext , It can be calculated according to ciphertext , then , The result of decryption is consistent with that of plaintext operation . In addition to the basic homomorphism requirements , A good homomorphic encryption scheme should satisfy the following three properties : Semantic security 、 Compact and efficient decryption .
Semantic security or IND-CPA Security
Given two plaintext and , The corresponding homomorphic encrypted ciphertexts are and . Suppose the enemy only knows one of the ciphertexts c, The best he can do is The probability of judging c yes still , among Is a positive infinitesimal . in other words , The enemy cannot use any effective algorithm to judge c yes still , The best way is to guess randomly . It means , Ciphertext will not disclose any information of plaintext . Generally speaking , This is achieved by adding random factors in the encryption process .
compact
A homomorphic scheme is compact , It means that the size of the ciphertext will not increase with homomorphic calculation . in other words , The ciphertext obtained by homomorphic calculation should be as large as that obtained by directly encrypting the result . This ensures that multiple homomorphic calculations can be performed , It will not cause the expansion of ciphertext size . meanwhile , It also makes the ciphertext obtained by homomorphic calculation indistinguishable from the ciphertext directly encrypted , Better security .
Efficient decryption
Efficient decryption means , Decryption of a homomorphic scheme , The complexity of decryption will not be increased because the ciphertext is homomorphically calculated many times . in other words , Decryption does not depend on whether the ciphertext is homomorphically computed . This makes decryption independent of homomorphic computation .
边栏推荐
- MATLB | multi micro grid and distributed energy trading
- 85.4% mIOU! NVIDIA: using multi-scale attention for semantic segmentation, the code is open source!
- Database postragesq PAM authentication
- The server time zone value ‘� й ��� ʱ 'is unrecognized or representatives more than one time zone【
- Delaying wages to force people to leave, and the layoffs of small Internet companies are a little too much!
- Database postragesq BSD authentication
- 179. Maximum number - sort
- 如何搭建一支搞垮公司的技术团队?
- C语音常用的位运算技巧
- Database postragesq role membership
猜你喜欢
Wechat applet: wechat applet source code download new community system optimized version support agent member system function super high income
Mysql database | build master-slave instances of mysql-8.0 or above based on docker
Wechat applet: Xingxiu UI v1.5 WordPress system information resources blog download applet wechat QQ dual end source code support WordPress secondary classification loading animation optimization
MySQL regexp: Regular Expression Query
R语言用logistic逻辑回归和AFRIMA、ARIMA时间序列模型预测世界人口
Logstash、Fluentd、Fluent Bit、Vector? How to choose the appropriate open source log collector
Wechat applet: the latest WordPress black gold wallpaper wechat applet two open repair version source code download support traffic main revenue
流批一体在京东的探索与实践
Visual explanation of Newton iteration method
PowerShell:在代理服务器后面使用 PowerShell
随机推荐
Is there a sudden failure on the line? How to make emergency diagnosis, troubleshooting and recovery
Abacus mental arithmetic test
微信小程序:星宿UI V1.5 wordpress系统资讯资源博客下载小程序微信QQ双端源码支持wordpress二级分类 加载动画优化
Phpstrom setting function annotation description
What is the length of SHA512 hash string- What is the length of a hashed string with SHA512?
流批一體在京東的探索與實踐
【LeetCode】88. Merge two ordered arrays
Blue Bridge Cup Square filling (DFS backtracking)
The application and Optimization Practice of redis in vivo push platform is transferred to the end of metadata by
Include rake tasks in Gems - including rake tasks in gems
Unified blog writing environment
Numpy library introductory tutorial: basic knowledge summary
Win:使用组策略启用和禁用 USB 驱动器
Application and development trend of image recognition technology
C basic knowledge review (Part 3 of 4)
JS implementation determines whether the point is within the polygon range
Yyds dry goods inventory [Gan Di's one week summary: the most complete and detailed in the whole network]; detailed explanation of MySQL index data structure and index optimization; remember collectio
Educational Codeforces Round 122 (Rated for Div. 2) ABC
[CTF] AWDP summary (WEB)
Some query constructors in laravel (2)