Research Article
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption
Algorithm 1
Fully homomorphic encryption using hidden ideal lattice.
| | Input:, , , , | | | Output:, | | (1) | function KEY GENERARTION | | (2) | generate a random vector satisfying | | (3) | generate t − 1 random vectors satisfying | | (4) | generate a random vector gt satisfying | | (5) | generate t − 1 random vectors satisfying | | (6) | generate a random vector rt satisfying | | (7) | | | (8) | for | | (9) | | | (10) | end for | | (11) | Get w satisfying = d mod f | | (12) | return | | (13) | end return | | (14) | function ENCRYPTION | | (15) | generate t − 1 random integer vectors satisfying | | (16) | generate a random vector satisfying | | (17) | generate a random vector satisfying | | (18) | | | (19) | return | | (20) | end function | | (21) | function DECRYPTION | | (22) | | | (23) | | | (24) | return plaintext | | (25) | end function |
|