In previous work(2015/474 in Cryptology ePrint Archive), I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the enciphering function. In this paper I propose the improved fully homomorphic encryption scheme on non-associative octonion ring over finite field without bootstrapping technique. I improve the previous scheme by (1) adopting the enciphering function such that it is difficult to express simply by using the matrices and (2) constructing the composition of the plaintext p with two sub-plaintexts u and v. The improved scheme is immune from the “p and -p attack”. The improved scheme is based on multivariate algebraic equations with high degree or too many variables while the almost all multivari...
Fully homomorphic encryption has long been regarded as an open problem of cryptography. The method o...
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext ...
Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, the last few years h...
SUMMARY: In previous work I proposed a fully homomorphic encryption without bootstrapping which has ...
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption...
In previous work I proposed a fully homomorphic encryption without bootstrapping which has the large...
SUMMARY: Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic e...
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption...
SUMMARY: Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic e...
We investigate the use of multivariate polynomials in constructing a fully homomorphic encryption. I...
The homomorphic properties of various encryption schemes have been a fascination of the cryptographi...
Recently, IACR ePrint archive posted two fully homomorphic encryption schemes without bootstrapping....
Previously I proposed fully homomorphic public-key encryption (FHPKE) based on discrete logarithm pr...
Previously I proposed fully homomorphic public-key encryption (FHPKE) based on discrete logarithm pr...
Fully homomorphic encryption has long been regarded as an open problem of cryptography. The method o...
Fully homomorphic encryption has long been regarded as an open problem of cryptography. The method o...
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext ...
Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, the last few years h...
SUMMARY: In previous work I proposed a fully homomorphic encryption without bootstrapping which has ...
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption...
In previous work I proposed a fully homomorphic encryption without bootstrapping which has the large...
SUMMARY: Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic e...
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption...
SUMMARY: Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic e...
We investigate the use of multivariate polynomials in constructing a fully homomorphic encryption. I...
The homomorphic properties of various encryption schemes have been a fascination of the cryptographi...
Recently, IACR ePrint archive posted two fully homomorphic encryption schemes without bootstrapping....
Previously I proposed fully homomorphic public-key encryption (FHPKE) based on discrete logarithm pr...
Previously I proposed fully homomorphic public-key encryption (FHPKE) based on discrete logarithm pr...
Fully homomorphic encryption has long been regarded as an open problem of cryptography. The method o...
Fully homomorphic encryption has long been regarded as an open problem of cryptography. The method o...
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext ...
Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, the last few years h...