menu
{ "item_title" : "Fully Homomorphic Public-Key Encryption with Three Ciphertexts", "item_author" : [" Masahiro Yagisawa "], "item_description" : "Fully homomorphic encryption is the cryptosystem which supports both addition and multiplication. The existence of the cryptosystems which have efficiency and fully homomorphism would bring great practical implications in the outsourcing of private computations, for instance, in the context of cloud computing.In this book I propose the fully homomorphic public-key encryption (FHPKE) with composite number modulus based on the discrete logarithm assumption (DLA) and computational Diffie-Hellman assumption (CDH) of multivariate polynomials on octonion ring over the finite ring Z/rZ. The scheme has three ciphertexts corresponding to one plaintext and is immune from m and - m attack. To break this cryptosystem it is thought that we probably need to solve the multivariate algebraic equations that is equal to solving the NP complete problem. Then it is thought that this system is immune from the attacks by the quantum computers.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/6/20/983/100/6209831001_b.jpg", "price_data" : { "retail_price" : "79.00", "online_price" : "79.00", "our_price" : "79.00", "club_price" : "79.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Fully Homomorphic Public-Key Encryption with Three Ciphertexts|Masahiro Yagisawa

Fully Homomorphic Public-Key Encryption with Three Ciphertexts

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Fully homomorphic encryption is the cryptosystem which supports both addition and multiplication. The existence of the cryptosystems which have efficiency and fully homomorphism would bring great practical implications in the outsourcing of private computations, for instance, in the context of cloud computing.In this book I propose the fully homomorphic public-key encryption (FHPKE) with composite number modulus based on the discrete logarithm assumption (DLA) and computational Diffie-Hellman assumption (CDH) of multivariate polynomials on octonion ring over the finite ring Z/rZ. The scheme has three ciphertexts corresponding to one plaintext and is immune from "m and - m attack". To break this cryptosystem it is thought that we probably need to solve the multivariate algebraic equations that is equal to solving the NP complete problem. Then it is thought that this system is immune from the attacks by the quantum computers.

This item is Non-Returnable

Details

  • ISBN-13: 9786209831003
  • ISBN-10: 6209831001
  • Publisher: LAP Lambert Academic Publishing
  • Publish Date: April 2026
  • Dimensions: 9 x 6 x 0.24 inches
  • Shipping Weight: 0.32 pounds
  • Page Count: 100

Related Categories

You May Also Like...

    1

BAM Customer Reviews