Research Article
Privacy Protection of IoT Based on Fully Homomorphic Encryption
Input: Modulus , and a ciphertext c encrypting a constant relative to secret key s and modulus | Output: A ciphertext encrypting the bit operation relative to secret key s and modulus | 1. Set // encrypt w.r.t. s | 2. For to | 3.Set // is an accumulator | 4.For to //Compute | 5.Set //Homomorphic exponentiation to the power | 6.Set | 7. Set // encrypts | 8. Output |
|