{"id":8183,"date":"2016-04-19T14:21:45","date_gmt":"2016-04-19T13:21:45","guid":{"rendered":"http:\/\/www.wjst.de\/blog\/?p=8183"},"modified":"2016-04-21T09:16:13","modified_gmt":"2016-04-21T08:16:13","slug":"link-collection-homomorphic-encryption-algorithm","status":"publish","type":"post","link":"https:\/\/www.wjst.de\/blog\/sciencesurf\/2016\/04\/link-collection-homomorphic-encryption-algorithm\/","title":{"rendered":"Link collection homomorphic encryption algorithm"},"content":{"rendered":"<p>&#8230; is\u00a0a form of encryption that allows computations to be carried out on ciphertext, thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext&#8230;<\/p>\n<p>First publication:\u00a0<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=1536414.1536440\">acm.org<\/a><br \/>\nIntroduction: <a href=\"http:\/\/www2.technologyreview.com\/news\/423683\/homomorphic-encryption\/\">technologyreview.com<\/a><br \/>\nDetails: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Homomorphic_encryption\">en.wikipedia.org<\/a><br \/>\nUse in genomics: <a href=\"http:\/\/www.nature.com\/polopoly_fs\/1.17174!\/menu\/main\/topColumns\/topLeftColumn\/pdf\/519400a.pdf\">nature.com<\/a><br \/>\nR package: <a href=\"http:\/\/www.louisaslett.com\/HomomorphicEncryption\/\">www.louisaslett.com<\/a><\/p>\n<pre class=\"brush: php; title: ; notranslate\" title=\"\">\r\ninstall.packages(c(&quot;Rcpp&quot;, &quot;RcppParallel&quot;, &quot;gmp&quot;)) \r\ninstall.packages(&quot;http:\/\/www.louisaslett.com\/HomomorphicEncryption\/dl\/HomomorphicEncryption_0.2.tgz&quot;, repos=NULL)\r\nlibrary(&quot;HomomorphicEncryption&quot;)\r\np &lt;- pars(&quot;FandV&quot;)\r\nk &lt;- keygen(p)\r\nc1 &lt;- enc(k$pk, c(42,34))\r\nc2 &lt;- enc(k$pk, c(7,5))\r\ncres1 &lt;- c1 + c2\r\ncres2 &lt;- c1 * c2\r\ncres3 &lt;- c1 %*% c2\r\ndec(k$sk, cres1)\r\ndec(k$sk, cres2)\r\ndec(k$sk, cres3)\r\n<\/pre>\n\n<p>&nbsp;<\/p>\n<div class=\"bottom-note\">\n  <span class=\"mod1\">CC-BY-NC Science Surf , accessed 10.04.2026<\/span>\n <\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230; is\u00a0a form of encryption that allows computations to be carried out on ciphertext, thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext&#8230; First publication:\u00a0acm.org Introduction: technologyreview.com Details: en.wikipedia.org Use in genomics: nature.com R package: www.louisaslett.com install.packages(c(&quot;Rcpp&quot;, &quot;RcppParallel&quot;, &quot;gmp&quot;)) install.packages(&quot;http:\/\/www.louisaslett.com\/HomomorphicEncryption\/dl\/HomomorphicEncryption_0.2.tgz&quot;, repos=NULL) library(&quot;HomomorphicEncryption&quot;) p &lt;- pars(&quot;FandV&quot;) k &lt;- &hellip; <a href=\"https:\/\/www.wjst.de\/blog\/sciencesurf\/2016\/04\/link-collection-homomorphic-encryption-algorithm\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Link collection homomorphic encryption algorithm<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-8183","post","type-post","status-publish","format-standard","hentry","category-computer-software"],"_links":{"self":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/8183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/comments?post=8183"}],"version-history":[{"count":5,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/8183\/revisions"}],"predecessor-version":[{"id":8209,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/8183\/revisions\/8209"}],"wp:attachment":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/media?parent=8183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/categories?post=8183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/tags?post=8183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}