# Fully Homomorphic Encryption in Real World ApplicationsTranslating Algorithms to Handle Fully Homomorphic Encrypted Data

Fully Homomorphic Encryption in Real World Applications: Translating Algorithms to Handle Fully... [An algorithm is defined as a self-contained step-by-step set of operations to be performed to solve a particular problem. The concept of simplicity and elegance related to any algorithm informally appears in Knuth’s saying “\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ldots$$\end{document}we want good algorithms in some loosely defined aesthetic sense. One criterionis the length of time taken to perform the algorithm... Other criteria are adaptability of the algorithm to computers...” In this chapter, we discuss how to develop suitable synthesis techniques and methodologies to handle algorithms which operate on encrypted data and to be executed on underlying unencrypted processor.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

# Fully Homomorphic Encryption in Real World ApplicationsTranslating Algorithms to Handle Fully Homomorphic Encrypted Data

21 pages

/lp/springer-journals/fully-homomorphic-encryption-in-real-world-applications-translating-deS7K877HV

# References (6)

Publisher
Springer Singapore
© Springer Nature Singapore Pte Ltd. 2019
ISBN
978-981-13-6392-4
Pages
49 –70
DOI
10.1007/978-981-13-6393-1_4
Publisher site
See Chapter on Publisher Site

### Abstract

[An algorithm is defined as a self-contained step-by-step set of operations to be performed to solve a particular problem. The concept of simplicity and elegance related to any algorithm informally appears in Knuth’s saying “\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ldots$$\end{document}we want good algorithms in some loosely defined aesthetic sense. One criterionis the length of time taken to perform the algorithm... Other criteria are adaptability of the algorithm to computers...” In this chapter, we discuss how to develop suitable synthesis techniques and methodologies to handle algorithms which operate on encrypted data and to be executed on underlying unencrypted processor.]

Published: Mar 30, 2019

### There are no references for this article.

Access the full text.

Sign up today, get DeepDyve free for 14 days.