Full size image 2.3 Algorithmic Assumptions We here provide further definitions for the algorithmic assumptions on which the security of our protocol relies. As in [CCL+19], we need the HSM assumption guaranteeing the ind-cpa-security of the linearly homomorphic encryption scheme. We also use two...
The sentence form should be easy and direct, avoiding discussion of theory except when practical understanding and application are necessary. C. The form of a sentence should be and direct, and the discussion of theory should be omitted in addition to practical understanding and application....