摘要 |
Technologies are generally described for providing a fully homomorphic encryption scheme. In some examples, a method performed under control of a first device may include determining an enciphering function, based at least in part on a secret key of the first device and a system parameter; enciphering a plaintext into a first ciphertext, based at least in part on the enciphering function; transmitting, to a server, the first ciphertext and the system parameter; receiving, from a second device, a second ciphertext to which the first ciphertext has been processed by the second device without deciphering the first ciphertext; and deciphering the second ciphertext, based at least in part on the system parameter and a deciphering function. |