• Title/Summary/Keyword: Homomorphic

Search Result 185, Processing Time 0.023 seconds

DECOMPOSITION OF SOME CENTRAL SEPARABLE ALGEBRAS

  • Park, Eun-Mi;Lee, Hei-Sook
    • Journal of the Korean Mathematical Society
    • /
    • v.38 no.1
    • /
    • pp.77-85
    • /
    • 2001
  • If an Azumaya algebra A is a homomorphic image of a finite group ring RG where G is a direct product of subgroups then A can be decomposed into subalgebras A(sub)i which are homomorphic images of subgroup rings of RG. This result is extended to projective Schur algebras, and in this case behaviors of 2-cocycles will play major role. Moreover considering the situation that A is represented by Azumaya group ring RG, we study relationships between the representing groups for A and A(sub)i.

  • PDF

Estimation of Ultrasound Attenuation Coefficient by Homomorphic Deconvolution Method (Homomorphic Deconvolution 법에 의한 초음파 감쇄정수 추정)

  • Hong, Seung-Hong;Huh, Woong
    • Journal of Biomedical Engineering Research
    • /
    • v.5 no.1
    • /
    • pp.39-46
    • /
    • 1984
  • In order to improve the performance of ultrasonic diagnostic equipment, it is important to development the signal processing considering the ultrasonic properties of biological medium and propagation mechanism in tissue. Attenuation coefficient is not only important factor to analyze propagation properties, but also it is significant to estimate it in view of tissue characterization, so we show one of the method to estimate attenuation coefficient of biological tissue and the results of estimation.

  • PDF

MS-FUZZY IDEALS OF MS-ALGEBRAS

  • ALEMAYEHU, TEFERI GETACHEW;WONDIFRAW, YOHANNES GEDAMU
    • Journal of applied mathematics & informatics
    • /
    • v.39 no.3_4
    • /
    • pp.553-567
    • /
    • 2021
  • In this paper, we introduce concepts of MS-fuzzy ideals of MS-algebras. We reveal the connections between MS-fuzzy ideals and several kinds of fuzzy ideals as fuzzy prime ideals, kernel fuzzy ideals, e-fuzzy ideals and closure fuzzy ideals. We show that many of these classes are proper subclasses of the class of MS-fuzzy ideals. Finally some properties of the homomorphic images, inverse homomorphic images of MS-fuzzy ideals are studied.

NEUTROSOPHIC IDEALS IN SUBTRACTION ALGEBRAS

  • Kim, Young Hie;Ahn, Sun Shin
    • Honam Mathematical Journal
    • /
    • v.41 no.2
    • /
    • pp.435-447
    • /
    • 2019
  • The notions of a neutrosophic subalgebra and a neutrosohic ideal of a subtraction algebra are introduced. Characterizations of a neutrosophic subalgebra and a neutrosophic ideal are investigated. We show that the homomorphic preimage of a neutrosophic subalgebra of a subtraction algebra is a neutrosophic subalgebra, and the onto homomorphic image of a neutrosophic subalgebra of a subtraction algebra is a neutrosophic subalgebra.

PRACTICAL FHE PARAMETERS AGAINST LATTICE ATTACKS

  • Cheon, Jung Hee;Son, Yongha;Yhee, Donggeon
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.35-51
    • /
    • 2022
  • We give secure parameter suggestions to use sparse secret vectors in LWE based encryption schemes. This should replace existing security parameters, because homomorphic encryption (HE) schemes use quite different variables from the existing parameters. In particular, HE schemes using sparse secrets should be supported by experimental analysis, here we summarize existing attacks to be considered and security levels for each attacks. Based on the analysis and experiments, we compute optimal scaling factors for CKKS.

SOFT PMS-ALGEBRAS

  • Nibret Melese Kassahun;Berhanu Assaye Alaba;Yohannes Gedamu Wondifraw;Zelalem Teshome Wale
    • Korean Journal of Mathematics
    • /
    • v.31 no.4
    • /
    • pp.465-477
    • /
    • 2023
  • In this paper, the concepts of soft PMS-algebras, soft PMS-subalgebras, soft PMS-ideals, and idealistic soft PMS-algebras are introduced, and their properties are studied. The restricted intersection, the extended intersection, union, AND operation, and the cartesian product of soft PMS-algebras, soft PMS-subalgebras, soft PMS-ideals, and idealistic soft PMS-algebras are established. Moreover, the homomorphic image and homomorphic pre-image of soft PMS-algebras are also studied.

A Study on Data Collection Protocol with Homomorphic Encryption Algorithm (동형 암호의 데이터 수집 프로토콜 적용 방안 연구)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.42-50
    • /
    • 2021
  • As the Internet environment develops, data-analysis-based applications have been widely and extensively used in the past decade. However, these applications potentially have a privacy problem in that users' personal information may be leaked to unauthorized parties. To tackle such a problem, researchers have suggested several techniques including data perturbation and cryptography. The homomorphic encryption algorithm is a relatively new cryptography technology that allows arithmetic operations for encrypted values as it is without decryption. Since original values are not required, we believe that this method provides better privacy protection than other existing solutions. In this work, we propose to apply a homomorphic encryption algorithm that protects personal information while enabling data analysis.

A Study on the Cryptography Technology for Computing Stored and Encrypted Information without Key Leakage (키 유출 없이 저장되고 암호화된 정보를 계산할 수 있는 암호기술에 관한 연구)

  • Mun, Hyung-Jin;Hwang, Yoon-Cheol
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Various cryptographic technologies have been proposed from ancient times and are developing in various ways to ensure the confidentiality of information. Due to exponentially increasing computer power, the encryption key is gradually increasing for security. Technology are being developed; however, security is guaranteed only in a short period of time. With the advent of the 4th Industrial Revolution, encryption technology is required in various fields. Recently, encryption technology using homomorphic encryption has attracted attention. Security threats arise due to the exposure of keys and plain texts used in the decryption processing for the operation of encrypted information. The homomorphic encryption can compute the data of the cipher text and secure process the information without exposing the plain text. When using the homomorphic encryption in processing big data like stored personal information in various services, security threats can be avoided because there is no exposure to key usage and decrypted information.

Analysis of Homomorphic Authenticated Encryption (Encrypt with Authenticate Construction) (결합 준동형 인증 암호의 안전성 분석)

  • Kim, Jinsu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.33-44
    • /
    • 2021
  • Data outsourcing utilizing the Cloud faces a problem of the third-party exposure, modulation, and reliability for the provided computational delegation results. In order to solve those problematic security issues, homomorphic encryption(HE) which executes calculation and analysis on encrypted data becomes popular. By extension, a new type of HE with a authentication functionality, homomorphic authenticated encryption(HAE) is suggested. However, a research on the HAE is on the initial stage. Furthermore, based on a message authenticated scheme with HE, the method and analysis to design is still absent. This paper aims to analyze an HAE, with a generic combination of a message authenticated scheme and a HE, known as "Encrypt with Authentication". Following a series of analysis, we show that by adopting a unforgeable message authenticated scheme, the generically constructed HAE demonstrated an unforgeability as well. Though, a strong unforgeability is not the case. This paper concludes that although indistinguishable HE can be applied to design the HAE, a security issue on the possibility of indistinguishability is still not satisfied.

Performance Analysis for Privacy-preserving Data Collection Protocols (개인정보보호를 위한 데이터 수집 프로토콜의 성능 분석)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1904-1913
    • /
    • 2021
  • With the proliferation of smart phones and the development of IoT technology, it has become possible to collect personal data for public purposes. However, users are afraid of voluntarily providing their private data due to privacy issues. To remedy this problem, mainly three techniques have been studied: data disturbance, traditional encryption, and homomorphic encryption. In this work, we perform simulations to compare them in terms of accuracy, message length, and computation delay. Experiment results show that the data disturbance method is fast and inaccurate while the traditional encryption method is accurate and slow. Similar to traditional encryption algorithms, the homomorphic encryption algorithm is relatively effective in privacy preserving because it allows computing encrypted data without decryption, but it requires high computation costs as well. However, its main cost, arithmetic operations, can be processed in parallel. Also, data analysis using the homomorphic encryption needs to do decryption only once at any number of data.