Design and Implementation of Encryption/ Decryption Architectures for BFV Homomorphic Encryption Scheme

Vaddi Hari Chandana
{"title":"Design and Implementation of Encryption/ Decryption Architectures for BFV Homomorphic Encryption Scheme","authors":"Vaddi Hari Chandana","doi":"10.22214/ijraset.2024.63724","DOIUrl":null,"url":null,"abstract":"Abstract: Now a days security is the prime part for both, the satellites communication of the electronics data and the stored data, hence encryption is important for information processing system and communication network. The proposed approach is easy to learn due the use of speed efficient Vedic multiplier. Since it minimizes the execution time and area, so the delay and power consumption is further decrease by the compact and flexible approach in the Mix column transform which takes different approach rather than conventional multiplication previously. The structure style of modeling helps to easy understandable the proposed design of algorithm. BFV is the symmetrical has designed and verified in the Verilog HDL in Xilinx tool. In this project we present using kogge-stone adder and Vedic multiplier.","PeriodicalId":13718,"journal":{"name":"International Journal for Research in Applied Science and Engineering Technology","volume":"27 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal for Research in Applied Science and Engineering Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22214/ijraset.2024.63724","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract: Now a days security is the prime part for both, the satellites communication of the electronics data and the stored data, hence encryption is important for information processing system and communication network. The proposed approach is easy to learn due the use of speed efficient Vedic multiplier. Since it minimizes the execution time and area, so the delay and power consumption is further decrease by the compact and flexible approach in the Mix column transform which takes different approach rather than conventional multiplication previously. The structure style of modeling helps to easy understandable the proposed design of algorithm. BFV is the symmetrical has designed and verified in the Verilog HDL in Xilinx tool. In this project we present using kogge-stone adder and Vedic multiplier.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
BFV 同态加密方案的加密/解密架构设计与实现
摘要:如今,安全是电子数据卫星通信和存储数据的首要组成部分,因此加密对于信息处理系统和通信网络来说非常重要。由于使用了速度高效的吠陀乘法器,所提出的方法易于学习。由于它最大限度地减少了执行时间和面积,因此通过混合列变换这种紧凑灵活的方法,进一步降低了延迟和功耗。建模的结构风格有助于轻松理解所提出的算法设计。BFV 是一种对称算法,已通过 Xilinx 工具中的 Verilog HDL 进行了设计和验证。在这个项目中,我们使用了 kogge-stone 加法器和吠陀乘法器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enhancing Music Mood Recognition with LLMs and Audio Signal Processing: A Multimodal Approach IOT Based Underground Cable Fault Detection System Application of Drone Technology in Construction Industry Design and Implementation of Encryption/ Decryption Architectures for BFV Homomorphic Encryption Scheme Intelligent Skin Cancer Detection with Preliminary Diagnosis using CNN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1