CKKS Scheme Pipeline

Interactive demonstration of Encoding, Encryption, Decryption, and Decoding.

Pipeline Stages

1. Vector Encoding

Converts complex vector to an integer polynomial.

2. Key Generation (RLWE)

Generates Secret (sk) and Public (pk) keys over the polynomial ring.

3. Encryption

Encrypts polynomial m(X) using pk into ciphertext pair (c0, c1).

4. Decryption

Decrypts ciphertext using sk to recover noisy m'(X).

5. Vector Decoding

Evaluates m'(X) and scales down to recover approximate vector z'.

Execution Log

Adjust parameters and click "Encode Vector" to begin...